external world boundary, provider gating, public facts
P6.7-SOVEREIGN-HOMEPAGE-MASTER-REDESIGN
XPScerpto Sovereign Execution Portal
A sovereign cryptographic platform front page for architecture, authority boundaries, user/admin/root planes and evidence-first trust signals — with no external dependency and no unsupported production claim.
Module Constellation
Sovereign module constellation
The homepage shows the platform as a governed system, not as disconnected feature cards.
public boundary and provider closure
authority-gatedHWruntime intelligence authority
HW-authorized onlySIMDsealed execution route
truth-gatedBase64Xdemo-capable unit surface
evidence-firstIntegrity Fabricseal, transcript and evidence story
not final productionPQCpost-quantum fabric status
status-onlyFHEfoundation/status posture only until real engine closure
gatedRuntimenative adapter gate
Evidence Wall
Evidence Wall
The page foregrounds what is proven, gated, or explicitly not production-ready.
Studio-grade control plane
Sovereign portal command center
A production-style interface for public review, editorial control and evidence inspection.
Truth-gated runtime
backend_real is separated from native_runtime_attached and production_ready.
Advanced Website Studio
Pages, blocks, SEO, language content, navigation, footer, theme and evidence are managed from /admin.
Live runtime demo
A backend-backed demonstration emits JSON evidence without claiming native C++ attachment.
EU presentation posture
Strong public narrative with clear limits: presentation-ready, not technical-audit-final.
Separated Control Planes
User / Admin / Root Plane Map
The landing page now explains which plane can do what and which powers are intentionally absent.
read-only pages, evidence, docs and truthful runtime banners
SCOPED_SANDBOX_AUTHORITYUser Workspacescoped capsules and bounded live-demo requests
OPERATIONS_GOVERNANCE_AUTHORITYAdmin Controleditorial workflow, evidence manager and runtime governance view
LOCAL_ROOT_RELEASE_AUTHORITYRoot-Controllocal/VPN/hardware-gated release authority, not normal admin power
Authority lineage
Four separated control planes
Public, app, admin and root-control are intentionally split to prevent governance collapse.
Homepage Readiness Dossier
Homepage readiness dossier
A sovereign front page must sell confidence without lying about runtime proof.
Home, sovereignty, architecture, modules, security, performance, evidence, EU readiness, docs and contact.
Hero, authority chain, module constellation, evidence wall and plane map are visible without scrolling through admin-only context.
No CDN, no external font, no remote script and no third-party visual dependency.
REAL_NATIVE_RUNTIME_EXECUTION remains gated until the native adapter exists.
Evidence-first UI
Evidence-first experience
The portal renders truth, lineage, capsules and rejection state before marketing claims.
Authority visual
Home
This portal distinguishes the real Python backend from the native C++ runtime. Claims remain gated by evidence and runtime truth checks.
External facts enter through the public/backend boundary only.
Native runtime is not asserted unless the configured probe and evidence allow it.
SIMD/Base64X/Integrity/PQC pages consume evidence-bound status, not local claims.
Public proof panels read from the evidence manager and runtime truth contract.
Truth contract
No unproven production claim
production_ready is computed from native runtime attachment plus qualifying evidence; it is not an editorial toggle.
Evidence-first UI
Runtime Adapter Dossier
Real native execution or explicit fail-closed state
SaaS Control Plane
Scoped projects, API keys, capsules and audit traces
Projects
Per-user project records for execution grouping.
Capsules
Every accepted or rejected request creates a verifiable capsule.
API governance
Scoped keys carry explicit capabilities and quotas.
Evidence Center
Public proof without production overclaim
Runtime truth, asset seals, language parity, security chain status and deployment readiness are exposed as verifiable reports.