Technical documentation

GAL-2™ Time Contract and Fractal Time Architecture

GAL-2™ is an application-facing temporal governance platform born from Fractal Time research. Its current product surface is the GAL-2 Time Contract: a local daemon and API-backed contract path that serves governed gal2_time so applications can consume time under explicit policy, validity, mode, reason, sequence, and lineage.

Product surface

Time Contract

Applications call /contract and consume gal2_time instead of trusting raw time directly for protected operations.

Core behavior

Governed continuity

GAL-2 can operate across LIVE, DEGRADED, HOLDOVER, REJOIN, WARMING, and FAIL_CLOSED states.

Claim boundary

Not a clock replacement

GAL-2 complements UTC, GNSS, PTP, NTP, chrony, atomic clocks, grandmasters, and timing receivers at the application boundary.

System architecture

GAL-2 is organized as a modular temporal governance architecture. Public interfaces expose governed outputs and contract behavior. Internal modules coordinate correction, routing, pacing, coherence, and operational continuity without exposing protected implementation details.

CAMI

Correction and Alignment Module for Integration

Coordinates correction logic and alignment between internal time representations and external system interfaces.

Aria

Adaptive Relay for Integrated Access

Provides adaptive routing and access coordination between GAL-2 components and connected systems.

Emma

Emitter of Modular Metronomic Alignment

Manages pacing and timing emission concepts used to support consistent system behavior.

CHAR

Coordinated Harmonic Alignment Relay

Handles coordination and alignment across distributed nodes and internal processes.

YO-EL5

Operational Coordination Layer

Acts as an internal control and orchestration layer responsible for coherence and operational continuity.

Time Contract

Application-facing boundary

Exposes governed gal2_time with safety, validity, mode, reason, sequence, and lineage for consuming applications.

These components describe the public architectural model. Detailed mathematical derivations, correction formulas, tuning logic, private keys, backend implementation, and protected core logic are not exposed in public documentation.

Theoretical foundation

GAL-2 is built on a fractal-based theoretical framework that treats time as a governed system property, not merely as a raw hardware signal. The model informs how GAL-2 reasons about continuity, correction, bounded behavior, and safe consumption under degraded or changing timing conditions.

Public documentation focuses on observable behavior and integration semantics. GAL-2 does not publish the protected formula, internal correction implementation, or backend decision logic. The current external product surface is the Time Contract, not a directly callable mathematical formula.

Conceptual flow, public-safe:

input:
  upstream reference context
  last known good GAL-2 state
  local daemon state
  policy limits

internal:
  protected GAL-2 correction and continuity logic
  mode transition logic
  validity and lineage evaluation

output:
  gal2_time
  safe_to_consume
  valid_until
  mode
  reason
  monotonic_sequence
  source_lineage
Do not publish pseudocode that reveals or implies the protected formula. Public examples should describe behavior, fields, and integration rules only.

Installation and integration

GAL-2 is designed to integrate alongside existing timing infrastructure, including GNSS, NTP, PTP, chrony, cloud systems, and enterprise timing stacks. It does not require customers to remove their existing reference layer.

The recommended integration pattern is to run the local GAL-2 Time Contract daemon near the application. Protected application workflows call the local /contract endpoint and use gal2_time only when the contract allows consumption.

curl -s http://127.0.0.1:9095/contract | python3 -m json.tool
Protected workflows include ledger writes, audit events, authorization decisions, ordering-sensitive jobs, cache invalidation, event ingestion, and any path where unsafe timestamps can become committed state.

Time Contract response

The Time Contract returns governed time and runtime semantics. gal2_time appears first because it is the output the application consumes. The remaining fields explain whether that output is safe, why, until when, and through what lineage.

{
  "gal2_time": "2026-05-14T16:20:30.123456Z",
  "reference_time": "2026-05-14T16:20:30.120000Z",
  "safe_to_consume": true,
  "valid_until": "2026-05-14T16:21:00.123456Z",
  "mode": "LIVE",
  "health": "green",
  "reason": "fresh_api_sync",
  "monotonic_sequence": 1842,
  "source_lineage": ["gal2_api", "gal2_daemon", "contract_v1"]
}

Core fields

Field
Meaning
Application use
gal2_time
Governed time output served by GAL-2.
Use for protected state-changing operations.
reference_time
Reference or alignment context.
Do not frame as UTC replacement or certified traceability unless separately verified.
safe_to_consume
Whether gal2_time is safe under policy, mode, validity, and lineage.
If false, block, defer, fail closed, or follow an approved fallback.
valid_until
Window during which the current contract decision remains justified.
Refresh before using stale decisions.
mode
Current operational state.
Drive application behavior from declared state.
reason
Explanation for the current decision.
Log with protected commits for auditability.
monotonic_sequence
Consumer-facing sequence for continuity and review.
Record alongside protected operations.
source_lineage
Observed path used to justify the governed output.
Use for incident review and evidence packaging.

