Fisher Sovereign Systems

Sovereignty Posture at a Glance

A unified view of identity, AI governance, network control, encrypted communications, and infrastructure health across the Fisher Sovereign ecosystem.

25+Active Systems
80K+Lines of Code
5Product Families
130Security Tests
0Cloud Dependencies
Tier 0Current Authority

Ecosystem Overview

Five product families form a coherent sovereignty stack. Each family addresses a distinct control boundary. Together they eliminate every major dependency on external trust.

AI Governance
Enforced
5-tier policy active
Identity Trust
Verified
Passkey + device bound
Network Health
Nominal
All endpoints scanned
Encryption
Active
X3DH + Double Ratchet
Cloud Exposure
Zero
All processing local
Backup Integrity
Partial
Snapshot system active
Family 01

AI Command

Multi-model orchestration with policy enforcement, task routing, data sensitivity classification, and hash-chain audit trails. Local Ollama inference on RTX 4070, cloud Claude as opt-in fallback.

5 components integrated
Orchestrator Enclave Auton ~15K LOC
Family 02

Identity & Trust

WebAuthn passkey authentication, device trust enrollment, TOTP step-up verification, X3DH key exchange, and approval token lifecycle management. No passwords, no cloud identity providers.

174 security tests passing
Vault Consent WebAuthn FIDO2
Family 03

Home Control

Network device discovery, 13-factor trust scoring, camera monitoring, traffic analysis, D3 topology visualization, and real-time alerting. All data stays on the local network.

Production MVP operational
HomeHub Network Intel Incidents ~8K LOC
Family 04

Secure Communications

End-to-end encrypted P2P messaging with Signal-grade cryptography. X3DH key exchange, Double Ratchet forward secrecy, WebAuthn local vault. Zero-knowledge relay server.

44 crypto tests passing
Sovereign Signal E2E Encrypted ~7K LOC
Family 05

Governance & Standards

37,500+ lines of governance specification across 30 documents defining: 5-tier approval system, 8 session authority states, intent-based routing, protected path enforcement, and formal approval artifacts.

Production-grade framework
Standards Policy Engine Audit Trail
Platform Layer

Shared Primitives

Reusable platform services shared across all product families: identity and key management, policy engine, encrypted storage, trust scoring, audit trail, and backup/snapshot infrastructure.

8 shared services
SQLite libsodium Fastify React
Presentation Layer
Command CenterUnified Dashboard
Product PagesPortfolio Showcase
Live DemosInteractive Proofs
Application Layer
AI OrchestratorTask Routing & Policy
Identity VaultKeys & Credentials
HomeHubNetwork & Devices
SignalE2E Messaging
GovernanceStandards & Audit
Platform Primitives
IdentityWebAuthn, X3DH
PolicyTier 0-4 Gates
AuditHash-Chain Log
StorageEncrypted SQLite
Trust13-Factor Scoring
BackupSnapshot Engine
Infrastructure
OllamaLocal LLM (RTX 4070)
SQLiteWAL Mode
FastifyTypeScript Server
ReactVite + Tailwind
Recent Activity Live

AI Command

Governed AI orchestration across local and cloud models. Every AI action is classified, policy-checked, and audit-logged before execution.

Active Models
3
Qwen 2.5, Llama 3, Claude
Policy Engine
Active
5-tier enforcement
Inference Mode
Local
RTX 4070 / Ollama :11434
Autonomous Agents
DRY_RUN
6 agents, safe mode
Component

System Router

Project resolution, zone permissions, command safety classification, session continuity. Python CLI with 8 zone types and fuzzy matching.

Operational4,143 LOC
Component

LLM Enclave

Zero-trust security enclave for local inference. Policy-gated file access, hash-chain audit trail, workspace bridge isolation. No outbound network.

Functional1,416 LOC
Component

LocalClaude

Hybrid local+cloud AI workstation. Multi-provider abstraction (Ollama, Claude, OpenAI-compat), streaming chat, conversation persistence.

Active MVP2,506 LOC
Component

Auton

Autonomous background worker with 6 specialized agents: scanner, planner, executor, tester, reviewer, monitor. SafetyGuard enforces path sandboxing and rate limits.

DRY_RUN6 agents
Component

Governance Framework

37,500+ line specification across 30 documents defining tier system, approval policy, session states, routing rules, agent boundaries, and operational standards.

Production30 docs
Component

Session Atlas

Intelligence dashboard analyzing 80+ Claude Code sessions. Three.js 3D terrain visualization, D3 heatmaps, hour-of-day work pattern analysis.

OperationalPort :8092
View LLM Enclave → View Sovereign Hub →

Identity & Trust

Passwordless authentication, device trust management, and cryptographic identity anchoring. No cloud identity providers. No password databases. Hardware-backed keys only.

