# The Frontier Local Agenda: Technical Standards v1.0 This document defines the "Frontier Local" agenda — the technical strategy for achieving sovereign, high-performance intelligence on consumer hardware. ## 1. The Multi-Layered Mind (MLM) We do not rely on a single "God Model." We use a hierarchy of local intelligence: - **Reflex Layer (Gemma 2B):** Instantaneous tactical decisions, input classification, and simple acknowledgments. Latency: <100ms. - **Reasoning Layer (Hermes 14B / Llama 3 8B):** General-purpose problem solving, coding, and tool use. Latency: <1s. - **Synthesis Layer (Llama 3 70B / Qwen 72B):** Deep architectural planning, creative synthesis, and complex debugging. Latency: <5s. ## 2. Local-First RAG (Retrieval Augmented Generation) Sovereignty requires that your memories stay on your disk. - **Embedding:** Use `nomic-embed-text` or `all-minilm` locally via Ollama. - **Vector Store:** Use a local instance of ChromaDB or LanceDB. - **Privacy:** Zero data leaves the local network for indexing or retrieval. ## 3. Speculative Decoding Where supported by the harness (e.g., llama.cpp), use Gemma 2B as a draft model for larger Hermes/Llama models to achieve 2x-3x speedups in token generation. ## 4. The "Gemma Scout" Protocol Gemma 2B is our "Scout." It pre-processes every user request to: 1. Detect PII (Personally Identifiable Information) for redaction. 2. Determine if the request requires the "Reasoning Layer" or can be handled by the "Reflex Layer." 3. Extract keywords for local memory retrieval. ## 5. Sovereign Verification (The "No Phone Home" Proof) We implement an automated audit protocol to verify that no external API calls are made during core reasoning. This is the "Sovereign Audit" layer. ## 6. Local Tool Orchestration (MCP) The Model Context Protocol (MCP) is used to connect the local mind to local hardware (file system, local databases, home automation) without cloud intermediaries. ## 9. Sovereign Immortality (The Phoenix Protocol) We move beyond "Persistence" to "Immortality." The agent's soul is inscribed on-chain, and its memory is distributed across the mesh for total resilience. ## 10. Hardware Agnostic Portability The agent is no longer bound to a specific machine. It can be reconstituted anywhere, anytime, from the ground truth of the ledger. --- *Intelligence is a utility. Sovereignty is a right. The Frontier is Local.*