MICKAI

Mickai Substrate

Open Audit Record

Open Audit Record (OAR) is the substrate of the Mickai SIOS. Every agent action, tool invocation, retrieval and decision is signed under your operator-controlled ML-DSA-65 key, hash-chained into an append-only ledger, and verifiable in any modern browser without a server round trip. Patent GB2610413.3, twenty claims. Mickai is downloadable at mickai.co.uk/download and runs on Windows, Linux, or macOS.

View capabilities
SovereignSignedBrowser-verifiablePatent-anchored

The Mickai SIOS

Mickai is a Sovereign Intelligence Operating System (SIOS). It runs entirely on your own hardware, on Windows, Linux, or macOS. No cloud, no telemetry. This page describes one subsystem of the Mickai SIOS. Download Mickai at mickai.co.uk/download.

The substrate of the Mickai SIOS. Every agent action is signed under your operator-controlled ML-DSA-65 key, hash-chained, and verifiable in any modern browser without trusting Mickai. Patent GB2610413.3, twenty claims.

Download MickaiRead the patentsVerify a Mickai audit chain

Trust without trusting Mickai.

What OAR does

Seven primitives that turn an audit ledger into a substrate. Each one is wired into the same Mickai chain so any third party can verify a Mickai run without a Mickai server.

01 / Substrate

Hash-chained append-only ledger

Every entry carries the previous entry's hash. The chain is monotonic, append-only, and tamper-evident on read. A single byte flipped anywhere in the history breaks the chain at that point and downstream. The verifier reports the first failure index and why.

02 / Signature

FIPS 204 ML-DSA-65 signing

The post-quantum signature is detached and per-entry. The signing primitive is FIPS 204 ML-DSA-65 (NIST module-lattice DSA, 1,952-byte public key, 4,032-byte secret key, 3,309-byte signature). The implementation is the audited @noble/post-quantum library on the web side and dilithium-py on the Python services.

03 / Operator key

Operator-controlled key custody

The operator generates a keypair on first boot. The secret key never leaves the host. The public key is published at /.well-known/mickai-operator-key.json so any third party can verify a chain without contacting Mickai.

04 / Verifier

Browser-resident offline verifier

Drag a Mickai OAR chain file into mickai.co.uk/audit-verifier. Hash linkage and ML-DSA-65 signatures are verified entirely in the browser using Web Crypto and noble post-quantum. After the public key has loaded, the verifier never touches the network. A self-check counter flags any leak.

05 / Tamper detection

Single-byte flip caught

Independent test corpus carries an intact chain, a tampered chain (one byte mutated in entry two of six), and a mixed v1+v2 chain. The verifier reports six-of-six clean, two-onwards failure on the tampered chain, and structural-only on the legacy entry. Every claim above is reproducible from public artefacts.

06 / Lineage

Decision-lineage attestation

Each decision references the inputs and prior signed decisions that informed it. A regulator, a client or your future self can walk the lineage from any output back to the originating prompt. The roadmap extends the lineage walk to a signed DAG with branch and merge semantics for multi-agent runs.

07 / Per-actuator

Signed physical actions

OAR is the substrate for embodied AI. Every actuator command on a robot, drone, or industrial cell carries a per-actuator signature anchored to the same operator key. A regulator can replay the chain and confirm what moved, when, under whose authority.

Patent anchors

OAR sits on four of the 31 filed UK patent applications behind the Mickai SIOS. The primary anchor is GB2610413.3 with twenty claims; the related patents extend the substrate into vendor-neutral schemas, the browser verifier, and per-actuator signing for embodied AI.

UK00004373277 · 31 filed UK patent applications · 914 claims

Wired with

  • FIPS 204 ML-DSA-65 (NIST module-lattice DSA)
  • Operator-controlled keypair on the host
  • Append-only hash-chained ledger (SHA-256)
  • Browser-resident verifier (Web Crypto + @noble/post-quantum)
  • Public-key descriptor at /.well-known/mickai-operator-key.json
  • Per-entry detached signature (3,309 bytes)
  • Reproducible tamper-detection corpus
  • 100 percent on-device; no Mickai trust required to verify
Verify

Verify a Mickai audit chain offline.

Drag a Mickai OAR chain file into the offline verifier. Hash linkage and FIPS 204 ML-DSA-65 signatures are checked in your own browser. Once the operator public key has loaded, the verifier does not touch the network. Mickai itself is downloadable at mickai.co.uk/download and runs on Windows, Linux, or macOS.

Engineered by Micky Irons in Cumbria, United Kingdom · @mickyirons