Mickai Substrate
Open Audit Record™
Open Audit Record (OAR) is the substrate of the Mickai SIOS. Every agent action, tool invocation, retrieval and decision is signed under your operator-controlled ML-DSA-65 key, hash-chained into an append-only ledger, and verifiable in any modern browser without a server round trip. Patent GB2610413.3, twenty claims. Mickai is downloadable at mickai.co.uk/download and runs on Windows, Linux, or macOS.
View capabilitiesThe Mickai SIOS
Mickai is a Sovereign Intelligence Operating System (SIOS). It runs entirely on your own hardware, on Windows, Linux, or macOS. No cloud, no telemetry. This page describes one subsystem of the Mickai SIOS. Download Mickai at mickai.co.uk/download.
The substrate of the Mickai SIOS. Every agent action is signed under your operator-controlled ML-DSA-65 key, hash-chained, and verifiable in any modern browser without trusting Mickai. Patent GB2610413.3, twenty claims.
Trust without trusting Mickai.
What OAR does
Seven primitives that turn an audit ledger into a substrate. Each one is wired into the same Mickai chain so any third party can verify a Mickai run without a Mickai server.
01 / Substrate
Hash-chained append-only ledger
Every entry carries the previous entry's hash. The chain is monotonic, append-only, and tamper-evident on read. A single byte flipped anywhere in the history breaks the chain at that point and downstream. The verifier reports the first failure index and why.
02 / Signature
FIPS 204 ML-DSA-65 signing
The post-quantum signature is detached and per-entry. The signing primitive is FIPS 204 ML-DSA-65 (NIST module-lattice DSA, 1,952-byte public key, 4,032-byte secret key, 3,309-byte signature). The implementation is the audited @noble/post-quantum library on the web side and dilithium-py on the Python services.
03 / Operator key
Operator-controlled key custody
The operator generates a keypair on first boot. The secret key never leaves the host. The public key is published at /.well-known/mickai-operator-key.json so any third party can verify a chain without contacting Mickai.
04 / Verifier
Browser-resident offline verifier
Drag a Mickai OAR chain file into mickai.co.uk/audit-verifier. Hash linkage and ML-DSA-65 signatures are verified entirely in the browser using Web Crypto and noble post-quantum. After the public key has loaded, the verifier never touches the network. A self-check counter flags any leak.
05 / Tamper detection
Single-byte flip caught
Independent test corpus carries an intact chain, a tampered chain (one byte mutated in entry two of six), and a mixed v1+v2 chain. The verifier reports six-of-six clean, two-onwards failure on the tampered chain, and structural-only on the legacy entry. Every claim above is reproducible from public artefacts.
06 / Lineage
Decision-lineage attestation
Each decision references the inputs and prior signed decisions that informed it. A regulator, a client or your future self can walk the lineage from any output back to the originating prompt. The roadmap extends the lineage walk to a signed DAG with branch and merge semantics for multi-agent runs.
07 / Per-actuator
Signed physical actions
OAR is the substrate for embodied AI. Every actuator command on a robot, drone, or industrial cell carries a per-actuator signature anchored to the same operator key. A regulator can replay the chain and confirm what moved, when, under whose authority.
Patent anchors
OAR sits on four of the 31 filed UK patent applications behind the Mickai SIOS. The primary anchor is GB2610413.3 with twenty claims; the related patents extend the substrate into vendor-neutral schemas, the browser verifier, and per-actuator signing for embodied AI.
- 16Decision Lineage and PQ-Signed Audit Ledger, twenty claims, GB2610413.3 anchor for the OAR substrate.
- 22Open Inter-Vendor Audit Record Format, vendor-neutral schema so any conformant verifier consumes any conformant chain.
- 23Browser-Resident Offline Post-Quantum Verifier, Wasm-compiled ML-DSA verifier with a no-network invariant.
- 25Per-Actuator Cryptographic Signing of Physical Actions, OAR extended into the physical layer.
UK00004373277 · 31 filed UK patent applications · 914 claims
Wired with
- FIPS 204 ML-DSA-65 (NIST module-lattice DSA)
- Operator-controlled keypair on the host
- Append-only hash-chained ledger (SHA-256)
- Browser-resident verifier (Web Crypto + @noble/post-quantum)
- Public-key descriptor at /.well-known/mickai-operator-key.json
- Per-entry detached signature (3,309 bytes)
- Reproducible tamper-detection corpus
- 100 percent on-device; no Mickai trust required to verify
Verify a Mickai audit chain offline.
Drag a Mickai OAR chain file into the offline verifier. Hash linkage and FIPS 204 ML-DSA-65 signatures are checked in your own browser. Once the operator public key has loaded, the verifier does not touch the network. Mickai itself is downloadable at mickai.co.uk/download and runs on Windows, Linux, or macOS.
Engineered by Micky Irons in Cumbria, United Kingdom · @mickyirons