Sovereign Architecture

Sovereign

A local-first architecture for creator intellectual property protection. Cryptographic identity, artifact lineage, and verifiable authorship proof — without the cloud.

All systems local
$ init integrity-engine model loaded (1.3GB) ✓ $ connect vault.db sqlite connected ✓ provenance log: append-only ✓ $ mount watchers 2 roots found ✓ file watchers engaged ✓ $ init bitnet-oracle 8 artifacts indexed ✓ fingerprint cache loaded ✓ anomaly detector ready ✓ ■ ■ ■ $ init integrity-engine model loaded (1.3GB) ✓ $ connect vault.db sqlite connected ✓ provenance log: append-only ✓ $ mount watchers 2 roots found ✓ file watchers engaged ✓ $ init bitnet-oracle 8 artifacts indexed ✓ fingerprint cache loaded ✓ anomaly detector ready ✓ ■ ■ ■
Seven stages. Zero cloud.

Every artifact passes through a deterministic pipeline that generates identity, records lineage, and preserves evidence — entirely on your machine.

01 — INTAKE

Artifact Ingestion

Digital file enters the system through the vault watcher or manual import.

02 — INTEGRITY

Custodian Engine

File validation, format detection, and integrity baseline established.

03 — IDENTITY

SHA-256 Fingerprint

Deterministic cryptographic hash. Identical input always produces identical output.

04 — LOGGING

Provenance Record

Append-only event log. Every action recorded. Nothing overwritten.

05 — STORAGE

Vault Archive

Immutable .vee1 archive preserves each version without altering prior states.

06 — ANALYSIS

Gatekeeper Engine

Local AI scans for similarity and anomalies across the creator's corpus.

07 — EXPORT

Proof Bundle

Portable verification package anyone can independently confirm.

Two engines. Separate concerns.

Integrity verification and AI analysis are deliberately separated — cryptographic proof never depends on model availability.

Custodian

Online
$ init integrity-engine
loading model bitnet-1b-q4...
model loaded (1.3GB) ✓
$ connect vault.db
sqlite connected ✓
provenance log: append-only ✓
$ mount watchers
scanning vault roots...
2 roots found ✓
file watchers engaged ✓
integrity engine ready

Gatekeeper

Online
$ init bitnet-oracle
loading model bitnet-1b-q4...
model loaded (1.3GB) ✓
$ build corpus index
indexing vault artifacts...
8 artifacts indexed ✓
$ init similarity engine
fingerprint cache loaded ✓
anomaly detector ready ✓
analysis oracle ready
Four layers of proof. Any one is enough.

Redundant authorship evidence. Each layer independently supports a claim — together they're comprehensive.

01

Embedded Watermark

Authorship metadata written directly inside the artifact file (ID3 for audio, EXIF for images)

02

Cryptographic Fingerprint

Deterministic SHA-256 identity — independently verifiable by anyone

03

Append-Only Provenance Log

Immutable timeline of every event from creation through all modifications

04

Portable Proof Bundle

Self-contained verification package for independent third-party confirmation

One bundle. Complete proof.

Everything a third party needs to independently verify authorship — no access to the original system required.

proof_bundle/
artifact_fileoriginal digital artifact
#sha256_fingerprint.txtcryptographic identity hash
{provenance_export.jsonmachine-readable provenance
provenance_report.pdfhuman-readable chain-of-custody
Built for any machine.
0
Cloud dependencies
0
GPU required
Tauri v2
Rust + React
SQLite
Local single-file DB
Public Record

The Sovereign architecture is documented through a defensive publication and public repository.

Sovereign is a research architecture exploring creator-side authorship verification through cryptographic identity, provenance tracking, and local AI analysis. A project by anti-anti.