Potential user
You want to know what this is and whether to participate.
- Read Narrative · Why eDMT.
- Skim the FAQ.
- Open Mint and observe a block.
The eDMT canon is small, strict, and honest about its boundaries. Protocol rules are immutable; everything else is a reference implementation you may fork or replace.
Protocol at the base; contracts, backend, and frontend above; narrative and FAQ aside. Each layer has a different change policy.
Trustless. Rules are frozen at deployment. No admin, no upgrade key, no pause.
Application layer. May fork; each fork inherits its own trust assumptions.
Anyone may run their own. Disagreement triggers convergence via protocol rules, not voting.
Anyone may run their own UI. All user-facing actions must disclose trust.
Cross-layer. Educational. Must not contradict the protocol spec.
Each role has a recommended path through the canon. You may always read out of order — nothing you read later will contradict what you read first.
You want to know what this is and whether to participate.
You want to run a compliant indexer or audit protocol rules.
You want to implement or audit the ERC wrappers and marketplace.
You want to deploy the indexer, API, and multisig daemons.
You want to ship a web app on top of the reference backend.
You want to understand the reasoning or fork the design.
A short table of standing commitments. Each commitment is pinned to a specific layer — violating it constitutes a deviation from the reference spec.
| Promise | Layer | Substance |
|---|---|---|
| Rules never change | Once published on mainnet (element registration + ticker deploy), the letter of the protocol never changes. | |
| No admin, no upgrade, no pause | Protocol-level selectors contain zero admin authority. There is nothing to seize. | |
| No burn threshold beyond 1 gwei, no supply cap, no team reserve | Scarcity is produced by EIP-1559 distribution. We add no artificial constraint. | |
| Anyone can run an independent indexer | No centralized feed. Reference implementations are convenience, not gatekeeper. | |
| Contract code is immutable after deployment | The wrapper contract itself carries no upgrade, pause, or fee-change authority. | |
| The wrapper does not pretend to be trustless | Multi-sig EOA custody is disclosed on every application-layer surface. | |
| Users always have a raw calldata path | If you distrust the application layer, you may mint and transfer peer-to-peer at the protocol layer forever. |