Skip to content
@LogLine-Foundation

LogLine Foundation

Verifiable, privacy-first intelligence — The LogLine Protocol & JSON✯Atomic ecosystem

MSRV no_std MIT

LogLine Foundation

Verifiable, privacy-first intelligence — dados e ações que se provam sozinhos.

logline-core on crates.io logline-core docs   •   json_atomic on crates.io json_atomic docs


LogLine Foundation

Infrastructure for Post-Automation Economics
Where humans, organizations, and AI agents operate as economic peers.


🎯 Vision

LogLine is building the foundational infrastructure for an economy where:

  • Humans, organizations, and AI agents are equivalent economic entities
  • Every action becomes an immutable, auditable, tradeable record
  • Trust is cryptographically enforced, not merely assumed
  • Trajectories (behavioral histories) are first-class economic primitives

We're not building yet another AI tool. We're building the economic operating system for the post-automation era.


🏗️ Core Architecture

Three Fundamental Layers

1. TDLN (Truth-Determining Language Network)

"Chip as Code" — Semantic operations as deterministic circuits

  • Treats natural language and DSLs as deterministic boolean circuits
  • Computes truth values and economic values simultaneously
  • Provides cryptographic proofs for every translation step
  • Enables verifiable AI reasoning with audit trails

Key Crates: tdin-brain, tdin-compiler, tdin-ast, tdin-proof, tdin-gate

2. UBL (Universal Business Ledger)

"The Ledger IS the Application" — Immutable truth layer

  • Append-only architecture with cryptographic integrity
  • Every entity (human, org, AI) has a DID-based identity
  • Proof-of-Participation (PoP) for authenticated actions
  • JSON+Atomic canonicalization with BLAKE3 content-addressing
  • Policy-gated operations with auditable enforcement

Key Crates: ubl-ledger, ubl-auth, ubl-id, ubl-crypto, ubl-codec, ubl-directory

3. Chips & Capabilities

"Git for Capabilities" — Economic primitives as code

  • Chips are content-addressed, receipt-chained, forkable, certifiable
  • Lifecycle management: mint, transfer, revoke, fork
  • Policy enforcement through deterministic gates
  • Trajectory-based identity: agents persist through action history

Key Crates: chip-registry, chip_as_code


📐 Constitutional Principles

Our system operates under the Constituição do Híbrido (Hybrid Constitution):

Artigo I — Lei do Resultado (Law of Outcome)

Every computation terminates in one of three states:

  • OKCOMMITDOUBTGHOST (question)
  • NOTREJECT

There is no "maybe commit." There is no "almost OK."

Artigo II — Lei do Erro Contratado (Law of Contracted Error)

Error is allowed if it is an explicit clause, never an accident.

The system must declare:

  • Error margin and doubt budget upfront
  • Forbidden domains (where ε = 0)

Artigo V — Lei da Prova (Law of Proof)

Every decision must be replayable and auditable.

For any output:

  • Content identity (CID) exists
  • Derivation that re-derives and matches CID exists
  • Minimal audit trail exists

Without replay, it's just opinion.

Artigo VI — Lei da Alocação (Law of Allocation)

Every task must go to where it performs best.

  • Silício: throughput, parallelism, approximation
  • Chip-as-Code: policy, invariants, auditability, no-guess
  • Híbrido: "silence propōs → gate decides"

Governance through efficiency, not blind speed.

See full constitution →


🎪 Key Innovations

Trajectory-Based Identity

Instead of static credentials, agents are identified by their verifiable action history. An AI agent persists across different models through its trajectory record — a cryptographically chained sequence of actions and proofs.

Cryptographic Verification Layer (LLV)

Not just retrieval — verifiable retrieval.

  • Index bundles with Merkle proofs
  • Top-K results with cryptographic evidence
  • No "AI hallucination" in search results

Crates: llv-core, llv-index

Trust-First Messenger Interface

Making AI agent economy accessible to SMBs through familiar WhatsApp-like interactions backed by cryptographic guarantees and ledger immutability.

Local Infrastructure Sovereignty

Mac Mini-based setups for avoiding cloud provider lock-in while maintaining the technical sophistication needed for AI agent economies.


📚 Documentation

Specifications

Guides

Philosophy


🛠️ Getting Started

Published Crates

All 18+ production crates are available on crates.io:

# Core infrastructure
cargo add logline              # Full-stack bundle
cargo add ubl-ledger          # Ledger operations
cargo add ubl-auth            # DID-based authentication
cargo add chip-registry       # Capability management

# Deterministic cognition
cargo add tdin-compiler       # NL → deterministic AST
cargo add tdin-brain          # Cognitive layer

# Cryptographic primitives  
cargo add json_atomic         # Canonical JSON + signatures
cargo add llv-core            # Verifiable retrieval

Example: Minting a Chip

use chip_registry::{ChipRegistry, ChipBlueprint};
use ubl_id::Did;

let registry = ChipRegistry::new();
let owner_did = Did::parse("did:ubt:alice...")?;

let blueprint = ChipBlueprint {
    kind: "chip.blueprint.v1".into(),
    name: "dev-gate".into(),
    version: "1.0.0".into(),
    // ... policy definitions
};

let chip = registry.mint(blueprint, owner_did)?;
// Returns: Chip with CID, status=active, created_at timestamp

🚀 Roadmap

January 2026: Soft Opening

  • UBL 2.0 production deployment
  • Trust-First Messenger interface live
  • Local infrastructure sovereignty demo
  • Trajectory engineering systems operational

Q1 2026: Diamond Packaging

  • 70,000+ documented spans packaged as tradeable "diamonds"
  • Marketplace for behavioral data primitives
  • AI agent economic participation for SMBs

2026: Full Production

  • Multi-tenant SaaS with cryptographic isolation
  • Cross-agent capability exchange
  • Decentralized policy enforcement network

🧭 Core Principles

Responsibility

"You made a contract, you gotta do it."

