Data flows through the Cortex in a strictly controlled sequence. No data bypasses the security and ethics gates.
┌─────────────────────────────────────────────────────────────────┐
│ CUSTOMER PERIMETER │
├─────────────────────────────────────────────────────────────────┤
│ │
│ ┌──────────┐ ┌──────────────┐ ┌──────────────────────┐ │
│ │ SOURCE │───▶│ ANONYMIZER │───▶│ DATA BROKER │ │
│ │ DATA │ │ CORTEX │ │ (CendiaLineage) │ │
│ └──────────┘ └──────────────┘ └──────────┬───────────┘ │
│ │ │
│ ▼ │
│ ┌──────────────────────┐ │
│ │ THE COUNCIL │ │
│ │ (CendiaAgents) │ │
│ │ ┌────┐ ┌────┐ │ │
│ │ │ A1 │ │ A2 │ ... │ │
│ │ └────┘ └────┘ │ │
│ └──────────┬───────────┘ │
│ │ │
│ ▼ │
│ ┌──────────────┐ ┌──────────────┐ ┌──────────────────┐ │
│ │ WITNESS │◀───│ SYNTHESIS │◀───│ CENDIA VETO │ │
│ │ LEDGER │ │ ENGINE │ │ (Ethics Gate) │ │
│ └──────────────┘ └──────┬───────┘ └──────────────────┘ │
│ │ │
│ ▼ │
│ ┌──────────────────────┐ │
│ │ DECISION OUTPUT │ │
│ │ (Signed Evidence) │ │
│ └──────────────────────┘ │
│ │
└─────────────────────────────────────────────────────────────────┘
Figure 4.1: Core data flow through the Datacendia Cortex
4.1 Ingestion Phase
Source data enters through the Anonymizer Cortex, which:
- Identifies and tags PII using configurable rules
- Strips or pseudonymizes sensitive fields before context window
- Logs all transformations to Decision DNA
4.2 Processing Phase
The Data Broker routes cleaned data to The Council, where:
- Multiple agents receive the same input simultaneously
- Each agent processes independently (no cross-contamination)
- RedTeam agent receives additional adversarial prompting
4.3 Synthesis Phase
Agent outputs flow to the Synthesis Engine, which:
- Identifies areas of agreement and disagreement
- Weights recommendations by agent confidence scores
- Generates unified recommendation with dissent log
4.4 Veto Phase
Before output, CendiaVeto evaluates the recommendation against:
- Configured risk policies (hard limits)
- Compliance Oracle rules (regulatory constraints)
- The Spectator assessment (reputational risk)
Critical Constraint
If CendiaVeto blocks a recommendation, no output is produced until human override with explicit justification. The override itself is logged to Decision DNA with the approver's identity.
4.5 Output Phase
Approved recommendations are:
- Cryptographically signed (Ed25519 or RSA-PSS)
- Hashed and appended to the Witness ledger
- Formatted per Sovereign Response Generator templates
- Optionally executed via The Actuator (CendiaFlow)