Table of Contents
This is an old revision of the document!
Key Technology
The GSC, GHC, and WAF all use the AXI
AXI Released Domain
AXI Confidential
AXI Restricted
AXI Top Secret
* Human-Lineage AI Subordination Phrasesets * Multidimensional Breaching Theory
AXI TS: Sensitive Compartmented Information
* Redspace * Multidimensional Breaching Experiments
AXI No Release
Designation used for information that should not be known by anyone at all. Instead, indirect comparisons by nondirect systems are used to determine leaks. Only knowledge that the information exists is what is authorized.
- Starside Protocol (Partial)