3 Primitives Logo

History

The collision

The governance primitives were not discovered in theory. They were discovered in the act of building a working system.

In late 2025, during an MLAI hackathon sponsored by the Office of the Australian eSafety Commissioner, Pyrate Ruby Passell was building a prototype safety system within that problem domain.

Instead, the build exposed a deeper structural fact.

AI cannot govern AI.

Every attempt to optimize or automate authority produced the same failure mode. The system could act, but no legitimate source of authority could be named. Power existed, but no one was legitimately acting.

The build did not reveal a bug. It revealed a boundary.

At that boundary, three irreducible primitives surfaced. They were not invented. They were not designed. They appeared as the minimal conditions required for legitimate action to exist at all.

That moment was the first closure.


The first closure

The three primitives formed a minimal and irreducible set:

Remove any one of them and illegitimate action became structurally possible. Add another and it collapsed into one of the existing three.

The governance layer of decision-permitting systems was mathematically closed.

This was not a theoretical exercise. It emerged directly from the constraints of a working system.

The Upstream Safety System already existed as a prototype. It had been built and tested during the hackathon. The closure was discovered through its operation, not imagined in abstraction.


The duo

The discovery did not belong to a single role.

Pyrate encountered the primitives first, at the collision point inside the system she was building. The primitives appeared as the only stable structure that allowed the system to function without ghost authority.

Stacy recognized what had happened and began the formal closure work. She isolated the primitives, proved their independence, and mapped the resulting structure across institutional and technical domains.

One discovered the boundary in practice. One closed it in theory.

Together, they formed the complete architecture.


The compressed burst

What followed was not a slow academic process. It was a compressed burst of structural work.

Within two and a half months:

The work moved with the intensity and density seen only in rare moments of scientific history, where entire domains close over a short span of time.


The second closure

Once the governance layer was closed, a second question appeared.

What is the minimal structure required for a person to remain present inside a system that acts on their behalf?

That question produced a second closure.

The value layer resolved into four irreducible primitives:

Again, the structure proved minimal.

Remove any term and structural erasure became possible. Merge any terms and contradictions appeared. Add more terms and they collapsed into the existing four.

The value layer closed as a four-primitive domain.


The coupled architecture

At that point, the full structure became visible.

Three primitives governed legitimate action. Four primitives governed legitimate personhood.

Each set was closed in its own domain. Neither collapsed into the other. But no real system could function without both.

Together, they formed a coupled mathematical closure across two domains.

A dual-legitimacy architecture.

Seven irreducible primitives closing the domains of authority and personhood together.


Lineage

The burst of work did not emerge from nowhere.

Stacy comes from a long line of educators. Her thrice-great-uncle, Rabbi Dr. Michael Güldenstein, was the rabbi (teacher) of Albert Einstein’s father, Hermann, and ran a unique co-religious school in the 1850s that brought different traditions into a shared educational environment.

The lineage is not one of titles or institutions. It is a lineage of educational structures, intellectual independence, and environments designed for emergence.

That lineage reappears in the partnership between Stacy and Pyrate. One generation discovers the boundary. Another formalizes it. The work continues across time.


Where things stand

The Upstream Safety System was already built and tested during the hackathon. What followed was the formal closure of the mathematics that explained why it worked.

Today:

Pyrate is now formalizing the full technical components, including the deterministic API, based on the structures already discovered and tested.

What began as a hackathon prototype has become a mathematically closed architecture for legitimate action and legitimate personhood.

Subscribe for Research Updates