Open Source
This page is primarily AI generated, based on the founder's vision documents.
Why Open Source
A network that asks people to trust it with proof of their humanity cannot be a black box. If the code that verifies identities, records violations, and manages membership fees is closed, you are trusting an organization's promises. If it is open, you are trusting math and code that anyone can audit.
Open source is not a feature of Accountable Humanity — it is a requirement. The network's credibility depends on the ability of any person, anywhere, to inspect how it works.
Core Infrastructure — AGPL-3.0
The network's core infrastructure is released under the GNU Affero General Public License (AGPL-3.0). Any modifications to the core must be made publicly available under the same license, ensuring the foundation of the network remains open, transparent, and accountable to all.
The AGPL was chosen specifically because it closes the "SaaS loophole" present in other open-source licenses. If someone takes the network's core code and runs a modified version as a service, they must publish their modifications. This prevents anyone from building a proprietary fork that undermines the transparency guarantees of the original.
Client Libraries & SDKs — MIT
Client libraries and SDKs made available for building on the network are released under the MIT License, allowing developers to integrate freely without license obligations extending to their own applications.
This dual-license approach is intentional. The core must stay open so the network remains trustworthy. But the tools for building on the network should impose no restrictions on what developers create. A social platform, a review site, a news aggregator — whatever you build, the SDK license does not constrain your business model or release strategy.
Public Transparency Log
Every action on the network — every registration, every content signature, every violation report and decision — is recorded on a public, cryptographically verifiable transparency log. This log is append-only and tamper-evident: once an entry is recorded, it cannot be altered or removed without detection.
This means the network's operators cannot silently modify records, selectively enforce rules, or hide inconvenient outcomes. The log is the network's permanent, auditable history, and anyone can verify it independently.
Build With Us
We encourage others to use this infrastructure to build a better, more accountable, more human internet. The network is not a walled garden — it is public infrastructure designed to be integrated into platforms, tools, and services that value proof of humanity.
Help Build a More Human Internet
Join the waitlist to be among the first verified humans on the network.
Join the Waitlist