The architecture in plain English
Marcella's security operates in five concentric rings. The outermost ring is your network — OSI Gate intercepts every connection attempt before it reaches your data. The next ring is authentication — MAP requires four independent cryptographic verifications simultaneously before any session begins, and OCAP ensures no single person can unlock a matter alone. The inner rings are your data and compute — tenant-isolated, PII-anonymized before AI contact, and chain-of-custody tracked on every record. At the hardware floor sits the MCF appliance — an on-premises unit where matter memory lives locally and compliance evidence is chained physically, so client data never leaves your building. Surrounding all of it is the Concentric Entropy Model — a continuous field of entropy-seeded decoys that makes the real system invisible to any attacker, classical or quantum.
Ring 4 — Network Layer
OSI Gate
Open Systems Interconnection Gate · Network and Transport Layer Enforcement
The lock on the front door — and the side door, and the back door.
OSI Gate operates at the network and transport layers of the OSI model — Layers 3 and 4. Every connection attempt, every API call, every session initiation passes through OSI Gate before it reaches any Marcella resource. An attacker who has valid credentials but the wrong device, network context, or timing cannot initiate a session. A compromised device cannot reach Marcella even with a valid password. The four required verifications — network integrity, device identity, application integrity, and gate passage — must all pass within a 60-second window simultaneously. All four or none.
Network integrity verification — connection origin, path, and topology checked at Layer 3
Device identity attestation — endpoint must present a valid device certificate tied to the enrolled identity
Application integrity — Marcella binary hash verified before inference begins (Quantum MTD)
Gate passage — all four pass within the same 60-second window or the session is denied
● Architecture live
Ring 3 — Attestation Layer
Concentric Entropy Model
CEM · Quantum Moving Target Defense · Entropy-seeded
The real system surrounded by infinite mirrors. Attackers cannot find it.
CEM replaces the idea of hardening a target with the idea of making a target unfindable. Every protected node continuously broadcasts quantum-entropy-generated decoy signals indistinguishable from the real system. An attacker probing the network does not face one target — they face an infinite field of equally valid-looking responses. Every decoy consumes the attacker's computational budget. With a true quantum computer, the attacker faces infinite mirrors that must each be individually resolved. Quantum advantage collapses to zero.
Quantum Moving Target Defense (Quantum MTD) applies the same principle at the application layer. Marcella's binary fingerprint changes continuously via QRNG seeding. An attacker who captured a copy of Marcella to reverse-engineer it has a snapshot that is already out of date before the analysis finishes.
Entropy-seeded broadcast — hardware QRNG on MCF appliance deployments, FIPS 140-3 DRBG on cloud deployments, seeds every decoy cycle
Proactive entropy broadcast — enrolled nodes announce outward continuously without waiting for a probe
Concentric rings amplification — each enrolled node multiplies the decoy field
Quantum MTD — application binary fingerprint rotates continuously, no static baseline
● Architecture complete · Patent filing in preparation
PAT-06 SAS (Security Architecture Stack) · Technology Outlaws LLC
Ring 2 — Authentication Layer
MAP + OCAP
Multi-Stream Attestation Protocol · Organizational Consensus Auth Protocol
Four independent locks. No single key opens the vault alone.
MAP requires four independent cryptographic verification streams to succeed simultaneously before any inference session begins. Not sequentially — simultaneously. A compromised credential on stream one does not unlock session access because streams two, three, and four have not verified. An attacker who defeats one stream gains no information about the others.
OCAP applies Shamir's Secret Sharing to organizational access. The most sensitive matter resources require multiple verified parties to simultaneously authorize access. No single attorney, regardless of seniority, can unlock a sensitive matter record alone. A social engineering attack on one person — a phone call pretending to be IT, a spoofed email from a partner — cannot open the vault.
Four independent cryptographic streams — all must verify within the same time window
Stream failure is silent — attacker learns nothing about the other streams from a failure
OCAP consensus requirement — sensitive matter access requires multi-party simultaneous authorization
No single-person unlock path — social engineering one person cannot compromise the matter
● Live · Patent filed 64/023,504
Ring 1 — Hardware Floor
Marcella Compliance Frame
MCF Appliance · On-Premises Matter Memory · Hardware-Rooted
Your data in your building. On hardware you own. That never leaves.
