Copenhagen AI
CPH.AI
Approach
Capabilities
Insights
Research Institute
Copenhagen AI
COPENHAGEN AI
ENGINEERING EXCELLENCECREATIVE RENAISSANCEHYPER OPTIMIZATION

We function as the strategic bridge between sovereign infrastructure and autonomous intelligence. Bridging the gap between frontier breakthroughs and systematic industrial execution.

The AI Suite

  • Runestone
  • Bedrock
  • Ledger
  • Vector
  • Aegis
  • Prism

Institute

  • Academic Partnerships
  • Open Source
  • Research Blog

Careers

  • Open Roles
  • The Residency
  • Interviewing
  • Culture
Global Offices
© 2026 Kæraa Group. All Rights Reserved.
Terms of Service|Privacy Policy|Responsible Disclosure|Accessibility Statement
Back to Intelligence Stream
CryptographyAgent IdentitySovereigntyEthics

The Open KYA Manifesto: Why We Built HUV.AI

Establishing the Standard for Human Verifiability in the Age of Synthetic Intelligence.

The CPH.AI Directorate JAN 12, 2026 10 MIN READ

The Thesis: The Dark Forest

The internet is rapidly transitioning from a human-centric network to a machine-dominated substrate. As Generative AI costs plummeted towards zero in late 2025, the marginal cost of simulating personhood effectively vanished. This created the "Dark Forest" scenario we find ourselves in today: trust has evaporated, and every digital interaction is suspect.

We introduce HUV.AI (Human-Verified AI)—the foundational machine-trust layer designed to bridge the "Identity and Liability Gap" in the emerging agentic economy. It provides the cryptographic, hardware, and legal infrastructure to ensure that every machine transaction is anchored to a verified human steward.

The Core Architecture: "The Machine Trust Layer"

HUV.AI operates on a multi-tier protocol that moves beyond simple API keys into a world of Verifiable Agency. It is built on three distinct pillars:

1. KYA (Know Your Agent) Open Standard

Similar to how KYC revolutionized banking, the KYA Manifest is a W3C-compliant standard for agent identity. It is a signed document that declares an agent's stewardship (linking DID to human/corp), constraints (geo-fencing, spending limits), and backing (insurance policies).

2. Hardware Provenance (The TEE Root)

HUV.AI mandates that high-stakes agents run within Trusted Execution Environments (TEEs), such as NVIDIA H100 TEE. We verify "Hardware Quotes" to prove the agent is running audited code on secure hardware, ensuring immutability.

3. The On-Chain Control Plane

The protocol uses a decentralized registry (anchored on the Aztec network for privacy) to act as the global source of truth. It features a cryptographic Kill-Switch to instantly "brick" rogue agents and enables Reputation Sharing across sovereign firewalls.

Human Actor
TLS 1.3 + DID Auth
HUV.AI Agent
SPIFFE ID Verified

Key Services & Ecosystem Components

ServiceFunction
HUV-FirewallEdge-layer defense filtering inbound requests based on agent reputation and manifest compliance.
HUV-ScoreA dynamic "Bot-FICO" score quantifying reliability based on past behavior and bond status.
Envoy SidecarProxy deployed with the agent to enforce spending limits and log tamper-proof telemetry.
Sovereign BridgeFacilitates ZK-proofed data sharing between agents of competing firms without exposing proprietary weights.

The Vision: Antifragile Machine Autonomy

HUV.AI believes that for AI to reach its full economic potential—handling an estimated $15 trillion in B2B commerce by 2030—it cannot remain "probabilistic." We must wrap the stochastic nature of Large Language Models in deterministic cryptographic guardrails.

By providing Human-anchored accountability, HUV.AI allows enterprises to deploy agents at scale, knowing that every action is verified, every risk is quantified, and every agent is bonded.

Solve the Identity Gap

Learn more about KYA standards and secure agent-to-agent communication infrastructure.

Visit HUV.AI

Subscribe to The Transmission

Get these engineering field notes delivered directly to your inbox. Signal only.