
PRIV8 protocol documentation is now available. It covers design rationale, security assumptions, threat model, and system boundaries, without hiding abstractions or skipping mechanisms. This is how the protocol is built today, not a conceptual overview. Documentation is part of the product. docs.priv8.xyz