Mode behavior

Mode
Meaning
Recommended application behavior
LIVE
Fresh upstream sync is available.
Proceed if safe_to_consume=true and the contract is valid.
DEGRADED
Timing condition is degraded but still governed.
Proceed only if policy allows degraded mode.
HOLDOVER
GAL-2 is preserving bounded continuity from last known good state.
Proceed only inside policy and validity limits.
REJOIN
Reference has returned and GAL-2 is reconciling under controlled semantics.
Proceed only if the contract allows. Log rejoin state and sequence.
FAIL_CLOSED
GAL-2 can no longer justify safe consumption.
Block, defer, or use an approved fallback. Do not silently use raw time.
WARMING
Daemon is not ready to serve governed production time.
Wait for valid contract or use a defined non-GAL-2 fallback.

Integration rule

GAL-2 protects consumers of the Time Contract. If an application reads raw system time through another side path and uses it for protected commits, that behavior is outside the GAL-2 protection boundary.

contract = get_time_contract()

if contract.safe_to_consume and current_time() <= contract.valid_until:
    commit_with_timestamp(contract.gal2_time)
else:
    block_or_defer_protected_operation(contract.mode, contract.reason)
The safest pilot pattern is to start with one protected workflow, log the full contract with every protected operation, and compare raw application behavior against GAL-2 contract behavior under the same impairment.

API and configuration boundary

Public endpoints are designed for contract consumption, observability, and integration. They do not expose protected correction logic, tuning parameters, private formulas, or authoritative backend decision mechanisms.

Primary local endpoint:
GET http://127.0.0.1:9095/contract

Common local checks:
GET http://127.0.0.1:9095/status
GET http://127.0.0.1:9095/health

On macOS RC3.1, the expected local configuration path is:

/usr/local/gal2/config/daemon.env

Laboratory and validation evidence

GAL-2 validation focuses on application-facing behavior: monotonicity for contract consumers, bounded holdover, controlled rejoin, fail-closed semantics, source lineage, and auditable evidence. Public evidence should not be read as a claim that GAL-2 replaces certified metrology references or improves upstream physical precision.

Real daemon impairment evidence shows GAL-2 transitioning through LIVE, HOLDOVER, DEGRADED, and FAIL_CLOSED under controlled upstream impairment, with safe_to_consume=false when safe consumption could no longer be justified. See Public Validation .

Current legacy continuity package

GAL-2 v0.08.1 Evidence Package

DOI: 10.5281/zenodo.19476083

Covers API-seeded authority, VM reboot recovery, sustained repeated GNU Make behavior, and tested discriminator paths including GNU Make i386 and BusyBox find.

Earlier coherence milestone

Y2038 Two-Node Coherence Bundle v0.55

DOI: 10.5281/zenodo.19390176

Focused on two-node coherence and legacy-style boundary behavior under tested conditions.

Live operation baseline

72h Three-Node Live-Operation Baseline

DOI: 10.5281/zenodo.19546807

Documents multi-node API-backed daemon behavior, monotonic observations, and a short upstream interruption handled through holdover and clean rejoin semantics.

Evidence is presented as application-facing continuity and contract behavior under defined conditions. It is not presented as a formal precision-superiority claim, nanosecond accuracy claim, or UTC traceability certification.

Performance and benchmarks

GAL-2 performance should be evaluated per deployment. Public benchmark summaries should avoid unsupported precision claims. Serious pilots should measure local daemon latency, contract-call p50 and p95, false-positive rate, holdover behavior, rejoin timeline, and raw application versus GAL-2-aware application behavior under the same impairment.

Metric
Purpose
Why it matters
Contract latency
Measures local daemon response time.
Answers enterprise runtime overhead questions.
Monotonicity
Checks whether gal2_time moves backward for contract consumers.
Protects ordering-sensitive workflows.
Holdover duration
Measures bounded continuity under upstream loss.
Validates policy-limited temporal lifeline behavior.
Rejoin timeline
Measures recovery after upstream reference returns.
Validates controlled recovery without raw time shock.
Fail-closed behavior
Checks whether unsafe consumption is blocked when policy can no longer justify output.
Prevents unsafe time from becoming committed state.
False-positive rate
Measures unnecessary degradation or fail-closed events during healthy conditions.
Protects operational usability.

