Identity Infrastructure
Three tiers
of trust
From individual humans to multi-party groups to enterprise organizations. Cryptographic identity at every level.
The root of all trust. A single human, a single key pair, an unbreakable chain of accountability. Every agent, tool, and service in the ecosystem traces its lineage back to an HMR identity.
Collective identity through FROST threshold cryptography. No single human holds the full key. t-of-n participants required for every critical operation.
Organizational identity governed by multi-human threshold groups. Supports governance transitions, timelocked operations, and hierarchical descendant structures.
Three tiers. One cryptographic chain. Every identity verifiable offline. Every action traceable to a human root.
did:oas — the W3C DID method for autonomous agents. Ed25519 signing. HKDF-SHA256 derivation. BLAKE3 hashing. Zero vendor lock-in.