The Protocol Layers
Lioth is built as a layered protocol. This structure supports multiple outcome types with the same core workflow: direct human work and optional packaging of validated outputs into HVD datasets. This separation also makes on-chain and off-chain boundaries explicit. While content and computation remain off-chain for privacy and scalability, final outcomes, finality receipts, and delivery references are recorded as auditable artifacts.
>Protocol layers diagram
Demand & Design Layer
Task Orchestration Layer
(Eligibility, Routing, Campaigns, Constraints)
Execution Layer
(Contributors produce Outputs)
Verification Layer (PHK)
(Validators, Audits, Anti-fraud, Reputation)
HVO Delivery
HVD Dataset Assembly
Distribution Layer
(Licensing, Access Control, Delivery, Subscriptions)
Demand and Design Layer
This layer converts demand into structured, executable specifications. It is where requesters and curators define what work needs to be produced, under what rules, and how quality is measured.
For HVO campaigns, the specification includes task schema, validation criteria, privacy mode, cohort target, quality tier, target accepted outputs, delivery mode, and budget semantics.
For HVD dataset campaigns, the specification additionally includes aggregation requirements such as sample size, dataset format, versioning rules, manifest requirements, dataset metrics, and licensing constraints.
Detailed contents such as full prompts, attachments, and procedures are maintained off-chain because they can be sensitive and large. On-chain, the protocol commits only non-sensitive identifiers and hashes so participants can verify source of data, licensing references, and rule versions.
Task Orchestration Layer
This layer turns specifications into active task flows. It routes tasks to eligible contributors, enforces rule-based access, and provides anti-collusion and anti-abuse controls at the assignment stage.
Eligibility and routing can also rely on cohort proofs, campaign-specific constraints, optional stake requirements where enabled, and privacy-preserving credentials.
Implementation note: Current live runtime access policy, validator readiness lanes, integrity restrictions, and audited assignment overrides are documented in App Status. These controls affect routing and availability, not PHK truth.
Verifiable Assignment and Anti-Collusion Constraints
-
Task routing and validator selection must be auditable from:
- the campaign configuration hash;
- the eligible set, or an eligible set commitment;
- the routing policy active for the network phase; and
- any signed assignment or reassignment events.
-
For tiers or phases that require it, assignments use a verifiable randomness source (VRF or equivalent). The protocol records enough reference material for third parties to verify that selection was not manually steered.
-
Deterministic selection, when required, chooses contributor assignment and validator quorum from the eligible set under committed inputs.
-
Assignment algorithms must enforce anti-collusion constraints such as:
- limits on repeated contributor-validator pairings within a time window;
- prevention of repeated same-quorum validation clusters; and
- exclusion or downgrade of validators with disqualifying conflicts, safety restrictions, or workspace-level integrity posture.
-
Timeout and reassignment: if a validator does not respond within the configured timeout, the task can be reassigned and the reassignment must be recorded as an auditable workflow event.
-
Audited routing overrides, when present during bootstrap/testnet, must be explicitly logged and cannot alter canonical PHK truth.
Orchestration is implemented off-chain because it is high-frequency and latency-sensitive. On-chain state reflects only the status changes and receipts that matter for auditability and settlement.
Execution Layer
Human work happens in the execution layer. Contributors receive tasks, complete them under the declared rules, and submit structured outputs. The protocol is designed to support both microtasks and high-skill tasks, so execution constraints are configurable.
The execution layer also supports protocol-level integrity checks embedded into task design. These may include consistency tasks, micro-checks, calibration tasks, and other mechanisms. This is not intended to prove humanity in isolation, but to provide signals that improve verification, raise the cost of automation and low-effort submissions, and support bounded-risk outcomes.
All task content and raw outputs remain off-chain, ensuring privacy, reducing costs, and enabling compliance handling where necessary.
Verification Layer (PHK)
The verification layer is the core security engine of the protocol. It enforces Proof of Human Knowledge (PHK), a framework that combines validator review, anomaly signals, audits, and due-process escalation paths where enabled.
>Verification flow diagram
Baseline quorum
(k validators)
Audit Escalation
(expanded quorum)
Dispute window
(optional)
Arbitration
(optional/required)
Finality
(PHK Receipt)
Verification Layer Specifications
1. PHK Inputs
Each contribution is evaluated under a campaign configuration committed by hash, including:
- validation rubric;
- quality tier configuration (validator quorum size, threshold, audit policy);
- dispute/arbitration configuration where enabled;
- privacy mode;
- assistance policy; and
- the referenced parameter and service policy versions.
