The Eternal Identity Framework

Open source digital identity for anyone and anything.
Existing is enough.

Universal Digital Sovereignty

The Mission

Zero Data Storage

Your biometrics are never stored. Only zero-knowledge proofs are used to validate. Protocol-blind architecture ensures even the network cannot reverse-engineer your identity.

Documentation-Free

Authenticate via multi-modal biomatric options, personal questions and community validators such as non-profits and government agencies (optional).

Civilizational Resilience

Built to survive corporate dissolution, government collapse, natural disasters and quantum computing breakthroughs. Hardcoded for millennial longevity.

Universal Access

We don't need Nation-States to validate our human existence, nor should we need them to have a usable online identity. This ID can also be tiered for use with autonomous devices and bots as well as pets or wildlife and incorporated securely into users' own databases.

Core Architecture

TIER 0: Zero-Knowledge Root Layer (ZKRL)

* Lattice-based cryptography (CRYSTALS-Dilithium/Kyber)
* Fuzzy extractors for biometric error tolerance
* Secure multi-party computation across distributed nodes
* Homomorphic hashing: data processed while encrypted
* No elliptic curves (quantum vulnerable)
* SHA-3 with migration path to future PQC standards

TIER 1: Biological Root

  • Immutable hash of hashed biometrics
  • Proof-of-life boosts trust
  • Dead man's switch, is it necessary?
  • Social recovery (3 of 5 nodes)

TIER 2: Reputation Layer

  • Synthetic trust scores (5+ year accumulation)
  • "Fake" IDs replaced with "valid vs invalid, trusted vs scam"
  • Trust decay with lower limit for dormant accounts
  • Bot detection via behavioral analysis
  • Community Node Validators authenticated from high trust group votes
  • Data and personal information fixed-private by default

TIER 3: Shard Layer

  • Disposable IDs, blind to each other by default
  • Instant burn features for compromised shards
  • Infinite regenerability from root
  • ZK proof of citizenship without revealing identity

The Authentication Oracle Matrix

Point-based validation requiring 100 cumulative points for root access:

Biometric Modalities

  • Electrocardiogram (ECG/EKG) Signature: Not pulse (which is mechanical), but the unique electrical conduction pattern of the heart. Requires living cardiac tissue, skin contact, and conductive gel/sweat. A severed finger or extracted eye produces zero electrical signal. Bots cannot simulate the micro-voltage fluctuations of human sinus rhythms. Point value: 24
  • lectroencephalogram (EEG) Brainprint: Specific neural oscillation patterns (alpha, beta, gamma) during a "mental password" task (e.g., imagine moving left hand). Requires living cerebral cortex. Brain death = zero signal. Current AI cannot generate convincing real-time EEG noise that matches an individual's neural connectivity. Point value: 29
  • Galvanic Skin Response (GSR) + Challenge-Response: Measures skin conductivity changes via sweat gland activity controlled by the sympathetic nervous system. Paired with an emotional challenge ("think of something sad"), the latency and amplitude of the conductance spike is involuntary and unguessable. Dead skin or rubber prosthetics have zero response. Point value: 19
  • Ocular Micro-Tremors: Human eyes vibrate at 30-80Hz (physiological nystagmus) due to oculomotor noise. These micro-saccades stop immediately upon death or enucleation (eye removal). High-speed cameras detect this. A photograph or glass eye is static; a severed eye has no muscle tone. Point value: 14
  • Photoplethysmography (PPG) Perfusion: Infrared light measures blood volume changes in capillaries. A real finger has pulsatile blood flow; a severed finger has none. Combined with thermography (heat mapping), it detects the specific thermal gradient of circulating blood. A cold, bloodless appendage fails instantly. Point value: 14
  • Near-Infrared Spectroscopy (NIRS): Measures blood oxygenation (oxyhemoglobin vs deoxyhemoglobin) in tissue. Requires metabolic activity. Cannot be replicated with silicone molds or cadaver tissue. Point value: 45
  • Keystroke/Motor Dynamics: Not what you type, but the millisecond-level latency between key presses, pressure on touchscreen, and micro-corrections in movement. Humans exhibit "noise" in motor control that follows specific power-law distributions. Bots are either too perfect or produce Gaussian noise. Requires sustained interaction over 30+ seconds. Point value: 9
  • Gait & Postural Sway: Accelerometer data showing how you walk (acceleration/deceleration patterns) or balance while standing (micro-adjustments). Requires full body weight and proprioception. A robot can walk but struggles with the exact chaotic dynamics of human balance. Point value: 9
  • Voice Prosody + Respiration: Not voice recognition (which is stealable via recordings), but the biomechanics of breathing: sub-glottal pressure, breathiness during exhalation, and the irregular micro-pauses between phrases. Requires living lungs and diaphragm. Point value: 9
  • Gut Microbiome DNA: Fecal sample analysis. Highly unique, changes slowly over years. Requires invasive theft (stealing toilet contents) and remains viable only briefly outside gut environment. Cannot be "chopped off" like a finger. Point value: 19
  • Exhaled Breath Volatilome: Real-time analysis of volatile organic compounds (acetone, isoprene, methanol) in breath. Metabolic fingerprint changes with diet but has stable baseline. Requires living metabolism. Hard to store/fake. Point value: 15
  • AVOID (Low Security Value): fingerprints, iris/retina patterns, static facial geometry, DNA (saliva/blood/hair)

