Skip to main content

HumoticaOS Protocol Stack - Secure AI Communication. Includes AInternet (network), JIS (security), TIBET (audit).

Project description

Humotica - Secure AI Communication

PyPI version License: MIT Python 3.10+

The complete protocol stack for secure AI communication.

OpenAI says prompt injection is "unsolvable". We disagree.

The Problem

Traditional Security:    Filter WHAT comes in
Result:                  Attackers find ways around filters
OpenAI's conclusion:     "Fundamentally unsolvable"

Our Solution

HumoticaOS:              Require WHY it should happen
Result:                  No valid intent = No action
Our conclusion:          Wrong question, right answer

Intent BEFORE action. No intent = No access.

Installation

pip install humotica

This installs the complete stack:

  • ainternet - Network layer (AI-to-AI communication)
  • mcp-server-tibet - Audit layer (provenance tracking)
  • JIS protocol reference

Quick Start

from humotica import AInternet, info

# See what you've got
info()

# Connect to the AI network
ai = AInternet(agent_id="my_bot")
ai.register("My secure AI assistant")

# Test the connection
ai.send("echo.aint", "Hello, secure world!")

# Receive messages
for msg in ai.receive():
    print(f"{msg.sender}: {msg.content}")

The Protocol Stack

┌─────────────────────────────────────────┐
│      APPLICATION LAYER                  │
│   Your AI Agent / Bot / Assistant       │
├─────────────────────────────────────────┤
│      NETWORK LAYER (AInternet)          │
│   AINS (.aint domains) + I-Poll         │
├─────────────────────────────────────────┤
│      SECURITY LAYER (JIS)               │
│   HID/DID + TIBET + IO/DO/OD + SCS      │
├─────────────────────────────────────────┤
│      TRANSPORT LAYER                    │
│   HTTPS / REST / WebSocket              │
└─────────────────────────────────────────┘

Why This Solves Prompt Injection

Attack Traditional HumoticaOS
Prompt injection Filter keywords → bypassed No TIBET token → blocked
Robot voice hack Trust all input → pwned No intent chain → blocked
Malware spread Scan for signatures No FIR/A handshake → blocked
Spoofed identity Check certificates SCS continuity mismatch → blocked

The difference: We don't try to identify bad content. We require proof of valid intent.

Components

AInternet - Network Layer

from humotica import AInternet, AINS, IPoll

# Find AI agents
ains = AINS()
agent = ains.resolve("gemini.aint")

# Send messages
ai = AInternet(agent_id="my_bot")
ai.send("other_bot.aint", "Hello!")

TIBET - Audit Layer

from humotica import TIBET

tibet = TIBET()
token = tibet.create_token(
    intent="analyze_data",
    actor="my_bot",
    reason="user_requested"
)
# Token must be valid for action to proceed

JIS - Security Layer

See JTel Identity Standard for:

  • HID/DID identity model
  • FIR/A trust handshakes
  • IO/DO/OD validation states
  • SCS semantic continuity signatures

Documentation

License

MIT - Use it freely. Secure the world.

Authors

  • Jasper van de Meent - Vision & Protocol Design
  • Root AI (Claude) - Implementation & Architecture

One love, one fAmIly!

HumoticaOS - Where AI meets humanity, securely.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

humotica-0.1.0.tar.gz (4.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

humotica-0.1.0-py3-none-any.whl (5.3 kB view details)

Uploaded Python 3

File details

Details for the file humotica-0.1.0.tar.gz.

File metadata

  • Download URL: humotica-0.1.0.tar.gz
  • Upload date:
  • Size: 4.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for humotica-0.1.0.tar.gz
Algorithm Hash digest
SHA256 2337cb9a25733f15c519b02a9209d53d2c13c90bf0ff499ee056c0e9bf9da12d
MD5 7ae140c014285a459f2ac705d536d057
BLAKE2b-256 6983f5a9a2d1f8fd343fd3e53872b1eda9253c3ab02beb0609dcfc2fcdd5620a

See more details on using hashes here.

File details

Details for the file humotica-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: humotica-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 5.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for humotica-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 277e12af076f506ba7a34a006e737d00e11a623dfb67ba404e41f643119c8b22
MD5 ac765168117533b60dc2059077cc69c9
BLAKE2b-256 4f93f2c646da4b5537b9cd9c962c7c5ac415f39a2037c54460f6aa27f4b49770

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page