Comparative analysis

GAL-2 operates in a different layer than traditional synchronization systems. UTC, GNSS, NTP, PTP, chrony, grandmasters, and atomic references help define, discipline, or distribute time. GAL-2 governs how applications consume time before it becomes state.

  • UTC and national timing references: provide civil and reference time, but do not define application consumption behavior during local failure, partition, stale reference, or recovery events.
  • GNSS: provides high-value timing reference, but can be degraded, jammed, spoofed, unavailable, or operationally unsuitable for direct application trust.
  • NTP and chrony: discipline system time, but do not provide application-facing validity, reason, lineage, holdover policy, controlled rejoin, or fail-closed semantics.
  • PTP and grandmasters: distribute precise time in controlled environments, but do not replace the need for application-boundary consumption governance.
  • GAL-2 Time Contract: provides governed gal2_time and contract semantics so protected applications can continue within policy, rejoin under control, or fail closed.

Real-world use cases

GAL-2 is designed for systems where time becomes state and unsafe timestamps can cause operational, financial, forensic, or distributed-system damage.

Distributed ledgers

Transaction ordering

Helps protect ordering-sensitive writes, reconciliation, and audit trails when raw time becomes unsafe.

GNSS-degraded environments

Bounded continuity

Provides governed behavior when external timing references are degraded, intermittent, unavailable, or recovering.

Edge and autonomous systems

Intermittent operation

Supports explicit contract states for nodes that may operate through isolation, reconnection, and local restart.

Audit and forensics

Runtime evidence

Logs mode, reason, validity, sequence, and lineage alongside protected operations for post-event review.

Cloud infrastructure

Application boundary

Complements existing timing stacks by governing consumption near the software commit path.

Legacy boundaries

Controlled evaluation

Can be evaluated for selected legacy time-boundary workflows without claiming universal Y2038 remediation.

Security

GAL-2 is designed to work with modern enterprise security practices and controlled deployment models. Production serving requires a valid API key. Public interfaces expose contract behavior while protected core logic remains server-side.

  • Transport security: deployments should use encrypted transport and standard secure networking practices.
  • Access control: API access is key-gated and should be integrated with controlled provisioning and rotation practices.
  • Integrity: evaluator releases should be distributed with hashes, signatures where available, and clear release scope.
  • Protected core: mathematical formulas, backend correction logic, private keys, and internal authority mechanisms are not shipped in public documentation.
  • Roadmap attestation: signed Time Contract responses should be described only when implemented and verified.

Standards and compliance boundary

GAL-2 is designed to operate alongside established timing and networking standards. It does not replace NTP, PTP, GNSS, UTC, chrony, atomic clocks, grandmasters, timing receivers, or national metrology references.

For regulated or critical environments, GAL-2 should be evaluated through controlled pilots, documented policies, evidence packages, and separate written agreements before any production-critical use.

Maintenance and versioning

GAL-2 releases should evolve through controlled versioning. Frozen releases should not be modified silently. Any change to schema, behavior, installer, package, signing, daemon semantics, or public contract fields should create a new release marker.

  • RC3.1: Limited Availability evaluator release for technical pilots, architecture review, and controlled non-production evaluation.
  • Future contract versions: may add stronger attestation, upstream signatures, local audit chain hashes, policy profiles, and expanded validation evidence.
  • Deployment policy: customers should define protected operations, false-positive tolerance, fail-closed behavior, and fallback rules before production decisions.

Glossary

  • GAL-2: Global Alignment Layer 2, the temporal governance architecture behind the Time Contract.
  • Fractal Time: GAL-2's conceptual foundation for governed temporal continuity and correction.
  • Time Contract: Runtime object that exposes governed time and consumption semantics to applications.
  • gal2_time: The governed timestamp applications consume through GAL-2.
  • safe_to_consume: Whether gal2_time is safe under current policy, mode, validity, and lineage.
  • HOLDOVER: Bounded continuity from last known good state when upstream reference is unavailable or degraded.
  • REJOIN: Controlled reconciliation when the upstream reference returns.
  • FAIL_CLOSED: State where GAL-2 can no longer justify safe consumption and protected operations should not proceed through the contract path.
  • Temporal Circuit Breaker: Commercial framing for GAL-2 as the layer that prevents unsafe time from silently becoming committed application state.