Skip to content

Privacy and Data Placement

Privacy is an architecture boundary, not a late security feature. The first prototype should classify every record before writing validation rules.

Holochain’s source-chain docs describe each participant’s source chain as a signed, immutable journal on their device. The same page explains that agents use public/private key pairs and that source chains can include public or private data. Holochain validation explains that distributed network applications (DNAs) define rules for distributed hash table (DHT) operations so peers can check data integrity.

Put only the minimum shared fact on the DHT. Keep sensitive details private, encrypted, redacted, or external unless peers need them to validate the shared record.

Record typeDefault homeWhy
Role assignmentShared DHT recordOther peers need to know who can act.
Governance resolutionShared DHT record, with redactions when neededDecisions need provenance and shared authority.
Receipt imageExternal storage or encrypted payloadReceipts can expose addresses, payment details, and personal data.
Receipt hashShared or private referenceThe hash can prove continuity without exposing content.
Fiscal-host commentPrivate or scoped recordReview comments may include sensitive compliance details.
Export manifestScoped bridge recordThe reviewer needs a stable packet, but not every peer does.
Payment confirmationExternal system plus referenceBanking and accounting systems remain authoritative.

Validation rules should check only what peers are entitled to see.

A public approval record can validate that:

  • the approving role existed at the time;
  • the approval points to an agreement, expense packet, and entity;
  • required hashes or references are present;
  • the record follows the state transition rules.

It should not require every peer to read the underlying receipt, bank detail, tax form, or private comment.

For the fiscal-host expense wedge, start with four layers:

  1. Public or group-scoped approval state.
  2. Hashes for receipts, agreements, and export packets.
  3. Private or encrypted evidence payloads for reviewers.
  4. External payment, accounting, and compliance records.

That split lets the protocol preserve institutional memory without turning sensitive finance or identity data into unnecessary shared data.

  • Test Holochain private-entry and encrypted-payload patterns against the first expense workflow.
  • Decide whether document hashes should be content-addressed externally, stored through a file-storage zome, or both.
  • Define a redaction pattern for reviewer exports.
  • Identify which fiscal-host records need legal retention outside the Holochain application (hApp).