// GOVERNANCE STANDARD · OPEN SOURCE · BUILD_PROGRESS: 70% · DEPLOYED · LIVE

Confidential Reporting.
Community Safeguarding. Transparent Governance.

CtxWhisper enables confidential reporting, community safeguarding, and transparent governance in open ecosystems.

Not just a tool — a governance standard. Multi-tier roles, end-to-end encryption, Tor support, open audit trail — and a real trust team that takes reports seriously.

Meet the Trust Team → Early Access →
// CTXWHISPER SYSTEM STATUS IP_LOGGED: false COOKIES: false E2E_ENC: planned TOR: planned GOVERNANCE: live LIVE_TRACK: live ANON_CHAT: live SLA: live BUILD: 70%
ctxwhisper — confidential-report · e2e-encrypted
# Submit report — no account, no trace
POST /api/whisper/submit
# Payload encrypted client-side with trust team's public key
{
  "category": "CONDUCT_VIOLATION",
  "severity": "HIGH",
  "encrypted_body": "NaCl.box(payload, trustTeam.publicKey)",
  "attachments_hash": ["sha256:a1b2c3...", "sha256:d4e5f6..."],
  "eventId": "dknog-2026"
}

# Server response — reference only, nothing more
{ "reference": "WB-2026-X4K7M2", "routing": "MODERATOR" }

# Governance routing: Moderator → Ombud → Ethics Board
MODERATOR    → review within 48h
OMBUD        → escalation if unresolved 7d
ETHICS_BOARD → final decision + policy impact

# Reporter IP: [NOT STORED]  User-Agent: [NOT STORED]
# Tor onion routing: optional, planned
// NOT A BLACK HOLE INBOX

Reports are taken seriously.

Trust isn't built by anonymity alone — it comes from demonstrating that processes exist and are followed.

STEP_01
Receipt confirmed
Instant reference number. No identity stored.
STEP_02
48h first contact
Moderator acknowledges within 48 hours.
STEP_03
Escalation SLA
7 days — then auto-escalated to Ombud.
STEP_04
Community report
Anonymized quarterly report — no black box.
// GOVERNANCE ESCALATION MATRIX

Structured accountability at every severity level.

Every report triggers a defined response path. Roles, SLAs, and escalation thresholds are bound by governance policy — not personal judgment.

SEVERITY LEVEL REPORTER MODERATOR OMBUD ETHICS BOARD AUDITOR
SEV-1 Critical
Threats · Violence · Abuse
Anonymous submission + immediate safe-messaging resources
4h ACK · Immediate escalation authority · Interim measures possible
Auto-activated after 24h if unresolved · Independent review
Notified within 24h · Emergency session if pattern detected
Immutable log · External audit triggered if repeated SEV-1
SEV-2 High
Harassment · Discrimination
Reference number issued · Status trackable via portal
24h ACK · Categorization + routing · 5d resolution target
Escalated if unresolved after 7d · Conflict mediation
Informed if structural pattern · Policy review initiated
Quarterly report data · Trend analysis
SEV-3 Medium
Code of Conduct Violations
Pseudonymous tracking · Optional follow-up via secure channel
48h ACK · Standard resolution process · 14d SLA
Escalated after 14d or on appeal · Binding mediation
Monthly review of aggregated cases
Statistical inclusion in public transparency report
SEV-4 Low
General Feedback · Process Concerns
Fully anonymous · No tracking required
7d response target · May delegate to community team
Available on explicit request only
Quarterly input session — aggregate trends only
Included in annual governance summary
👤
Moderator
4h – 7d
First contact, categorization, resolution
⚖️
Ombudsperson
7d auto
Independent escalation if unresolved
🏛️
Ethics Board
21d max
Binding final decisions + policy impact
📋
Auditor
Continuous
Immutable trail · quarterly public report
Auto-Escalation
72h – 14d
System-enforced if SLA breach detected

Trust through technology, not promises.

If it's technically impossible to capture identity, you don't need to trust anyone. Open source — auditable by anyone.

planned
🔐

E2E Encryption

Reports encrypted client-side with the trust team's public key (NaCl/PGP). The server never sees plaintext.

planned
🧅

Tor Support

Optional .onion address. Network metadata stays with the reporter. No middleware logs.

live
🚫

No IP Logging

IPs, user-agents and fingerprints are discarded at system level — not after logging.

live
🗂️

File Upload

Up to 5 attachments (JPG, PNG, PDF, TXT). Outside web root, AES-256 at rest, never publicly accessible.

live
🔍

Status Tracking

Reference number is enough. No account, no password. Reporter checks status anytime.

planned
⚖️

Multi-Tier Governance

Moderator → Ombud → Ethics Board. Each escalation tier has defined SLAs and authorities.

planned
📋

Audit Transparency

Public anonymized audit trail. Community sees statistics without identity leaks.

planned
📦

Open Source Core

Core is MIT-licensed and auditable. Any community can independently review the implementation.

// GOVERNANCE ARCHITECTURE

Core + Governance
Layer + Plugins.

Built modularly: an immutable core with technical guarantees, a configurable governance layer, and optional plugins for different community structures.

SUBMISSION LAYER
Web · Tor Onion · API · CLI
E2E ENCRYPTION
NaCl Box · PGP · Key rotation
GOVERNANCE LAYER
Moderator → Ombud → Ethics Board
AUDIT LAYER
Anonymized public audit trail
// GOVERNANCE ROLES
MODERATOR Moderator
SLA: 48h

First contact, 48h SLA, categorization

OMBUD Ombudsperson
SLA: 7d

Independent mediator, escalation on conflict

ETHICS_BOARD Ethics Board
SLA: 21d

Final decisions, policy changes

AUDITOR Transparency Auditor
SLA: —

Read-only audit access, public reports

What can be reported?

📜 Code of Conduct Violation
⚠️ Harassment / Bullying
🚫 Discrimination
🛡️ Retaliation / Reprisals
🔐 Safety Concerns
⚖️ Governance Misconduct
🔄 Conflicts of Interest
📋 Other
🤝

The Community Trust Team

A publicly named, independent team of moderators, ombudspersons, and ethics board members — visible, approachable, accountable.

Meet the Trust Team →

Early Access to CtxWhisper

Sign up and we'll notify you when CtxWhisper enters beta.

Get updates on Context X tools, early access and community news.

No spam. Unsubscribe anytime. GDPR compliant.