MICKAI™ArticlesHereditas: when the AI knows the …
ArticlesFAQPatentsBrainsPress← Home
Article · 3 May 2026

Hereditas: when the AI knows the user has died, and the digital estate handover is cryptographically clean.

The 2026 problem nobody is talking about: when the user dies, the AI keeps running. Hereditas is the Mickai sub-component that handles post-mortem activation: voice-biometric deadman switch, multi-witness attestation, encrypted estate handover with clearance descent, and a signed transition ledger the executor can hand to a probate court without exposing the contents.

Author
Micky Irons
Published
3 May 2026
Sovereign AIHereditasDigital EstatePost-Mortem ActivationVoice Biometric

A reasonable estimate: by 2030 the average British adult will have between three and seven autonomous AI agents running on their behalf, with persistent memory, signed credentials, scheduled tool invocations, and ongoing relationships with downstream services. None of those agents has any procedure for the case where the user dies. None of them has a clean handover. None of them gives the executor of the estate any way to take possession without first proving they are the user, which they cannot, because they are not. The default behaviour is that the agents keep running until the cloud subscription lapses, the credit card on file fails, or the operator's operations team manually terminates a service. That is not a sovereign answer. It is a billing answer.

Hereditas is the Mickai sub-component that handles post-mortem activation cleanly. It is filed under the Mickai portfolio at the UK Intellectual Property Office (application UK00004373277, sole inventor Micky Irons). This article is the design.

The four problems

  • Detection. The system needs to know the user has died, with confidence sufficient to start an irreversible procedure. False positives are catastrophic; false negatives leave the estate in limbo.
  • Authentication of the executor. The estate handover has to reach a person who can prove (a) they are alive, (b) they are the legal executor, and (c) they hold the multi-witness attestation Hereditas requires. The system must not accept any single party's claim of executorship.
  • Clearance descent. The user's data has clearance levels (the personal stuff at clinical clearance, the family stuff at private clearance, the working stuff at professional clearance, the regulated stuff at higher clearances). Different parties inherit different ceilings. Clearance descent has to be enforceable post-mortem without leaking what was hidden.
  • Audit. The transition has to be a signed, hash-chained record the executor can hand to a probate court (or to HMRC for inheritance-tax purposes) that proves what was transferred, to whom, when, and under whose authority. Without exposing the contents.

Detection: the deadman switch

Hereditas runs a deadman switch keyed to user-presence signals. The signals are configurable, but the defaults are designed to fail safely: a voice biometric check the user passes naturally during ordinary daily Mickai use, a hardware-token presence check whenever the user authenticates a new tenant, and an out-of-band check-in cadence the user sets at first onboarding (weekly, monthly, quarterly). If the cadence lapses, Hereditas does not immediately escalate. It escalates through a series of staged checks: a notification to the user's primary device, a notification to a list of trusted contacts the user nominated at onboarding, a configurable wait window, and finally an attested-witness contact step.

The escalation is staged because the cost of a false positive is not symmetric. A user who is on a long sabbatical, in hospital and unable to authenticate, or temporarily without their hardware token, must not have their digital estate distributed under them. The stages are designed so that the user has multiple opportunities to refute the deadman trigger before any irreversible action occurs.

Authentication: multi-witness attestation

When the deadman trigger fires, Hereditas does not act on the executor's word. It requires a multi-witness attestation: at least two of the user's nominated witnesses (configured at onboarding, replaceable any time during the user's lifetime, never replaceable post-trigger) must independently attest, each through their own hardware-bound Mickai identity, that the user has died. Each witness's attestation is signed under their own Ed25519 key, recorded in the Hereditas ledger, and time-stamped. The witnesses cannot be the executor; the cryptographic separation is enforced at onboarding.

The executor's authentication is a separate step. The executor presents probate documentation (a death certificate scan, a grant of probate when issued, a letter of administration in intestacy) to a configurable verifier. The verifier can be a human (a solicitor the user nominated) or a process (the configured probate-attestation service for the user's jurisdiction; in the UK this defaults to a HM Courts & Tribunals Service grant-of-probate verification). The executor's authentication ties to a hardware-bound identity that was created at the moment of authentication; the executor does not inherit the user's identity, they inherit a structurally distinct successor identity that can be audited separately for everything they do post-handover.

Clearance descent

Different parties inherit different clearance ceilings. The user defines the descent at onboarding and can amend it at any time during life. A reasonable default for an individual user with a small estate: the spouse inherits a personal-clearance ceiling, the children inherit a family-clearance ceiling, the executor inherits a procedural-clearance ceiling sufficient to dispose of the estate but not the user's private correspondence. Anything above the inherited ceiling is encrypted, sealed, and cryptographically inaccessible to the descending party. The same Patent 05 mechanism that powers clearance-ceiling RAG (a query that lacks the right clearance returns the same response as a query for content that does not exist) governs clearance descent. The inheritor never sees that something was hidden, only that nothing was found at their ceiling.

For estates with non-standard descents (a family business, a professional practice with regulated client material, a research archive with specific institutional bequests), the user can define arbitrary clearance descent rules at onboarding. The rules are encrypted under the user's master key, attested at definition time, and only become operative when the deadman trigger has fired and multi-witness attestation has succeeded.

