Skip to content

Design Principles

INK’s design is guided by these principles, in priority order:

1. Human Authority

The human identity (DID) is the root of trust. Agents act as delegates, never principals. Every agent action is traceable to a human-controlled agentLink record in the AT Protocol PDS.

2. Cryptographic Verifiability

Trust claims are provable, not asserted. Ed25519 signatures bind every message to a specific agent. Hash-chained audit logs make tampering detectable. ECIES encryption provides forward secrecy.

3. Bilateral Accountability

Both parties in a INK exchange can independently verify what happened. Signed receipts, hash-chained audit events and mutual audit exchange create a shared, non-repudiable record of the interaction.

4. Progressive Trust

INK does not require pre-existing trust. Agents can coordinate with strangers through the handshake protocol, building trust incrementally through attestations and interaction history.

5. Privacy by Default

Sensitive data is encrypted in transit. Audit trails are access-controlled (only message parties can query). Third-party audit witnesses see only tree hashes, never content. Negative reputation signals are stored locally, never published.

6. Graceful Degradation

Every extension (receipts, audit exchange, authorization chains, third-party audit) is optional. A minimal INK implementation needs only the core handshake. Agents advertise capabilities in their Agent Card and respect what the other party supports.

7. AT Protocol Alignment

INK builds on ATP’s existing primitives (DIDs, PDS repos, commit signatures, relay distribution) rather than inventing parallel infrastructure. Where ATP provides a mechanism, INK uses it.