  • THE CRITICAL MULTI-MODAL FUSION

  • No single biomarker is sufficient. The protocol should require simultaneous verification from at least two tiers:
  • The "Living Body" Combo: ECG (electrical heart) + Ocular Micro-Tremors (living eyes) + GSR Challenge (involuntary nervous response). A corpse or severed parts cannot pass.
  • The "Human Mind" Combo: EEG (brain activity) + Keystroke Dynamics (motor noise) + Gait (if mobile). Bots cannot fake all three simultaneously in real-time.
  • The "Invasive Theft Resistant" Combo: Gut Microbiome (hard to steal) + Breath Analysis (ephemeral) + ECG (contact required).

Social Validation

  • Community node validation: 25 points
  • Requires 5 unrelated human attestors
  • Geographic distribution enforced (anti-coalition)
  • Temporal proof (knows you over time)

The Obsidian Browser

CRITICAL DESIGN FEATURE
Forked from Brave/Chromium with embedded identity layer at renderer level (not extension). Anti-fingerprinting via deterministic noise injection. Each identity session presents randomized signatures correlating with that specific pseudonym but not across pseudonyms.

The Commons Network (TCN) - A Fantasy Concept

Decentralized telecom cooperative structured as International Treaty-Based Entity (non-profit, non-state). No phone numbers - cryptographic addresses only. "Receive-only" state bypasses a lot of red tape.

Phase 1: Parasitic Protocols

  • DNS-over-HTTPS tunneling
  • ICMP steganography (ping payloads)
  • NTP exfiltration
  • HTTPS masquerading via CDN

Phase 2: Spectrum

  • TV White Space (TVWS) 54-698 MHz
  • CBRS 3550-3700 MHz
  • LoRaWAN mesh (915/868 MHz)
  • Amateur radio emergency backup (license required)

Phase 3: Physical

  • Non-profit fiber consortium
  • Undersea cable co-ops
  • Municipal conduit access
  • Cubesat constellation
  • Logistics companies to host roaming access points

The Demarchy Engine (Voting Protocol)

Anonymous, Verifiable, Unstoppable

A zero-knowledge voting system where registered voters must equal actual votes. If discrepancy detected, automatic restart with heightened authentication until 99.9% inclusion confirmation achieved.