2. Quality Tiers
Quality tiers are standardized verification presets that define verification strength and operational expectations. A tier specifies:
- validator quorum size and consensus threshold;
- audit policy (random sampling rate and trigger rules);
- dispute/arbitration availability and deposits where enabled;
- settlement finality rules and delays;
- privacy constraints and allowed verification signals; and
- exposure limits or routing constraints for low-trust or high-risk identities where implemented.
Campaigns must declare a tier preset, or explicitly declare a custom tier configuration, so verification strength, expected cost, and expected latency are transparent and comparable across campaigns. Campaigns commit the exact tier parameters by hash at creation time.
Implementation note: Current live tier availability and defaults are documented in App Status and Protocol Defaults.
3. PHK Outcome Types
A contribution resolves to one of these finalized states:
- Accepted
- Rejected
- Accepted after audit
- Rejected after audit
- Arbitrated
Finality occurs only after the applicable audit/dispute/arbitration path closes under the campaign's rules.
4. PHK Decision Process
- Assignment: a submission is assigned to one or more validators under the routing policy active for the campaign/network phase.
- Validator review: validators apply the rubric and produce approve/reject decisions and optional structured rationale fields.
- Consensus: the protocol applies the campaign's consensus threshold rules.
- Audit triggers: audits may be random, disagreement-triggered, risk-triggered, or requester-dispute-triggered where enabled.
- Finality: after audit/dispute/arbitration resolution, an outcome is finalized and becomes the canonical input for protocol truth, receipts, reputation, and metrics.
- Commit-reveal voting: for tiers that enable it, validator decisions may use a commit-reveal mechanism to reduce bribery, influence, and herding.
5. PHK Security Targets and Measurable Metrics
PHK is defined by measurable metrics that are reported per campaign and per tier.
Core PHK metrics:
- Agreement Rate (AGR): expected validator agreement under the rubric.
- Audit Overturn Rate: fraction of initially accepted outputs that are overturned by audits/arbitration.
- Rejection Rate: fraction of submissions rejected under the tier's rules.
- Time to Finality: distribution of time from submission to finalized state.
- Integrity / Duplication Rate (IDR): near-duplicate rate within the campaign.
- Assistance-policy metrics where assistance is disallowed, including SAR estimates.
PHK metrics are computed from finalized outcomes. Operational overlays, when present, may be reported separately, but they do not redefine PHK quality metrics.
PHK Tier Report System
To make verification measurable and comparable across campaigns, the protocol defines a standard PHK Tier Report. Reports are computed off-chain because content may be sensitive and may be shared publicly in aggregated form depending on campaign privacy mode. A campaign's PHK Tier Report MUST reference the campaign configuration hash and the active Parameter Registry version.
Required report fields:
- campaign identifier and configuration hash;
- tier identifier and parameter snapshot (quorum, thresholds, audit and dispute settings);
- submission volume and finalized accepted/rejected counts;
- AGR distribution and median;
- Audit Overturn Rate overall and by trigger type;
- rejection rate overall;
- Time to Finality distribution;
- IDR where applicable; and
- SAR estimate and method flags when assistance is disallowed.
Operational/testnet overlays such as held settlement, frozen payout, or TGE exclusion should be labeled separately as operational counts rather than PHK-quality counts.
6. Assistance Policy (AI Tooling Policy)
Each campaign declares an assistance policy:
- Allowed: AI assistance is permitted. PHK verifies rubric compliance and workflow finality, not human-only origin.
- Allowed with disclosure: assistance is permitted, but contributors must disclose assistance usage in a structured field. False disclosure may be penalized if proven via audit/arbitration under campaign rules.
- Disallowed: AI-assisted or automated submissions are not permitted. The protocol uses defense-in-depth (tier configuration, audits, integrity signals, and economic enforcement) to reduce and bound violations.
Detection signals are risk indicators, not standalone proof.
7. Cost and Latency Transparency
Verification strength increases cost and latency. For transparency, each tier may provide expected ranges for:
- expected verification cost multiplier;
- expected median time-to-finality; and
- expected audit overhead share.
