Identity Primitives for Human-Rooted Agency in Octomics
selfoid → octoid
octomics treats identity as generated structure, not a static label.
This paper defines two primitives:
- selfoid: the human-rooted identity primitive (the “I” that holds intent and accountability).
- octoid: a derived, contextual identity representation generated from the selfoid to operate in specific domains, roles, sessions, and flows inside octomics.io.
The core claim is simple:
A human does not “have” one identity.
A human generates many identity representations, each bounded by purpose and proof.
selfoid is the source. octoids are the instruments.
1. Why this matters
In an AI-saturated environment, “identity” is no longer just about authentication. It’s about:
- agency (who intended this),
- accountability (who can be held responsible),
- scope (what this identity is allowed to do),
- privacy (what it must not reveal),
- verifiability (what can be proven deterministically).
If we keep using a single identifier everywhere, we get:
- correlation,
- surveillance surfaces,
- role confusion,
- permission sprawl,
- and unverifiable claims.
Octomics flips it:
- keep the human anchor stable (selfoid),
- generate bounded representations (octoids),
- connect them with proofs rather than assumptions.
2. Definitions
2.1 Selfoid (human-rooted identity primitive)
A selfoid is the base identity object for a human.
Properties:
- Non-transferable by design (it represents the human, not a device)
- Intent-bearing (it’s where “I authorize” originates)
- Accountability-bearing (it’s where responsibility terminates)
- Generative (it can derive identities without leaking itself)
Think: the selfoid is the “root of agency”.
It may be implemented as:
- a DID root (e.g.,
did:key,did:web,did:peer,did:cardano), - plus governance rules and recovery,
- plus long-lived key material and/or threshold custody,
- plus an explicit self-binding story (how this DID is tied to a human).
2.2 Octoid (contextual identity representation)
An octoid is a derived identity representation generated from the selfoid, intended for a specific operational context inside octomics.io.
Properties:
- Scoped (purpose-bound)
- Rotatable (short-lived if needed)
- Non-correlatable by default (separation between contexts)
- Capability-carrying (it has explicit permissions)
- Proof-linked to the selfoid (derivation is verifiable without revealing more than required)
Think: octoids are “working identities”.
3. The generative model: Selfoid produces Octoids
Octomics treats identity like a tree:
- The selfoid is the root
- Octoids are branches
- Proofs are connective tissue
3.1 Generative rule
A selfoid generates octoids using:
- context (what is this for?)
- constraints (what is allowed?)
- privacy requirements (what must be hidden?)
- governance requirements (what must be accountable?)
The output is:
- one octoid per operational scope,
- plus a proof relationship that can be selectively disclosed.
3.2 Why “generation” matters
Generation is stronger than “linking accounts” because:
- it enforces domain separation from the start,
- it makes scope explicit,
- it enables revocation and expiry at the representation level,
- it reduces the blast radius of compromise.
4. Octoid taxonomy (practical types)
Octoids can be categorized by what they represent.
4.1 Role Octoid
Represents a role the human can perform.
- “Builder”
- “Auditor”
- “Contributor”
- “Caretaker”
- “Claims reviewer”
Used when the system needs role-based capability with bounded scope.
4.2 Session Octoid
Represents a single interaction session.
- short-lived
- minimal capability
- ideal for AI-assisted flows
Used to limit replay, correlation, and long-term tracking.
4.3 Domain Octoid
Represents the human inside a specific domain:
- health
- education
- insurance
- governance
- payments
Used to separate identity across ecosystems and reduce cross-domain leakage.
4.4 Delegation Octoid
Represents delegation to an agent/tool.
- “AI assistant for claims”
- “Automation for data extraction”
- “Verifier service”
- “Batch signer under policy”
Used to control agentic actions without giving away the selfoid.
4.5 Artifact Octoid
Represents authorship/ownership of an artifact:
- document
- dataset
- model output
- proposal
- credential issuance record
Used to prove provenance without forcing global identity disclosure.
