DM
The Sovereignty Stack

Protocol

A unified thesis

Sovereignty
is not a feature.
It is the protocol.

DM Protocol unifies the portfolio of infrastructure applications authored by David Mosbeux under a single legal, architectural and commercial thesis: returning ownership of data, money, legacy and health to the individual.

The stack in action

One transaction.
Three sovereignty layers.

Most apps protect one fragment. The Sovereignty Stack chains three to make a full transaction untraceable — from your past identity to the doorstep.

Outcome — a transaction with no profile, no name, no address.

The legacy arc

One lifetime.
Three temporal sovereignties.

Most apps die with you. The Legacy Arc chains three to govern your digital existence across time — preserve, transmit, erase.

Outcome — a digital existence you own, in life and after.

The hygiene pack

One surface.
Three layers of cleanliness.

Profiling doesn't only happen in databases — it happens in your photos, your browser, and your company's drives. The Hygiene Pack chains three to keep your surface clean, from the personal to the organizational.

Outcome — a clean surface, from your face to your company.

The corporate pack

One company.
An immortal decisional memory.

Companies don't only leak — they forget. The Corporate Pack chains Zenithos and Corporate Ink to turn corporate flows into a sovereign, GDPR-clean wisdom layer that outlives turnover, restructures, and founders.

Outcome — a company that remembers, without ever exposing.

The authorship pack

One creation.
An enforceable AI toll.

AI models ingest your voice, your face, your works — and pay nothing. The Authorship Pack chains Veridia and EdgeMint NeuralToll to mark every creation, detect every reuse, and invoice every second of AI exploitation.

Outcome — your works stop being free training data. They become a revenue stream.

The sovereignty pack

One data trail.
Three layers of repatriation.

Your data lives scattered across SaaS that never meant to give it back. The Sovereignty Pack chains Eudex, Zenithos and Cognito Sync to extract it, clean it, and bring it home — Data Act in hand.

Outcome — your data ends in your hands, not in a vendor's database.

Standalone

Outside the pillars.
Sovereign by nature.

Some apps don't fit a pillar — they redefine the surface itself. Standalone projects authored by David Mosbeux, sovereign in their own right.

01

ISAOS

The generative OS. Type an intent, get a tool — synthesized in real time. No app to install, no limit.

Pillar 02

Money.

Breaking the link between identity and transaction. Anonymous mandates, fiduciary buying and data-as-asset.

Pillar 04

Health.

Biometric sovereignty. Zero-knowledge proofs of health, owned by the patient — not the platform.

VITAL

Soon

Personal health data sovereign.

Simple Eats

Clean eating, simple lives.