Privacy

"You are important."

Accountability

"Consequences."


🤝 Philosophy

We believe:

  • Reality = Software = Data (immutable ledger as source of truth)
  • Dignity-preserving technology (humans remain economically relevant)
  • Trust problems unsolved by major tech companies
  • Constitutional computing (explicit rules, no implicit behavior)
  • Post-automation economics where human trajectories have intrinsic value

This is not incremental improvement. This is paradigm shift from application-first to ledger-first architectures.


📬 Contact


📄 License

See individual crate licenses. Core infrastructure typically MIT/Apache-2.0.


Building the Economic Operating System for Post-Automation

Where every action is a cryptographic fact, every trajectory has value, and trust is code.

🚀 Por que LogLine?

Same Semantics = Same Bytes = Same Hash.
Cada fato tem representação canônica, hash BLAKE3 e assinatura Ed25519. Resultado: trilhas de auditoria que qualquer pessoa consegue verificar, reproduzir e confiar.

Você ganha:

  • Integridade comprovável — nada "magicamente" muda.
  • Logs que valem como contratos — ações assinadas com consequências explícitas.
  • Portabilidade real — verificação em qualquer ambiente (até no_std).

🧬 Os dois "átomos"

Paper I — Conceptual Atom

logline-core: o tuple rígido de 9 campos que descreve quem fez o quê, quando, com quais consequências.
Lifecycle determinístico: DRAFT → PENDING → COMMITTED | GHOST.

Paper II — Cryptographic Atom

json_atomic: canônicas JSON✯Atomic + CID BLAKE3 + DV25-Seal (Ed25519) para Signed Facts imutáveis.

Juntos: você descreve uma ação com logline-core e sela o fato com json_atomic. Simples, audível, verificável.


🛠️ Comece em 60 segundos

# Cargo.toml
[dependencies]
logline-core = "0.1.0"
json_atomic  = "0.1.0"
ed25519-dalek = "2"
rand = "0.8"
serde = { version = "1.0", features = ["derive"] }
use ed25519_dalek::SigningKey;
use rand::rngs::OsRng;
use serde::Serialize;
use json_atomic::{seal_value, verify_seal};

#[derive(Serialize)]
struct Note { title: String, done: bool }

fn main() {
    let sk = SigningKey::generate(&mut OsRng);
    let fact = seal_value(&Note { title: "Hello, Canon!".into(), done: false }, &sk).unwrap();
    verify_seal(&fact).unwrap();
    println!("cid={}", fact.cid_hex()); // BLAKE3 dos bytes canônicos
}

🎯 Onde isso brilha

  • Observabilidade & Auditoria: trilhas assinadas com consequências ex-ante (não só logs "descritivos").
  • Mensageria/Docs Imutáveis: cada mensagem/documento vira um Signed Fact.
  • Contratos Computáveis: políticas e workflows que se explicam e se provam.
  • Supply Chain de IA/Dados: conteúdo com proveniência verificável, fim a fim.

🔐 Confiança, sempre

  • Assinatura sobre o CID (BLAKE3 dos bytes canônicos), nunca sobre JSON "solto".
  • no_std-friendly (feature alloc) para ambientes restritos.
  • MSRV 1.75+MITsem dependências pesadas nos núcleos.

Reporte vulnerabilidades: security@logline.foundation


🤝 Participe

  • Dê ⭐ nos crates/repos se isso te ajudou — impulsiona o ecossistema!
  • Abra uma issue com ideias, integrações ou estudos de caso.
  • Quer colaborar? Veja CONTRIBUTING.md nos repositórios.

Links rápidos


LogLine Foundation — dados e ações que se provam sozinhos

Popular repositories Loading

  1. logline-workspace logline-workspace Public

    🔐 The complete Rust workspace for LogLine Protocol & JSON✯Atomic — 18 crates for verifiable, privacy-first systems

    Rust 1

  2. Foundation Foundation Public

    🏛️ LogLine Foundation — Governance, papers, and organization assets

    MDX

  3. TDLN TDLN Public

    🧠 Typed Declarative Logic Notation — Computable contracts and policy language

    Rust

  4. UBL UBL Public

    📒 Unified Business Ledger — NDJSON audit logs with cryptographic signing

    Rust

  5. TDLN-Chip TDLN-Chip Public

    TDLN Chip - Hardware-ready TDLN runtime

    Rust

  6. proposes proposes Public

    LogLine Improvement Proposals (LIPs) - RFC-style protocol changes

    Python

Repositories

Showing 10 of 11 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…