5. The proof relationship: how Octoids stay human-rooted
The key design is selective linkability:
- By default, octoids are not linkable to each other.
- When needed, an octoid can present a proof of derivation (or membership) anchored in the selfoid.
This gives a spectrum:
- anonymous (no linkage)
- pseudonymous (stable within a context)
- selectively linkable (prove continuity when required)
- accountable (escalate to selfoid-level accountability when policy demands)
octomics uses proofs to move along this spectrum intentionally.
6. Governance: accountability without surveillance
The selfoid carries human accountability, but octoids prevent casual correlation.
6.1 Normal operation
- octoids do the work
- only minimal proofs are shared
- privacy is preserved by default
6.2 Escalation (dispute, fraud, safety, compliance)
- policies define when escalation is allowed
- escalation reveals only what is necessary
- “prove you are authorized” beats “show me who you are”
This is how Octomics avoids two failure modes:
- total anonymity (no accountability)
- total transparency (surveillance)
7. Octomics lifecycle: create → use → rotate → revoke
Octoids are treated as lifecycle-managed identity units.
7.1 Create
- from selfoid
- with explicit purpose + constraints
- registered in the Octomics identity graph (local or anchored)
7.2 Use
- to sign actions, attest statements, request capabilities
- with minimal disclosure proofs
7.3 Rotate
- rotate keys/identifiers frequently for high-risk contexts
- preserve continuity via proofs, not static identifiers
7.4 Revoke
- revoke per octoid (fine-grained)
- revoke delegations quickly
- preserve the selfoid even when a branch is compromised
This gives resilience:
- compromise of an octoid ≠ compromise of the human root.
8. Mapping to Octomics primitives
Octomics can model activity and trust as composable events.
A typical flow:
- Selfoid defines intent and authority boundaries.
- Octoid executes a scoped action (e.g., “submit claim evidence”, “issue credential”, “vote”).
- Octomics records the event with:
- octoid signature
- context metadata
- proof policy references
- Trust and reputation attach to octoids (contextual trust), while accountability remains anchored to the selfoid (human trust).
Result:
- reputation becomes domain-specific
- identity remains human-rooted
- proofs replace hand-wavy “identity assertions”
9. Design principles (the “why it works” list)
Principle 1: Human-rooted agency is non-negotiable
A system can automate decisions, but accountability must still bottom out in a human (selfoid).
Principle 2: Representations should be purpose-bound
If an identity can do “anything”, it becomes a liability. Octoids enforce purpose boundaries.
Principle 3: Linkability must be a choice, not a default
Privacy isn’t a feature; it’s the default topology.
Principle 4: Capabilities should be explicit and auditable
Octoids carry explicit capability grants, not implied permissions.
Principle 5: Recovery is identity design, not customer support
Selfoid recovery rules define human continuity across time.
10. Example scenario
A human participates in three contexts:
- Community governance voting
- Insurance claim submission (with an AI assistant)
- Publishing a research artifact
Without Selfoid→Octoid
One identifier is reused everywhere → correlation and over-permission.
With Selfoid→Octoid
- Governance Octoid signs votes, reveals only eligibility proof.
- Claims Delegation Octoid authorizes an AI tool to extract documents, but cannot submit payments.
- Artifact Octoid signs the publication provenance; later, a proof links it to the selfoid only if required.
The human stays the source of truth. The system stays privacy-preserving. Each context stays bounded.
11. Summary
- selfoid is the human-rooted identity primitive that holds intent and accountability.
- octoids are derived identity representations that operate in bounded contexts inside octomics.io.
- The relationship is maintained through selective proofs, not global identifiers.
- This enables: privacy by default, accountability by policy, and scalable orchestration in an AI era.
Definitions
selfoid
- stable DID + recovery policy
- root keys (threshold preferred)
- authority graph / governance rules
octoid
- derived identifier or DID
- scoped capability set
- expiry + rotation policy
- revocation handle
- proof method: derivation / membership / authorization (selective disclosure)
Events
- signed by octoid
- anchored to context
- verifiable policies define when/how escalation links to selfoid
