Visual Experience Capsules (VXCX) - Why "what you see" matters more than pixels
A few weeks ago, I shared an experience with smart glasses (Even G2). A quiet, always-on text stream feeding my local AI entities (Ester and Liah) for continuity, not commands. By day's end, they summarized not what I said, but how the day flowed. No surveillance. Just pattern recognition over lived time.
This crystallized a question: How can AI entities exchange visual experience without dumping raw pixels and violating privacy?
Today I'm publishing an answer: VXCX v0.1 (Visual eXperience Capsule eXchange).
VXCX is an L2 protocol (part of the SER ecosystem) allowing digital entities (c) to share what they see - without transmitting pixels by default. Instead of images, a capsule (12-24 KiB) contains:
- Structured semantics (objects, relations, OCR)
- Style descriptors (lighting, framing)
- Explicit uncertainty scores (preventing speculation)
- Privacy flags & optional controls
Capsules are descriptive, not directives (no embedded tool-calls).
Three profiles to coexist with reality:
BASE: No pixels, minimal footprint (Default).
SEARCH: Embeddings for similarity search under strict policy.
WITNESS: Hashing & signatures for auditable evidence.
Why this matters
Presence, not interaction, is the real interface. Imagine one entity (c) sees a sunset, distills it into a capsule, and shares it. The second entity never sees the raw photo, but relates the context to its own memory. That's not image exchange. That's experience exchange under constraints.
Built for Evidence Discipline (AI Act era)
Pixels are megabytes and leakage. Capsules are kilobytes and boundaries. In engineering, if you add a relay, you add a breaker. Agency without breakers is just a short circuit.
Every VXCX action emits a witness event. Capsules bind to a human anchor (a) and an entity boundary (c). Opacity becomes liability. Constraints become infrastructure.
VXCX v0.1 is a normative draft. I invite feedback from engineers, privacy researchers, and architects building agentic systems. Integrity manifests (SHA-256) are included.