Auth Method
Passkey
FIDO2 / WebAuthn
Enrolled Devices
2
Laptop + iPhone
Step-Up Auth
TOTP
For destructive ops
Active Tokens
0
No pending approvals
Sovereign Operator Console

Production Control Plane

Single-operator development control plane with VPS-hosted broker, browser console UI, and local Windows agent. All traffic encrypted with mTLS. Writes require explicit approval tokens.

130/130 tests passing
98% Production 15,142 LOC WebAuthn mTLS
Security Features

Approval Token System

Single-use, time-limited (10-minute TTL), bound to device_id + session_id + payload_hash. Protected path patterns prevent .env, *.key, and credentials.json writes.

Hash-Verified TTL Enforced Device-Bound
Cryptographic Foundation

Key Management

X3DH key exchange for session establishment. PGP identity anchoring for long-term identity. Safety numbers for contact verification. HKDF key derivation. Local vault with WebAuthn unlock.

X3DH PGP HKDF 44 tests
View Operator Console →

Home Control

Local-first home infrastructure monitoring. Device discovery, trust scoring, camera feeds, network topology, and real-time alerting. Every byte stays on your network.

Discovered Devices
24
ARP + ping + nmap
Active Cameras
4
RTSP + HLS + Snapshot
Trust Score
87%
13-factor analysis
Active Alerts
0
All clear
Module

Device Discovery

ARP scan + ping sweep + nmap integration. Continuous monitoring with automatic trust classification based on 13 behavioral and network factors.

Active
Module

Network Topology

D3 force-directed graph showing all devices, connections, and trust zones. Real-time updates via WebSocket event bus. Interactive zoom and filtering.

Active
Module

Camera Grid

Multi-layout camera monitoring supporting RTSP, HLS, and HTTP snapshot protocols. Adjustable grid layout with per-camera settings.

Active
Module

Traffic Monitor

Real-time network traffic analysis via Python/Scapy. Protocol breakdown, bandwidth tracking, anomaly detection with configurable alerting thresholds.

Active
Module

Event Timeline

Unified cross-system event stream. Device joins, disconnects, trust changes, alert triggers, and manual actions. Filterable and searchable.

Active
Module

Alert Engine

Configurable alert rules with snooze, acknowledge, and escalation. Integrates with device trust scoring and network anomaly detection.

Active
View HomeHub →

Secure Communications

Signal-grade end-to-end encrypted messaging built from first principles. No message storage on any server. Forward secrecy on every message. Biometric-only authentication.

Protocol
X3DH
Extended Triple Diffie-Hellman
Forward Secrecy
Active
Double Ratchet per message
Server Storage
Zero
Relay only, no persistence
Authentication
WebAuthn
Biometric / hardware key
Cryptographic Core

Protocol Stack

X3DH key exchange establishes shared secrets between previously unknown parties. Double Ratchet provides forward secrecy and break-in recovery. HKDF derives per-message keys. libsodium handles all primitives.

44 TestslibsodiumOpenPGP.js
Architecture

Zero-Knowledge Relay

Express relay server routes encrypted blobs between peers. No message content is ever decrypted server-side. WebRTC for direct P2P when both parties are online, relay fallback when not.

WebRTC P2PWS RelayExpress
Client

Web Application

Next.js PWA with offline capability. WebAuthn-protected local vault stores private keys. Safety numbers for contact verification. No account creation required on any server.

PWAOfflineNext.js
View Sovereign Signal →

Governance & Standards

A production-grade governance framework that defines how AI agents, infrastructure systems, and human operators interact within explicit authority boundaries. Not theory. Enforced policy.

Framework Size
37K+
Lines across 30 docs
Approval Tiers
5
Tier 0 through Tier 4
Session States
8
Distinct authority levels
Protected Paths
5
Hash-verified integrity

Tiered Approval System

TierClassificationScopeApproval Required
0ObservationalRead, analyze, plan, inspect, report. Default safe posture.None
1AdditiveCreate new files, directories, branches, configs, documentation.None (non-destructive)
2Controlled ModifyEdit existing files, refactor code, update configs, modify state.Plan-review-proceed cycle
3DestructiveDelete files, force push, hard reset, drop data, irreversible changes.Formal artifact + exact phrase + op-id + 10min TTL
4GovernanceModify governance files, policy changes, authority redefinitions.All Tier 3 gates + governance-diff validation
Standard

Local-First Decision Policy

All data processing and inference default to local hardware. Cloud services are opt-in, isolated, and require explicit justification. No implicit cloud dependencies.

Enforced
Standard

Dependency Scoring Model

Every external dependency is scored on: cloud reliance, vendor lock-in, outage exposure, telemetry risk, portability, and single points of trust failure.

Defined
Standard

Hash-Chain Audit Trail

Every state transition, permission grant, and AI decision is logged in append-only NDJSON format with SHA-256 chain integrity. Tamper detection on every read.

Operational
Standard

Agent Boundary Enforcement

Each AI agent operates within explicit authority scopes. Cross-agent relay is logged. Agents cannot execute suggestions from other agents without operator confirmation.

Enforced