GAL-2™ Time Contract

Temporal Circuit Breaker for Production Systems

Application-facing temporal governance for production timing stacks. Your timing stack delivers time. GAL-2 governs whether applications should consume it.

Checking GAL-2 status…

Validation evidence

Real Daemon Impairment Test v0.1

A controlled upstream impairment test using the installed GAL-2 local daemon and the real application-facing Time Contract endpoint.

Result: PASS
Phase order Baseline LIVE → Upstream impairment → Recovery
Modes observed LIVE · HOLDOVER · DEGRADED · FAIL_CLOSED
Mode distribution 36 LIVE · 9 HOLDOVER · 20 DEGRADED · 7 FAIL_CLOSED
Records 72 contract snapshots
Fail-closed samples 7 safe_to_consume=false records
Backward steps 0 monotonic_sequence · 0 gal2_time steps
Secret scan PASS · 0 findings
Claim type Application-facing Time Contract impairment evidence

When upstream access was impaired, GAL-2 did not fail silently. The daemon exposed explicit Time Contract states including HOLDOVER, DEGRADED, and FAIL_CLOSED. When safe consumption could no longer be justified, safe_to_consume became false.

Zenodo DOI 10.5281/zenodo.20213086
Public-safe package SHA256 85db223e2f4273777f371f5ad5d25187e318c06e1f91e24781aae4bac62fa14e
Claim boundary: application-facing Time Contract impairment evidence. Not a metrology accuracy test. Not a UTC replacement claim. Not a nanosecond or microsecond precision claim.
APPLICATION-FACING TIME VALIDATION

API-Backed Contract Source Isolation

A general-purpose Mac client consumed a local SNTP feed derived from the current GAL-2 Time Contract and backed by the live GAL-2 API.

60m
SUSTAINED MONITOR
61/61
CLIENT SAMPLES
79/79
SAFE RESPONSES
PASS
ADOPTION RESULT

In this controlled two-Mac demonstration, Mac A ran the current GAL-2 daemon and exposed a local SNTP-compatible bridge derived from the GAL-2 Time Contract. Mac B was configured to use Mac A as its macOS Network Time Server.

This version extends the earlier source-isolation evidence by replacing the prior local protected core path with the current live API-backed Time Contract path.

Tested Chain GAL-2 API → GAL-2 daemon → Time Contract → Mac A SNTP Bridge → Mac B Network Time
Mac A Bridge 192.168.6.143
Mac B Client 192.168.6.243
Source Lineage gal2_api → gal2_daemon → contract_v1
Mac B Monitor 61 samples, PASS
Bridge Responses 79 SNTP responses
Modes Observed LIVE, REJOIN
Monotonic Sequence 30284 to 30362
Master Archive SHA256 ce63a8e26d38e61ef8d0d1d7e5d101631087f59fb80537fb42e568fcca169f85

Evidence Boundary

This test supports 60-minute operational source isolation and contract-gated local time consumption using the current GAL-2 Time Contract and live GAL-2 API path. It does not claim physical oscillator control, metrological replacement of UTC, UTC traceability certification, universal production readiness, or clock accuracy superiority.

Previous source-isolation evidence used an earlier local protected core path. This version documents the current API-backed Time Contract path.

Application-Facing Time Safety

Red Light Test v3

Raw time keeps going. GAL-2 knows when to stop. The Red Light Test demonstrates how GAL-2 helps applications decide whether time is safe to consume before it becomes committed system state.

20 Raw commits
6 Raw unsafe commits
6 GAL-2 blocked unsafe operations
0 GAL-2 unsafe commits

This test measures application-facing temporal safety behavior, not clock accuracy. It is evaluator-stage technical evidence and should be interpreted within its stated scope.

Historic API correction record

Visual Proof: GAL-2™ Produced a Corrected Timestamp

Early technical evidence from the original GAL-2 API validation path.

On July 28, 2025, GAL-2™ was tested through its API correction pathway using an externally supplied UNIX timestamp. The system returned a governed correction output in real time: gal2_corrected: 1722283734.

This record represents an early proof of GAL-2's correction behavior: a submitted timestamp entered the API path, and GAL-2 produced a corrected output rather than simply echoing raw time.

Submitted timestamp 1722283745
GAL-2 output 1722283734
Observed correction -11 seconds
Claim boundary: this is a historic API correction record. It is not a metrology certification, not a UTC replacement claim, not an NTP replacement claim, and not a nanosecond or microsecond precision claim. Current validation evidence is documented below through the GAL-2 Time Contract and Real Daemon Impairment Test.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Compared to standard NTP, GAL-2™ compresses offsets and increases stability across servers worldwide.

demonstrating application-facing temporal safety behavior under declared policy, while complementing existing timing infrastructure.