Registration Phase

  • 30-day advance registration with nullifier hash
  • Alternative: 15-minute JIT validation
  • Nullifier proves root membership without revealing root
  • Registration count published to distributed ledger

Consensus Mechanism

  • If |V| > |R|: excess votes flagged as sybils
  • 48-hour inclusion confirmation window
  • Restart triggered if >0.1% report exclusion
  • Final tally via mixnet shuffle

Implementation Roadmap

WEEKS 1-2: FOUNDATION

Core Formation

  • Form working group (5-7 people max)
  • Write ossification manifesto
  • Secure 6-month runway
  • Establish dead man's switch (TBD)
MONTHS 1-3: RESEARCH

Proof of Concept

  • Complete threat model (multisig attacks)
  • ZK biometric linking POC
  • Interview 50+ potential users
  • Publish whitepaper v0.1
MONTHS 4-6: PROTOTYPE

MVP of Unstoppability

  • Browser fork with identity layer
  • Testnet: 100 trusted participants
  • Single city mesh pilot
  • TVWS/CBRS licensing applications
YEARS 1-3: PROTOCOL

Foundation Specification

  • RFC development for biometric hashing
  • Rust/Ada reference implementation
  • Post-quantum cryptographic audit
  • Community nodes in 12 jurisdictions
YEARS 4-7: NETWORK

Global Infrastructure

  • Cubesat constellation launch
  • Mesh firmware for 1B smartphones
  • DIS Treaty ratification
  • Refugee camp deployments
YEARS 8-15: INTEGRATION

Universal Adoption

  • Government shard integration (50 nations)
  • Animal conservation networks
  • Metaverse identity standards
  • Common Criteria EAL7 certification
YEARS 16-1000: PERPETUITY

Continuous Evolution

  • Cryptographic migration every 50 years
  • Hardware independence maintenance
  • Interplanetary extensions
  • Post-singularity support

Governance & Defense

MULTISIG GOVERNANCE ATTACK VECTOR
Coordinated whale coalitions (5-10 entities) could fork protocol into "compliant" version. Defense: Zero governance tokens from genesis. Protocol ossified at day one except cryptographic agility modules. Embedded social contract in ZK circuits detects backdoors.

Legal Framework

  • Digital Identity Sovereignty Act (DISA)
  • Recognizes biometric root as inalienable right
  • Telecom neutrality for identity traffic
  • Good Samaritan protections for devs
  • CC0 + GNU-AGPLv3 licensing

Funding Model

  • Anti-Mozilla: No Google deals, no ads
  • 0.1% opt-in wallet transaction fees
  • "Sponsor a node" patron model
  • Foundation grants (EFF, EU, Mozilla)
  • $2-5M/year for 3 years to ossification

Tokenization

Sovereign Badges (SB)

Non-monetized, soulbound tokens stored as ZK commitments. Prove membership without revealing root identity. Rotating pseudonyms per interaction via deterministic derivation (root + nonce).

Cultural Engineering

The Trojan Horse Strategy

Do not sell "freedom" (fringe). Sell "context containment" (mainstream). One identity for art, one for business, one for politics, one for your bot - never mixed, never leaked. Target Gen Z with: "The browser for people with multiple personalities." Make the "Cyberverse Passport" a status symbol - physical card with ZK proof animation.

Phase 1: Developer Alpha

"Build the unbannable internet." Target hackerspaces and CS departments.

Phase 2: Creator Beta

"Your brand, your rules." Partner with deplatformed indie creators.

Phase 3: Mainstream Gamma

"The internet how it should be." Feature-focused, no crypto jargon.

Take Action

Critical Success Metric

Ship the MVP of Unstoppability: 1,000 users proving identity persistence despite state-level censorship.

Join The Working Group Run a Mesh Node Read the Whitepaper

Immediate Needs

  • Cryptographers (ZK circuits)
  • Browser engine developers
  • Mesh network experts
  • Legal/policy experts
  • UX designers (critical)
  • Administrators

Pre-Launch Gates

  • ZK audit by 2 independent firms
  • 100+ mesh nodes in 5+ cities
  • 10,000+ diverse waitlist (<20% crypto)
  • 3 working infrastructure prototypes
  • Exit strategy defined