Verifiable, privacy-first intelligence β data and actions that prove themselves.
The complete Rust workspace for the LogLine Protocol & JSONβ―Atomic ecosystem
Same Semantics = Same Bytes = Same Hash.
LogLine is built on two cryptographic primitives that form the foundation for verifiable, auditable systems:
| Atom | Crate | Description |
|---|---|---|
| Conceptual | logline-core |
9-field tuple describing who did what, when, with what consequences |
| Cryptographic | json_atomic |
Canonical JSON + BLAKE3 CID + Ed25519 sealing for Signed Facts |
Together: describe an action with logline-core, seal the fact with json_atomic. Auditable. Verifiable. Immutable.
logline-workspace/
βββ π§ Protocol Core
β βββ logline-core β The Conceptual Atom (Paper I)
β βββ json_atomic β The Cryptographic Atom (Paper II)
β βββ lllv-core β LLLV Capsule format (Paper III)
β βββ lllv-index β Capsule indexing & retrieval
β
βββ π§ TDLN (Typed Declarative Logic Notation)
β βββ tdln-ast β Abstract Syntax Tree
β βββ tdln-brain β AI reasoning engine with LLM integration
β βββ tdln-compiler β TDLN β bytecode compilation
β βββ tdln-gate β Policy gates & validation
β βββ tdln-proof β Proof generation & verification
β
βββ βοΈ Atomic Family
β βββ atomic-types β Shared IDs, time, error helpers
β βββ atomic-crypto β BLAKE3, Ed25519, HMAC, key management
β βββ atomic-codec β JSONβ―Atomic canonical encode/decode
β βββ atomic-sirp β Network capsule + receipt flow (HTTP)
β βββ atomic-runtime β DIM router/handlers with UBL logging
β
βββ π’ UBL (Unified Business Ledger)
βββ ubl-ledger β NDJSON writer with rotation & signing
βββ ubl-mcp β Model Context Protocol server
βββ ubl-office β Business automation with AI agents
# Cargo.toml
[dependencies]
logline-core = "0.1"
json_atomic = "0.1"use json_atomic::{seal_value, verify_seal};
use ed25519_dalek::SigningKey;
use rand::rngs::OsRng;
use serde::Serialize;
#[derive(Serialize)]
struct Action { actor: String, verb: String }
fn main() {
let key = SigningKey::generate(&mut OsRng);
// Seal any serializable value β Signed Fact
let fact = seal_value(&Action {
actor: "alice".into(),
verb: "approved".into()
}, &key).unwrap();
// Anyone can verify
verify_seal(&fact).unwrap();
println!("CID: {}", fact.cid_hex()); // BLAKE3 of canonical bytes
println!("Sig: {}", fact.signature_hex());
}- Canonical Serialization β Same semantics = same bytes = same hash
- BLAKE3 CIDs β Fast, secure content addressing
- Ed25519 Signatures β Curve25519 EdDSA on CID, not raw JSON
- no_std Support β Runs in constrained environments
- Lifecycle Invariants β
DRAFT β PENDING β COMMITTED | GHOST
| Domain | How LogLine Helps |
|---|---|
| Audit Trails | Signed action logs with ex-ante consequences |
| Immutable Documents | Every doc/message becomes a Signed Fact |
| Computable Contracts | Policies that explain and prove themselves |
| AI/Data Provenance | End-to-end verifiable content chains |
| Supply Chain | Tamper-evident records with cryptographic proofs |
# Clone
git clone https://github.com/LogLine-Foundation/logline-workspace
cd logline-workspace
# Build & test
cargo build --all-features
cargo test --all-features
# Quality checks
cargo fmt --all -- --check
cargo clippy --all-targets --all-features -- -D warnings
# Run benchmarks
cargo bench -p json_atomicMinimum Supported Rust Version: 1.75+
| Paper | Topic | Crate |
|---|---|---|
| Paper I | The Conceptual Atom β Verifiable Actions | logline-core |
| Paper II | JSONβ―Atomic β Cryptographic Sealing | json_atomic |
| Paper III | LLLV β The Retrieval Atom | lllv-core |
Full papers available in docs/papers/.
We welcome contributions! See CONTRIBUTING.md for guidelines.
- π Bug Reports: Open an issue with reproduction steps
- π‘ Feature Ideas: Discuss in issues first
- π§ Pull Requests: Fork β branch β PR β review
Dual-licensed under your choice of:
- MIT License (LICENSE-MIT)
- Apache License 2.0 (LICENSE-APACHE)
Report vulnerabilities to: security@logline.foundation
See SECURITY.md for our security policy.