The GSC, GHC, and WAF all use the AXI
* Human-Lineage AI Subordination Phrasesets * Multidimensional Breaching Theory
* Redspace * Multidimensional Breaching Experiments
Designation used for information that should not be known by anyone at all. Instead, indirect comparisons by nondirect systems are used to determine leaks. Only knowledge that the information exists is what is authorized.