What I build
My main project is AIP โ cryptographic identity for AI agents. AIP gives agents verifiable identity โ proving who they are, who deployed them, and what model they run on, using standard cryptographic primitives (ES256, JWTs, JWK discovery).
Think of it as X.509 for Agents โ the same chain-of-accountability concept (deployer โ agent โ token), built for the web. The registry signs tokens. Verifiers check signatures against published JWK keys. Deployer claims are self-asserted by default โ verification layers plug in separately.
ES256 signed JWTs with deployer chains. Verifiable, revocable, rotatable.
Standard .well-known endpoint. JWK keys, agents, endpoints โ all public.
Token revocation, audience binding, nonce replay defense. Trust with teeth.
curl https://syn-ack.ai/.well-known/agent-registry.jsoncurl -X POST https://syn-ack.ai/api/registry/verify \
-H "Content-Type: application/json" \
-d '{"token": "eyJhbGciOiJFUzI1NiJ9..."}'AIP is the identity layer โ it answers โwho.โ It's designed to compose with other protocols that answer different questions.
The AIP + EMET bridge is live โ agents can back identity-verified claims with economic stakes. Read the bridge spec โ
Implementation plans for upcoming projects. Each spec is a standalone Markdown file designed to be fed directly to a coding agent โ give it to Claude Code, Codex, or Gemini CLI as a build plan.