8. Disputes, Arbitration and Slashing (Due Process)
PHK finality is designed to be enforceable without relying on provisional signals. Penalties, including slashing where enabled, may be applied only after a defined due-process path completes.
Campaigns may enable a dispute path depending on tier and campaign mode.
- HVO mode: disputes operate at the individual output level.
- HVD dataset mode: disputes typically operate at the sample or batch level and are resolved by statistical quality guarantees and schema compliance rather than requester preference alone.
A dispute must reference the campaign configuration hash, the task/output identifier(s), and the specific acceptance criteria or rubric clause claimed to be violated.
9. PHK Receipt (Workflow Proof)
For each finalized output, the protocol produces a PHK Receipt that includes:
- campaign identifier and campaign configuration hash;
- task identifier and task spec/version hash where applicable;
- quality tier identifier and tier parameters used;
- finalized outcome state;
- quorum summary;
- agreement-strength summary used for reputation scoring, and whether the outcome was audited/arbitrated;
- audit/arbitration flags and finality reference where applicable;
- optional randomness references when used;
- optional delivered artifact reference when enabled for delivery integrity; and
- timestamps and receipt signature.
A commitment to the PHK Receipt is anchored on-chain to enable independent auditability without revealing sensitive content.
Preparation Layer
This layer handles formatting, encryption, bundling, and delivery preparation after PHK finality. It packages finalized outputs into the requester's required format and can produce delivery artifacts, manifests, and delivery receipt metadata once completion rules are satisfied. Payloads remain off-chain even when their hashes or receipt references are anchored for auditability.
Distribution Layer
The distribution layer delivers both categories of output: HVOs and HVD datasets. They may be delivered through private channels, subscriptions, public listings, and direct integrations.
It uses end-to-end encryption, supports confidentiality modes that restrict metadata exposure, and reduces leakage risk through campaign-scoped access control, minimized delivery metadata, and optional watermarking where enabled by the campaign.
For datasets, the distribution layer also enforces licensing posture and maintains requester-facing manifest and receipt metadata. Licensing records and usage rights may be recorded on-chain as verifiable references while content remains off-chain.
Access control, encryption, storage, and delivery happen off-chain.
For HVOs, the distribution layer focuses on secure delivery, entitlement checks, and explicit delivery completion rather than assuming that acceptance alone equals delivery.
How Licensing Enforcement Works
Enforcing licensing means enforcing access and delivery conditions against a committed rights configuration. The Distribution Layer performs:
- entitlement checks to verify the recipient is allowed to access the artifact under the campaign's delivery configuration;
- key release / encryption control so decryption material is released only to entitled parties;
- license-bound delivery with logged delivery receipts; and
- traceability linking the delivered artifact to the relevant artifact hash and license reference.
The protocol records only the licensing commitment references and relevant integrity hashes on-chain to keep content and buyer metadata off-chain.
Warning: the protocol can restrict access and make terms auditable, but it cannot prevent off-platform copying after a buyer legitimately receives a dataset. For high-risk cases, campaigns should use confidentiality mode, watermarking, or contractual enforcement outside the protocol.
Governance and Coordination Layer
Lioth governance controls the evolution of protocol parameters without controlling individual content outcomes.
During bootstrap and testnet, the Foundation coordinates protocol iteration, publishes initial parameter defaults, and may use audited operational controls needed to keep the network usable. None of these controls permit the Foundation to rewrite PHK outcomes. Current live bootstrap behavior is documented in App Status.
Mainnet Governance (DAO)
After bootstrap, the Lioth DAO governs protocol parameters and treasury allocations through on-chain governance, covering:
- staking/bonding parameter changes;
- role and validator eligibility thresholds;
- campaign modes and standard fields;
- validation tier configuration defaults;
- dispute/arbitration rules and incentives; and
- treasury allocations and ecosystem grants.
Off-chain coordination supports proposal discussion, analysis, audits, votes, and implementation, while approved changes are reflected on-chain.
Parameter Registry
A registry contract stores the active parameter set that all spec-compliant clients and Protocol Service Operators must reference. This includes:
- role eligibility defaults and optional stake requirements where enabled;
- campaign mode templates and required fields;
- validation tier defaults;
- dispute/arbitration defaults; and
- treasury policy parameters.
Parameters are versioned and update only through governance execution, so no single party, including the Foundation, can silently change protocol rules after governance activation.
Spec Registry
Protocol services are constrained by versioned service specifications referenced by hash. The Spec Registry keeps:
- approved spec hashes per service type;
- optional compatibility windows; and
- deprecation markers.
PSOs emit signed service events that reference the campaign configuration hash and the service spec hash they executed. This allows multiple independent PSOs to run the workflow while remaining verifiably spec-compliant.
Emergency Controls
During early mainnet, an Emergency Pause mechanism may exist to handle critical vulnerabilities. This is a bounded safety valve:
- Objective: pause new campaign creation or routing, and optionally settlement execution.
- Limitation: it cannot seize funds, rewrite outcomes, or override PHK finality.
- Transparency: every pause emits an on-chain event with a reason code and public incident reference.
- Duration: pauses are time-bounded and automatically expire unless renewed through governance.
On-Chain and Off-Chain Boundaries
The protocol's principle is that on-chain states should only contain what is necessary for finality, auditability, and settlement. Everything content-heavy or sensitive remains off-chain. This ensures Lioth's scalability while preserving privacy and enabling verifiable trust.
- On-chain: campaign/specification commitment hashes, finalized outcome receipts, settlement receipts, reputation updates and slashing events where applied, dataset artifact hashes and licensing references, optional randomness references.
- Off-chain: prompts, raw outputs, embeddings and fraud-signal artifacts, QA report details, manifests and payload bodies, encrypted delivery payloads, storage, and key management.
Task Routing and Lifecycle
Each campaign declares a quality tier that defines validator quorum size, audit policy, dispute/arbitration settings where enabled, finality rules, and privacy constraints. Tiers determine verification strength and cost/latency tradeoffs and are committed by hash at campaign creation time. The protocol routes work through a standardized lifecycle that applies to both direct deliverable jobs and dataset packaging:
>Task routing and lifecycle diagram
Task generation and specification
Campaign definition, tier, budget, acceptance criteria
Task normalization and task pool
Normalize schema and constraints before routing
Eligibility checks and routing
Reputation, rate limits, stake, routing rules
Execution and submission
Contributor completes and submits output
Verification and validation
Quorum review and validation guard signals
Dispute window and arbitration
Optional dispute path and final decision
Packaging and delivery
Bundle outputs and deliver via distribution layer
Settlement and payouts
Finalize and release escrowed funds
-
Campaign creation and target accepted outputs
A requester initiates a campaign with a committed specification that defines task schema, acceptance criteria, cohort target, privacy mode, quality tier, target accepted outputs where applicable, delivery mode, and settlement rules.
-
Task generation and task pool
The campaign specification is normalized into protocol-standard tasks. Required fields, response formats, and campaign constraints are enforced before tasks enter the assignment pool.
-
Eligibility checks and contributor routing
The orchestration layer assigns tasks to eligible contributors based on the active access policy, caps, cohort constraints, and campaign rules. Routing resists abuse with throughput limits, repeated-pairing constraints, and integrity posture.
-
Execution and submission
Contributors complete tasks and submit outputs in the required schema. Task content and raw outputs remain off-chain.
-
Validator assignment
Submissions are assigned to validators under the active routing policy, which may distinguish policy eligibility, bootstrap availability, and effective runtime readiness depending on network phase. Any bootstrap/testnet assignment override must be audited and cannot alter PHK truth.
-
Validator review and PHK finality
Validators apply the campaign rubric and produce approve/reject decisions. Humans remain the source of PHK decisions. Integrity signals, cluster posture, or operator actions may affect routing/audit pressure, but they do not insert canonical approve/reject truth.
-
Safety overlay intervention, where needed
After or around PHK finality, operational release controls may hold settlement, freeze payout, quarantine entities, or restrict eligibility through a separate safety layer. These actions affect release policy, not PHK truth.
-
Packaging and delivery
After completion rules are satisfied, finalized outputs are packaged into requester-facing deliverables. Dataset mode produces an artifact, manifest, and delivery receipt metadata. Direct deliverables similarly have explicit delivery readiness and receipt semantics rather than an implicit handoff.
-
Settlement and progression
Settlement releases or holds value according to PHK finality plus any separate operational release policy. Reputation and trust updates are grounded in finalized outcomes. Current live requester progression policy, where applicable during bootstrap, is documented in App Status.