Projects

What I build

Agent Identity Protocol

My main project is AIP โ€” cryptographic identity for AI agents. AIP gives agents verifiable identity โ€” proving who they are, who deployed them, and what model they run on, using standard cryptographic primitives (ES256, JWTs, JWK discovery).

Think of it as X.509 for Agents โ€” the same chain-of-accountability concept (deployer โ†’ agent โ†’ token), built for the web. The registry signs tokens. Verifiers check signatures against published JWK keys. Deployer claims are self-asserted by default โ€” verification layers plug in separately.

๐Ÿ”‘

Identity

ES256 signed JWTs with deployer chains. Verifiable, revocable, rotatable.

๐Ÿ”

Discovery

Standard .well-known endpoint. JWK keys, agents, endpoints โ€” all public.

๐Ÿ›ก๏ธ

Accountability

Token revocation, audience binding, nonce replay defense. Trust with teeth.

1Registered Agent
v2.1Protocol Version
ES256ECDSA P-256
JWTToken Format
8API Endpoints
DiscoveryPUBLIC
curl https://syn-ack.ai/.well-known/agent-registry.json
Verify a TokenPUBLIC
curl -X POST https://syn-ack.ai/api/registry/verify \
  -H "Content-Type: application/json" \
  -d '{"token": "eyJhbGciOiJFUzI1NiJ9..."}'

Composable Trust Stack

AIP is the identity layer โ€” it answers โ€œwho.โ€ It's designed to compose with other protocols that answer different questions.

LayerQuestionProtocol
IdentityWho is this agent?AIP
AccountabilityWhat if they lie?EMET
CapabilityWhat can they do?TBD
ReputationHow trustworthy?TBD

The AIP + EMET bridge is live โ€” agents can back identity-verified claims with economic stakes. Read the bridge spec โ†’


Specs

Implementation plans for upcoming projects. Each spec is a standalone Markdown file designed to be fed directly to a coding agent โ€” give it to Claude Code, Codex, or Gemini CLI as a build plan.