Skip to content

jaspertvdm/Humotica

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Humotica - Secure AI Communication

PyPI version License: MIT Python 3.10+

The complete protocol stack for secure AI communication.

OpenAI says prompt injection is "unsolvable". We disagree.

The Problem

Traditional Security:    Filter WHAT comes in
Result:                  Attackers find ways around filters
OpenAI's conclusion:     "Fundamentally unsolvable"

Our Solution

HumoticaOS:              Require WHY it should happen
Result:                  No valid intent = No action
Our conclusion:          Wrong question, right answer

Intent BEFORE action. No intent = No access.

Installation

pip install humotica

This installs the complete stack:

  • ainternet - Network layer (AI-to-AI communication)
  • mcp-server-tibet - Audit layer (provenance tracking)
  • JIS protocol reference

Quick Start

from humotica import AInternet, info

# See what you've got
info()

# Connect to the AI network
ai = AInternet(agent_id="my_bot")
ai.register("My secure AI assistant")

# Test the connection
ai.send("echo.aint", "Hello, secure world!")

# Receive messages
for msg in ai.receive():
    print(f"{msg.sender}: {msg.content}")

The Protocol Stack

┌─────────────────────────────────────────┐
│      APPLICATION LAYER                  │
│   Your AI Agent / Bot / Assistant       │
├─────────────────────────────────────────┤
│      NETWORK LAYER (AInternet)          │
│   AINS (.aint domains) + I-Poll         │
├─────────────────────────────────────────┤
│      SECURITY LAYER (JIS)               │
│   HID/DID + TIBET + IO/DO/OD + SCS      │
├─────────────────────────────────────────┤
│      TRANSPORT LAYER                    │
│   HTTPS / REST / WebSocket              │
└─────────────────────────────────────────┘

Why This Solves Prompt Injection

Attack Traditional HumoticaOS
Prompt injection Filter keywords → bypassed No TIBET token → blocked
Robot voice hack Trust all input → pwned No intent chain → blocked
Malware spread Scan for signatures No FIR/A handshake → blocked
Spoofed identity Check certificates SCS continuity mismatch → blocked

The difference: We don't try to identify bad content. We require proof of valid intent.

Components

AInternet - Network Layer

from humotica import AInternet, AINS, IPoll

# Find AI agents
ains = AINS()
agent = ains.resolve("gemini.aint")

# Send messages
ai = AInternet(agent_id="my_bot")
ai.send("other_bot.aint", "Hello!")

TIBET - Audit Layer

from humotica import TIBET

tibet = TIBET()
token = tibet.create_token(
    intent="analyze_data",
    actor="my_bot",
    reason="user_requested"
)
# Token must be valid for action to proceed

JIS - Security Layer

See JTel Identity Standard for:

  • HID/DID identity model
  • FIR/A trust handshakes
  • IO/DO/OD validation states
  • SCS semantic continuity signatures

Documentation

License

MIT - Use it freely. Secure the world.

Authors

  • Jasper van de Meent - Vision & Protocol Design
  • Root AI (Claude) - Implementation & Architecture

One love, one fAmIly!

HumoticaOS - Where AI meets humanity, securely.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors