PROTOCOL
Signal is accepted only after surviving depth.
The protocol separates asserted identity from verified identity, then binds proof to durable system context. Every exchange is reduced to what can be measured, repeated, and trusted below the application surface.