Abstract
Summarizes the whole system: Solana rendezvous, MLS content privacy, three-pool mixer, Groth16 withdrawals, Shamir storage, direct QUIC transport, and the four-tier staking model.
Whitepaper Map
This page is the exhaustive map, not the short brochure version. It tracks the actual structure of `docs/WHITEPAPER.md` so readers can see every major topic the paper covers before opening the full markdown document.
Core Argument
Summarizes the whole system: Solana rendezvous, MLS content privacy, three-pool mixer, Groth16 withdrawals, Shamir storage, direct QUIC transport, and the four-tier staking model.
Covers the metadata problem, comparison to prior work, the core insight of using noisy public-chain activity as substrate, and the design principles that constrain the rest of the protocol.
Defines which adversaries matter, what Covenant explicitly defends, and what it does not claim to defend.
Introduces the three planes and the reference crate layout used in the implementation.
Wallet as root identity, per-epoch identity tree, deterministic account choreography, curated mint universe, and contact-card model.
Why there are fast and slow epochs, how the clock works, how HKDF domain separation is used, and how rendezvous tags are derived.
Metadata Layer
The ten encoding dimensions, per-epoch mapping rotation, sidecar minimality, distribution matching, and the honest limits of blockchain steganography.
Pool A intake, Pool B shuffle, Pool C withdrawal, Groth16 proof structure, what the cascade hides, and what it does not hide.
Separates message-layer cryptography from the protocol’s metadata machinery and keeps content protection grounded in OpenMLS. §8.1–8.2 cover add/remove/leave over the wire and the application-layer admin model.
Goals of the storage plane, Shamir split defaults, recipient-driven node selection, and pointer commitments.
Direct QUIC common case, chain-coordinated NAT traversal, reflexive discovery, bootstrap interaction, and relayer fallback.
CVN supply and distribution, participant tiers, user stake rationale, slashing parameters, rewards, and the lite-server role with its four bounded sub-roles.
Network And Product Model
Cohort joins, intake intervals, warmup epochs, anonymity-set floor, and the shortened v0.3 time-to-first-message path.
Device-as-member model, proximity pairing, seed-phrase pairing, stolen-seed warning window, and wallet rotation expectations.
What the foundation controls, what it does not control, the multisig model, on-chain governance transition, and compelled-foundation analysis.
One app / one identity, local profile policy, startup behavior, network switching policy, page model, feed role, invites, cross-platform shell strategy. §15.6 covers the browser / PWA client that signs real Solana transactions in WASM; §15.7 covers the privacy-opaque push backend.
Intrinsic failure modes, implementation bugs, user behavior risks, out-of-scope attacks, transport-auth status, and hole-punching status.
Version milestones from v0.4 through hardening — group lifecycle, browser PWA wallet, and opaque push are shipped; storage / relayer nodes, devnet public testers, and mainnet beta are next — then the closing argument that ties the design back to the protocol's actual claims.
Appendices
Epoch timings, identifiers, Shamir defaults, mixer settings, onboarding values, mint universe size, token numbers, staking tiers, reward rates, governance thresholds, bit budgets, and coalition resistance.
Implemented pieces, explicit placeholders, integration test coverage, and the remaining known issues and real-world gaps.
The external foundations the whitepaper builds on, including prior privacy systems, MLS, mixers, zero-knowledge proofs, and relevant network literature.
Question Coverage
It covers both. Section 11 and Appendix A go into token supply, participant tiers, slashing, reward formulas, and the lite-server role.
Yes. Sections 12, 13, and 15 explicitly cover cohort onboarding, multi-device flows, wallet rotation expectations, and the unified wallet-and-chat client.
Yes. Section 2 has the high-level threat boundary, and Section 16 is the explicit honest-limitations section.
Yes. Section 3 maps the crate layout, and Appendix B is the implementation-status appendix with tests, placeholders, coverage, and known gaps.