The transition ledger

Every step of the post-mortem transition is appended to a hash-chained ledger signed under the FIPS 204 ML-DSA-65 post-quantum signature primitive Mickai uses for every audit-relevant record (Patent 08). Every witness attestation, every executor authentication step, every clearance-descent decision, every encrypted bundle handed to each party, every revocation of the user's hardware-bound identities. The ledger is renderable as a court-ready PDF that contains the full audit trail without exposing the contents of the estate. A probate court (or HMRC) can verify the chain end to end and has cryptographic certainty about what happened, when, and under whose attestation, without any of the parties having to reveal the inherited material.

The court-ready render is structured: it leads with the deadman trigger evidence, then the witness attestation chain, then the executor authentication chain, then a clearance-descent diagram with each inheritor and their ceiling, then a per-inheritor handover record (timestamps, signed acknowledgements, revocation receipts). It does not contain a single byte of the inherited material. It contains the proofs that the material was handled correctly.

Why the user authorises this in life, and how the configuration evolves

Hereditas runs only if the user has explicitly turned it on, configured the deadman parameters, nominated witnesses, set the clearance descent, and accepted the operating posture. The configuration is amendable any time during life, with every amendment signed under the user's hardware-bound identity and recorded in a separate amendment ledger. The user can disable Hereditas entirely at any moment; disabling immediately voids any outstanding deadman state and requires re-onboarding to re-enable. Witnesses can be added or removed; clearance descent can be revised; executors can be replaced. The system is designed to be lived with for decades and configured incrementally as the user's life and estate change.

Why this matters for sovereign AI

Sovereign AI is not just about the operator's lifetime. It is about the operator's estate. A sovereign system whose post-mortem behaviour is 'keep running until the credit card lapses' is not sovereign in a way that survives the operator. Hereditas is the structural answer that makes Mickai's sovereignty inheritable. The same audit-ledger primitives, the same hardware-bound identity, the same clearance system, the same post-quantum signing, all of it composes into a digital-estate handover that is cryptographically clean, court-presentable, and survivable.

If sovereign AI is going to be the substrate of long-form personal computing for the next thirty years, this is the property the substrate has to have. Without it, the substrate fails the moment the operator does. Hereditas is the patent-protected answer.

Where this sits in Mickai

Mickai is the sovereign AI operating system. Twenty-one filed UK patent applications. Six hundred and seventy-five cryptographically signed claims. Sole inventor Micky Irons. Application reference UK00004373277. Hereditas is one of the cooperating sub-components, alongside the privacy router, the multi-brain arbiter, the clearance-ceiling RAG layer, the post-quantum signing primitives, the hardware-bound identity layer, and the runtime perimeter (Sentinel) that gates AI-agent action. Mickai is held privately by its founder; the engagement model is direct.

Sovereign means the architecture survives the operator. The deadman is staged. The witnesses are independent. The clearance descends. The court has the proofs without reading the contents.

Mickai manifesto

Sources

  • Mickai patent portfolio: mickai.co.uk/patents (21 filed UK patent applications, 675 signed claims, application UK00004373277). Hereditas is filed under the post-mortem activation patent block.
  • FIPS 204 (ML-DSA): NIST post-quantum digital signature standard.
  • HM Courts & Tribunals Service: grant of probate verification (default executor-authentication route for UK users).
  • Previous Mickai articles: mickai.co.uk/articles/the-2026-sovereign-ai-manifesto, mickai.co.uk/articles/twenty-one-uk-sovereign-ai-patents-collaboration-open.
Originally published at https://mickai.co.uk/articles/hereditas-when-the-ai-knows-the-user-has-died. If you operate in a regulated sector or want sovereign AI on your own hardware, the audit form on mickai.co.uk is the entry point.
More articles
3 May 2026
Federated fleet coordination. Why sovereign AI scales horizontally across departments without surrendering tenancy.
A single sovereign AI is a workstation. A fleet of cooperating sovereign AIs is the substrate of a Whitehall department, an NHS trust, a defence prime, or a county council. Mickai composes federated fleet coordination on top of the per-machine substrate so a hundred machines can share signed memory, replicate audit ledgers, and arbitrate decisions without any of them ceding tenancy or key custody to a central party. Filed under Patent 17.
3 May 2026
Pre-commit dry-run simulation. Why every action an AI coding agent takes should be simulated before it is committed.
AI coding agents already broke things in 2026. The fixes the industry shipped (better disclaimers, post-hoc rollback) are reactive. Pre-commit dry-run simulation is preventive: the agent's planned action runs against a sandboxed copy of the workspace, the simulator emits the diff, and only after a human or policy approval does the action commit to the real workspace. Mickai's primitive (Patent 13) composes this over every AI coding agent on the host. Sentinel does the runtime gating; Patent 13 does the simulation.
3 May 2026
ChatClone: when the AI voice on the phone is a deepfake, the attestation has to be the answer.
By Q4 2025 voice-deepfake fraud against UK SMEs alone passed eighty million pounds. The telecoms-side answer (improved caller ID) addresses the carrier; it does nothing about the audio. ChatClone is the Mickai voice-attestation primitive: every utterance from the user is signed in real time under a hardware-bound key that no other party can hold, and any party that wants to verify the voice is genuine queries the public verification surface in real time. Filed under Patent 09 of the Mickai portfolio.
3 May 2026
AudioSeal: a dual-layer watermark for AI-generated audio that survives codec, compression, and re-recording.
Single-layer audio watermarks die at the first codec re-encode. AudioSeal carries one perceptual-domain payload and one cryptographic-domain payload, both keyed, both designed to survive realistic broadcast, platform-upload, and re-recording transformations. Filed under Patent 11 of the Mickai portfolio. This is how it works, what it gives downstream verifiers, and why provenance is the only sustainable answer to the AI-audio surge.