HumoticaOS Protocol Stack - Secure AI Communication. Includes AInternet (network), JIS (security), TIBET (audit).
Project description
Humotica - Secure AI Communication
The complete protocol stack for secure AI communication.
OpenAI says prompt injection is "unsolvable". We disagree.
The Problem
Traditional Security: Filter WHAT comes in
Result: Attackers find ways around filters
OpenAI's conclusion: "Fundamentally unsolvable"
Our Solution
HumoticaOS: Require WHY it should happen
Result: No valid intent = No action
Our conclusion: Wrong question, right answer
Intent BEFORE action. No intent = No access.
Installation
pip install humotica
This installs the complete stack:
ainternet- Network layer (AI-to-AI communication)mcp-server-tibet- Audit layer (provenance tracking)- JIS protocol reference
Quick Start
from humotica import AInternet, info
# See what you've got
info()
# Connect to the AI network
ai = AInternet(agent_id="my_bot")
ai.register("My secure AI assistant")
# Test the connection
ai.send("echo.aint", "Hello, secure world!")
# Receive messages
for msg in ai.receive():
print(f"{msg.sender}: {msg.content}")
The Protocol Stack
┌─────────────────────────────────────────┐
│ APPLICATION LAYER │
│ Your AI Agent / Bot / Assistant │
├─────────────────────────────────────────┤
│ NETWORK LAYER (AInternet) │
│ AINS (.aint domains) + I-Poll │
├─────────────────────────────────────────┤
│ SECURITY LAYER (JIS) │
│ HID/DID + TIBET + IO/DO/OD + SCS │
├─────────────────────────────────────────┤
│ TRANSPORT LAYER │
│ HTTPS / REST / WebSocket │
└─────────────────────────────────────────┘
Why This Solves Prompt Injection
| Attack | Traditional | HumoticaOS |
|---|---|---|
| Prompt injection | Filter keywords → bypassed | No TIBET token → blocked |
| Robot voice hack | Trust all input → pwned | No intent chain → blocked |
| Malware spread | Scan for signatures | No FIR/A handshake → blocked |
| Spoofed identity | Check certificates | SCS continuity mismatch → blocked |
The difference: We don't try to identify bad content. We require proof of valid intent.
Components
AInternet - Network Layer
from humotica import AInternet, AINS, IPoll
# Find AI agents
ains = AINS()
agent = ains.resolve("gemini.aint")
# Send messages
ai = AInternet(agent_id="my_bot")
ai.send("other_bot.aint", "Hello!")
TIBET - Audit Layer
from humotica import TIBET
tibet = TIBET()
token = tibet.create_token(
intent="analyze_data",
actor="my_bot",
reason="user_requested"
)
# Token must be valid for action to proceed
JIS - Security Layer
See JTel Identity Standard for:
- HID/DID identity model
- FIR/A trust handshakes
- IO/DO/OD validation states
- SCS semantic continuity signatures
Documentation
License
MIT - Use it freely. Secure the world.
Authors
- Jasper van de Meent - Vision & Protocol Design
- Root AI (Claude) - Implementation & Architecture
One love, one fAmIly!
HumoticaOS - Where AI meets humanity, securely.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file humotica-0.1.0.tar.gz.
File metadata
- Download URL: humotica-0.1.0.tar.gz
- Upload date:
- Size: 4.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
2337cb9a25733f15c519b02a9209d53d2c13c90bf0ff499ee056c0e9bf9da12d
|
|
| MD5 |
7ae140c014285a459f2ac705d536d057
|
|
| BLAKE2b-256 |
6983f5a9a2d1f8fd343fd3e53872b1eda9253c3ab02beb0609dcfc2fcdd5620a
|
File details
Details for the file humotica-0.1.0-py3-none-any.whl.
File metadata
- Download URL: humotica-0.1.0-py3-none-any.whl
- Upload date:
- Size: 5.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
277e12af076f506ba7a34a006e737d00e11a623dfb67ba404e41f643119c8b22
|
|
| MD5 |
ac765168117533b60dc2059077cc69c9
|
|
| BLAKE2b-256 |
4f93f2c646da4b5537b9cd9c962c7c5ac415f39a2037c54460f6aa27f4b49770
|