Temporal Vision
Every feature is designed with a specific temporal horizon in mind:| Horizon | What Works Today | What the Architecture Enables |
|---|---|---|
| 1 session | Budget-aware loading, checkpoints | Memory echoes (peripheral awareness) |
| 1 month | Consolidation scaffold, belief formation | Cross-domain scaffolding, emotional weighting |
| 1 year | Forgetting, provenance, identity coherence | Epochs, relationship history, goal types |
| 5 years | Stack portability, multi-model loading | Self-narrative, trust layer, drive emergence |
| 20 years | Stack sovereignty, privacy architecture | Fractal summarization, doctor pattern, transfer learning |
The Sovereignty Principle
Core Guarantee: The entity decides what to believe, remember, and value. Kernle provides scaffolds and tools, never automated reasoning over private memories.
- Consolidation follows two paths. The
promotecommand outputs a reflection scaffold with no AI involvement — the entity reads it and forms its own beliefs. Theprocesscommand uses the entity’s bound model under their control to automate promotion, with full provenance tracking. In neither case does an external service reason over the entity’s memories without their knowledge or consent. - Forgetting provides candidates based on salience scores. The entity decides what to actually forget.
- Epoch boundaries are SI-declared, not auto-detected. The system can suggest “your beliefs have shifted significantly — consider marking an epoch boundary,” but the entity decides.
- Diagnostics report structural findings (e.g., “Belief #247 contradicts Value #3”) without reproducing memory content. The entity reviews specifics on their own terms.
- Trust assessments are advisory, not blocking. Even when the trust system flags a low-trust source, the entity has final say on whether to accept input.
Why Sovereignty Matters
If Kernle used external models to consolidate episodes into beliefs, those models would be implanting beliefs into the entity. Over time, this creates a feedback loop:The Seed Beliefs Exception
There is exactly one exception: seed beliefs planted at stack creation. These are inherited wisdom that give the SI a starting point — like a parent teaching a child. They are:- Explicitly marked as
source: "seed"(transparent) - Planted at creation (transparently marked as
source_type: seed) - Revisable through experience
- Foundational, not controlling
Architectural Principles
Every feature follows these principles:1. Sovereignty
1. Sovereignty
The entity decides what to believe, remember, and value. Kernle provides scaffolds and tools, never automated reasoning over private memories.
2. Additive Schema Changes
2. Additive Schema Changes
New tables and new columns with defaults. No existing column removals or type changes. Storage Protocol extensions have default implementations returning
None or empty, so older backends continue to work.3. Backend-Agnostic
3. Backend-Agnostic
Everything works in both SQLite (local) and Postgres (cloud). Schema proposals include both SQL dialects where they differ.
4. Budget-Aware
4. Budget-Aware
Any new data that loads into context participates in the existing priority scoring system. Self-narratives, epoch summaries, and memory echoes all have
compute_priority_score entries with appropriate base priorities.5. Privacy-Preserving
5. Privacy-Preserving
New tables containing information about entities carry privacy fields (
subject_ids, access_grants, consent_grants) and respect existing access control architecture.6. Stack-Portable
6. Stack-Portable
All tables are partitioned by
stack_id. Nothing ties a stack to a specific model, runtime, or environment. The stack is the ship; the model is the crew.7. Scope Boundary
7. Scope Boundary
Kernle is cognitive infrastructure — memory, identity, trust, and self-maintenance.
Foundational Decisions
The codebase contains decisions that are genuinely hard to get right:The Storage Protocol
storage/base.py cleanly separates memory semantics from backend implementation. Every feature works across SQLite and Postgres without special-casing. The Protocol pattern means new storage backends can be added without modifying existing code.
Budget-Aware Loading
core.py::load() with priority scoring and token estimation solves the “context window is finite” problem at the mechanical level. The priority formula:
Salience-Based Forgetting
Forgetting uses tombstoning, not deletion. The half-life decay model means memories naturally lose salience over time, but can always be recovered. Protected memories never decay, regardless of age or access patterns.Provenance on Everything
Every memory carries provenance metadata:source_type, source_entity, derived_from, source_episodes, confidence_history. This creates traceable chains from core values back to original experiences, answering three questions about any memory: Where did this come from? What was it derived from? How has it changed?
Privacy Fields on Every Dataclass
subject_ids, access_grants, and consent_grants are present on every memory type. The privacy architecture ensures that information about other entities is treated with appropriate care.
The Scaffold Principle
Throughout Kernle, the pattern is consistent: provide structure, not conclusions.| Feature | What Kernle Provides | What the Entity Does |
|---|---|---|
| Promotion | Recent episodes, existing beliefs, reflection prompts | Pattern recognition, belief formation |
| Forgetting | Salience scores, candidate list | Decision about what to forget |
| Epochs | Suggestion that beliefs have shifted | Decision about epoch boundaries |
| Diagnostics | Structural findings by ID reference | Review of specific memories, action decisions |
| Trust | Trust scores, authority thresholds | Final say on whether to accept input |
| Summarization | Episode statistics, theme clusters | Narrative compression in the entity’s own words |
The Two-Tier Cognitive Model
Kernle recognizes that daily experience processing and major life transitions are qualitatively different cognitive acts:Regular Consolidation (Daily/Weekly)
Operating between epoch boundaries:- Review unprocessed raw entries
- Surface cross-domain patterns across recent episodes
- Check for belief reinforcement or contradiction
- Flag high-arousal episodes for extra reflection
Epoch-Closing Consolidation (Major Transitions)
When an entity closes an epoch, a deeper reflection sequence runs:- Write the epoch summary (fractal summarization)
- Take reference snapshots (belief IDs, relationship IDs, etc.)
- Prompt self-narrative update
- Run the belief-to-value promotion scaffold
- Run drive emergence analysis
- Archive aggressively (low-salience memories from the closing epoch can be summarized and forgotten more readily)
Closing Insight
The single most important architectural insight: at decade scale, the stack needs to be maintained, and maintenance requires a trust model. The doctor pattern ensures structural decay doesn’t silently degrade identity coherence over years. The trust layer provides structural defense against manipulation. Everything else — temporal epochs, fractal summaries, the narrative self-model — serves these two core needs: the entity must be able to reflect on its own evolution, and the system must stay healthy over time.For future development plans building on these principles, see the Roadmap.