Identity Primitives for Human-Rooted Agency in Octomics

selfoid → octoid

octomics treats identity as generated structure, not a static label.

This paper defines two primitives:

The core claim is simple:

A human does not “have” one identity.
A human generates many identity representations, each bounded by purpose and proof.

selfoid is the source. octoids are the instruments.

1. Why this matters

In an AI-saturated environment, “identity” is no longer just about authentication. It’s about:

If we keep using a single identifier everywhere, we get:

Octomics flips it:

2. Definitions

2.1 Selfoid (human-rooted identity primitive)

A selfoid is the base identity object for a human.

Properties:

Think: the selfoid is the “root of agency”.

It may be implemented as:

2.2 Octoid (contextual identity representation)

An octoid is a derived identity representation generated from the selfoid, intended for a specific operational context inside octomics.io.

Properties:

Think: octoids are “working identities”.

3. The generative model: Selfoid produces Octoids

Octomics treats identity like a tree:

3.1 Generative rule

A selfoid generates octoids using:

The output is:

3.2 Why “generation” matters

Generation is stronger than “linking accounts” because:

4. Octoid taxonomy (practical types)

Octoids can be categorized by what they represent.

4.1 Role Octoid

Represents a role the human can perform.

Used when the system needs role-based capability with bounded scope.

4.2 Session Octoid

Represents a single interaction session.

Used to limit replay, correlation, and long-term tracking.

4.3 Domain Octoid

Represents the human inside a specific domain:

Used to separate identity across ecosystems and reduce cross-domain leakage.

4.4 Delegation Octoid

Represents delegation to an agent/tool.

Used to control agentic actions without giving away the selfoid.

4.5 Artifact Octoid

Represents authorship/ownership of an artifact:

Used to prove provenance without forcing global identity disclosure.

5. The proof relationship: how Octoids stay human-rooted

The key design is selective linkability:

This gives a spectrum:

octomics uses proofs to move along this spectrum intentionally.

6. Governance: accountability without surveillance

The selfoid carries human accountability, but octoids prevent casual correlation.

6.1 Normal operation

6.2 Escalation (dispute, fraud, safety, compliance)

This is how Octomics avoids two failure modes:

7. Octomics lifecycle: create → use → rotate → revoke

Octoids are treated as lifecycle-managed identity units.

7.1 Create

7.2 Use

7.3 Rotate

7.4 Revoke

This gives resilience:

8. Mapping to Octomics primitives

Octomics can model activity and trust as composable events.

A typical flow:

  1. Selfoid defines intent and authority boundaries.
  2. Octoid executes a scoped action (e.g., “submit claim evidence”, “issue credential”, “vote”).
  3. Octomics records the event with:
    • octoid signature
    • context metadata
    • proof policy references
  4. Trust and reputation attach to octoids (contextual trust), while accountability remains anchored to the selfoid (human trust).

Result:


9. Design principles (the “why it works” list)

Principle 1: Human-rooted agency is non-negotiable

A system can automate decisions, but accountability must still bottom out in a human (selfoid).

Principle 2: Representations should be purpose-bound

If an identity can do “anything”, it becomes a liability. Octoids enforce purpose boundaries.

Principle 3: Linkability must be a choice, not a default

Privacy isn’t a feature; it’s the default topology.

Principle 4: Capabilities should be explicit and auditable

Octoids carry explicit capability grants, not implied permissions.

Principle 5: Recovery is identity design, not customer support

Selfoid recovery rules define human continuity across time.


10. Example scenario

A human participates in three contexts:

Without Selfoid→Octoid

One identifier is reused everywhere → correlation and over-permission.

With Selfoid→Octoid

The human stays the source of truth. The system stays privacy-preserving. Each context stays bounded.

11. Summary


Definitions

selfoid

octoid

Events