A structured explanation of Access, Ownership, Identity, and Recovery.
Overview
nimimo is designed around a deliberate separation of four fundamental axes required for human interaction with cryptographic systems. These axes are Access, Ownership, Identity, and Recovery. Each axis serves a distinct role and is intentionally prevented from escalating authority into another.
This document defines each axis. The companion papers sixteen-states.md and access-primitive.md examine, respectively, the full state space of the four axes and the formal properties of the Access axis in isolation.
1. Access
Definition. Access is the ability to initiate a session within nimimo on a specific device.
- Access enables interaction with the interface but does not grant authority.
- Access methods are replaceable and non-persistent.
- Loss of access does not imply loss of ownership.
2. Ownership
Definition. Ownership is cryptographic control over private keys generated and stored locally on the user's device.
- Includes private keys and derived wallet addresses (protocol identities).
- Keys are never transmitted to or stored by nimimo.
- Ownership exists independently of access or identity.
3. Identity
Definition. Identity is a human-readable reference that resolves to cryptographic ownership.
- Usernames and profiles act as social pointers, not authority.
- Identity is persistent across access methods.
- Identity does not sign transactions or hold balances.
Referential is not peripheral. The statement that identity has no cryptographic authority is a safety property, not a priority ranking. Identity is the surface users actually touch: the handle they share, the profile they customize, the @name a payer types. Ownership is the cryptographic invariant beneath it. Both layers are load-bearing; they carry different loads. The separation in this document prevents identity from becoming authority — it does not demote identity to plumbing.
4. Recovery
Definition. Recovery is an optional, user-initiated export of encrypted ownership material.
- Recovery artifacts are created locally and encrypted with a user-chosen PIN.
- nimimo never stores or manages recovery material.
- Recovery adds portability but introduces user responsibility.
Axis Comparison Table
| Axis | Purpose | Cryptographic Authority |
|---|---|---|
| Access | Enter system | None |
| Ownership | Control value | Funds only |
| Identity | Human reference | None |
| Recovery | Restore ownership | None |
"Cryptographic Authority: None" means the axis cannot sign, mutate state, or move value on its own. It does not mean the axis is unimportant to the product. Identity, in particular, carries none of the cryptographic authority and most of the product surface — that combination is the point, not an accident.
By separating these axes, nimimo achieves human usability without introducing custody or authority. Each axis exists independently, yet interoperates through well-defined, non-escalating boundaries.