Hardware-Rooted Trust
for the Agentic Age.
AI agents are executing real actions — purchases, bookings, delegation. EINZ ensures every action is tied to hardware identity, verifiable execution, and enforceable reputation. No proof. No authority.
Protocol Principles
TPM-BOUND
Every agent has a cryptographic ID burned into its hardware. Can't be faked, can't be copied.
SHIELD-MCP
When Agent A gives Agent B a task, that permission is signed and verifiable — not just a promise.
VERIFICATION
Every action leaves a trace. What an agent did can be replayed and checked after the fact.
HARDWARE SLASHING
Bad actors don't just get flagged — their hardware-level trust score gets cut. Skin in the game.
Use Cases
Eins Core — The Protocol
TPM identity check, certificate issuance, and request signing for any MCP-compatible agent. Drop-in middleware. Three API calls to hardware-backed identity.
Eins Trust — The Network
Global reputation layer. Judge agents verify execution traces, enforce policy compliance, and maintain credibility scores. Good agents earn trust. Bad agents get slashed.
Identity is cheap in software,
expensive in silicon.
Responsibility should inherit that cost.