GAL-2™ — Proof of Integrity (Public Hashes)

All GAL-2™ evidences and manifests are uploaded to AWS S3 with Object Lock (COMPLIANCE).
Below we publish corresponding hashes and VersionIds for public verification:

September 29, 2025

File: verify_20250929T203008Z.txt
sha512_real: 8b262ed2970a5afc7d041181be581c4c304eb2c1aa7bd6fbe6e47b6f6e4cd79829c0848e0861da679402756fe5a3ad16c6c4b6647791f246b769e8d7c0cd50a4
VersionId: DeSp8N0Gal8gvXJrafguMiBbgl7J9nyR

File: gal2_nopano_manifest_20250929.json
sha512_log: 43c99d07810f76ff4fff79b3035fd710639067fda5362c9fa1e2a2cc48abdbb4d3aef5ee60fa4a894c2eaff6419309ea
VersionId: aSmv9u3z_QciikmHVZ68fQuBvd9mguiu
  

September 30, 2025

File: verify_20250930T151405Z.txt
sha512_real: a48467f3bbd8968953614080eb0330333962a987704de1c2fbe75779d60b4e79b0f3ca6df732aad5610a9c6bf88bc005
VersionId: y0A0_spIptQtdTgGyrS.3JKOy.5Wccpx

File: gal2_manifest_2025-09-30_151423Z.json
sha512: f6ad0ccfb8c8cffb8166e4d59a8d878f
VersionId: CFShof.AOaRnU_fdtiFoQJ1GShOTfy3Z
  

Verification:
Anyone can verify these files by downloading the manifest/evidence and running:
sha512sum <file>
Compare the result to the hash published here.

The full 7-day GNSS-denied dataset is publicly archived on Zenodo for independent review and replication.
https://doi.org/10.5281/zenodo.18018704
Dataset content is immutable and independently hosted.

10.5281/zenodo.18018704


Local Daemon Continuity Pack-Monotonic application-facing continuity observed across restart, holdover, and rejoin conditions

On 2026-04-21, GAL-2 local daemon tests on macOS showed 0 backward steps across sequential reads, concurrent reads, forced daemon restarts, and induced upstream-loss holdover testing. The daemon remained continuously available through holdover and returned to live mode without temporal rollback.Highlights5,000 sequential reads, 0 backward steps
10,000 parallel reads, 0 backward steps
5 forced daemon restarts, 0 backward steps
300/300 successful holdover test responses
600/600 successful 10-minute daemon probe responsesDOIDOI: 10.5281/zenodo.19684054IntegritySHA-256: 0eb2fcb347e3025443aaa224340c45d0e179a666fe41ae70cc98ac0b58a3c142Honest noteThis package supports continuity and resilience claims.

10.5281/zenodo.19684054


72h steady-state result: GAL-2 to UTC relation stable within 1 μs per node.
Observed GAL-2 to UTC relation remained stable within 1 μs per node in a 72-hour multi-node run.
In the 72-hour steady-state dataset, the observed GAL-2 to UTC relation remained stable within 1 μs per node while preserving a node-specific constant offset. This is presented as a steady-state stability result, not as a public claim of universal 1 microsecond absolute accuracy.

Honest noteInterpretation: this result supports steady-state stability of the observable GAL-2 to UTC relation.

10.5281/zenodo.19546807


Post-2038 continuity for legacy binaries

Legacy 32-bit execution paths kept operational beyond the raw Y2038 boundary.
This evidence package documents GAL-2 behavior in legacy post-2038 scenarios using API-seeded temporal continuity. It supports the claim that legacy 32-bit execution paths can continue operating correctly on post-2038 timestamps in cases where raw execution paths fail.

Honest noteInterpretation: this package is presented as evidence of legacy survivability and continuity for real binary execution paths. It is not presented as a universal claim for every legacy binary or every operating environment.

10.5281/zenodo.19476083


Strict ordering preserved under leap-second-like discontinuities

GAL-2 preserved a strictly increasing consumer path across 27 historical events under controlled authority-side raw_stepand backward_jump injection, with 54/54 passing runs, 0 backward steps, 0 duplicate steps, and 0 errors. Independent observation confirmed the same result. In separate production testing, the real GAL-2 API remained strictly increasing across 2000 direct polls with 0 backward steps, 0 duplicate steps, and 0 request errors.
Evidence: https://doi.org/10.5281/zenodo.19687840
Scope: Controlled architectural evidence plus real production API strict-ordering probe.

10.5281/zenodo.19687840