The MCF appliance is a rack-mounted hardware unit installed in the firm's own data center or server room. Matter memory lives on it locally. Compliance evidence is chained through it with a hardware-enforced monotonic sequence — every record is timestamped and linked to the prior record in a chain that cannot be modified retroactively without physically accessing the hardware. Client data never traverses a network to reach the AI model. The AI reasons about anonymized derivatives that never leave the building.
For defense contractors, this closes the CMMC Controlled Unclassified Information handling requirement. CUI fed into a cloud AI platform is a CMMC violation. CUI processed on an MCF appliance inside your facility is not.
Intel Boot Guard hardware root of trust — verified boot chain from silicon to application
BlueField-3 DPU — data processing unit provides QRNG entropy at the hardware floor
TCG Opal SED — self-encrypting drive, TPM-sealed keys, data at rest encrypted in hardware
MCF wire protocol — mTLS between all nodes, chain-of-custody on every record, no public IP
CMMC CUI compliance — data never leaves the building, no cloud AI exposure pathway
● Available · Contact for deployment scoping
Patent filed 64/013,702 · Technology Outlaws LLC
Ring 5 — Edge and Endpoint Layer
Marcella Security Layer
MSL · Lightweight Endpoint Agent · Behavioral Entropy Harvest
Every device you enroll makes the entire system stronger.
MSL is a lightweight agent (under 5MB RAM, under 0.5% CPU) deployed to firm endpoints via Intune, JAMF, or Kaseya. Once enrolled, each device contributes behavioral telemetry to the CEM entropy pool — network egress patterns, process structure hashes, TLS timing signatures. This telemetry feeds the entropy pool that powers Quantum MTD and CEM. More enrolled devices means a larger entropy pool, which means more CEM decoys and a greater computational burden on any attacker. For enterprise deployments, MSL simultaneously generates CMMC CA.L2-3.12.3 continuous monitoring evidence and Scope 1-3 carbon telemetry — three outputs from one agent. One IT approval. One MDM push. No kernel access required.
Behavioral baseline monitoring — deviation triggers anomaly flag, CMMC evidence record generated
Behavioral entropy contribution — each enrolled device expands the CEM decoy field
CMMC CA.L2-3.12.3 evidence — continuous monitoring records auto-generated
Scope 1-3 carbon telemetry — energy consumption data for ESG compliance, same agent
Passive probe for unenrolled devices — unknown devices flagged, not silently trusted
Enterprise MDM deployment — Intune, JAMF, Kaseya compatible. No kernel access. IT approves once.
● Architecture complete · Enterprise tier
MCF Appliance
On-premises hardware.
For the firms that need it.
The MCF appliance is the hardware floor for firms that require on-premises data storage — defense contractors handling CUI, large firms with attorney-client privilege requirements, enterprise legal teams where data sovereignty is non-negotiable. Three deployment sizes. All include the hardware, installation, training, and annual corpus and firmware updates.
MCF Standard
MCF Compact
Mid-market · Up to 50 seats · Contact for pricing
✓ Up to 50 seats
✓ On-premises matter memory vault
✓ CMMC compliance logging
✓ Offline query capability
✓ Annual corpus and firmware updates
✓ Training session (4 hrs, up to 10 users)
Contact for Scoping
MCF Enterprise
MCF Enterprise
Large firm · Unlimited seats · Air-gap capable · Contact for pricing
✓ Unlimited seats
✓ Full local Universal Legal Reference Layer
✓ CMMC Level 2 configuration
✓ Air-gap capable deployment
✓ High availability failover option
✓ Quarterly updates + annual onsite training
Contact for Scoping
MCF Sovereign
MCF Sovereign
Government · AmLaw 50 · Petabyte-scale · Custom configuration
✓ Government and AmLaw 50
✓ Custom hardware specification
✓ Multi-site replication
✓ Classified matter handling
✓ Dedicated TO engineer on retainer
✓ Custom corpus builds
Contact for Scoping
All MCF deployments include first year maintenance. Annual corpus updates (new statutes, cases, regulatory guidance) delivered automatically. Hardware warranty per manufacturer terms.