Permanent identity, provenance encoding, privacy-preserving resolution, Merkle-chained serialization, append-only events, federated multi-region infrastructure. These are the core primitives. Here is what gets built on them.
Evidence & Chain of Custody
Lab notebooks
Pharmaceutical R&D, academic research. FDA and patent offices care about provenance of experimental records. A page torn from a serialized notebook is still verifiably part of that notebook.
Crime scene evidence logs
Each evidence bag gets an SF128. The append-only event stream records every custody transfer. The resolver answers "who has this, where did it go" without exposing officer PII to the public.
Environmental sampling
Water, soil, and air samples collected in the field. The sample container's identity chains back to the field notebook page where it was logged. Regulatory audits can verify the entire provenance chain.
Notary and legal witnessing
Serialized document pages where sequence and timestamp are cryptographically bound. Harder to forge than a stamp.
Supply Chain & Logistics
Pallet and container tracking
Each unit gets an SF128 minted at its origin site. As it moves through the supply chain, events append to its history. Any node in the mesh can resolve it. No central platform dependency.
Pharmaceutical track-and-trace
DSCSA compliance requires serialized product identifiers with chain of custody. SF128 gives you the identifier, the append-only log gives you the chain, and the federated architecture means no single vendor lock-in.
Agricultural provenance
"This coffee was harvested at this farm (region 02, site 03), processed here, shipped here." The identity carries its geography. Consumers scan a code, get the story.
Aerospace parts tracking
Every rivet, bracket, and actuator gets a lifetime identity. Maintenance events append. Any MRO facility worldwide can resolve the part's history.
Asset Management & Insurance
High-value equipment registries
Construction equipment, medical devices, scientific instruments. Minted at purchase, events track maintenance, calibration, location changes. Theft recovery via the finder protocol.
Art and collectibles authentication
A painting gets an SF128 at provenance. Exhibition history, conservation treatments, ownership transfers are append-only events. The Merkle chain makes retroactive fabrication of history detectable.
Fleet management
Vehicles, drones, rental equipment. Each asset is an SF128. The resolver gives you current status; the event log gives you lifecycle history.
Lost & Found
Luggage and travel gear
Airline-compatible tags with short codes. Finder scans, owner gets notified, no personal info exchanged.
Pet identification
Collar tags backed by SF128. Finder resolves the code, sends location to owner. Works internationally because the resolver mesh is multi-region.
Tool and equipment lending libraries
Community tools get identities. Checkout and return are events. If something goes missing, the finder protocol kicks in.
Keys, wallets, everyday carry
Small adhesive tags with 5x2 codes. The privacy-preserving resolution means you can put these on things without worrying about stalking or data harvesting.
Construction & Infrastructure
Building component passports
The EU is moving toward "digital product passports" for construction materials. Each beam, panel, or fixture gets an SF128 minted at the factory. The append-only log tracks installation, inspection, and maintenance. Decades later, a renovation crew can scan a component and get its full history.
Utility infrastructure
Every valve, meter, and transformer in a utility network. Field crews resolve identities on-site. The region/site encoding means the identity itself tells you which district it belongs to.
Inspection and compliance tagging
Fire extinguishers, elevators, pressure vessels. Each inspection is an event. The resolver answers "is this current?" from any device.
Healthcare & Life Sciences
Specimen tracking
Tissue samples, blood draws, biopsies. Minted at collection, events track processing, storage, analysis. The Merkle chain proves no samples were swapped or reordered.
Medical device UDI
FDA Unique Device Identification, but with a resolution layer. Scan the device, get its recall status, maintenance history, and compatible parts.
Clinical trial materials
Blinded study materials with serialized identities. The chain proves which participant received which lot without breaking the blind — the resolver can enforce access control.
Government & Public Records
Sealed document registries
Court filings, land titles, permits. Each document gets a serialized identity. The append-only log records amendments and transfers. Federated infrastructure means no single government IT vendor owns the system.
Ballot and election materials
Serialized ballot paper where every sheet is verifiably part of a known print run via the Merkle chain. Doesn't solve all election security problems, but it makes phantom ballot injection detectable.
National park and wilderness permits
Serialized permit books, just like the field notebooks. Each permit page is verifiable. Rangers in the backcountry can verify offline by re-deriving the chain.
Publishing & Media
Limited edition prints and books
Each copy gets a unique SF128. Provenance is built in. Collectors can verify authenticity and edition number.
Archival and library cataloging
Physical items in archives get permanent identities that outlive any particular catalog software. The federation model means multiple institutions can resolve each other's holdings.
Why this foundation?
Most of these problems have existing solutions, but they tend to be centralized platforms (vendor lock-in), proprietary protocols (interoperability nightmares), or blockchain-based (expensive, slow, overengineered for "I want to know what this thing is").
| Pillar | Why it matters |
|---|---|
| IPv6-native | The identity is a routable address, not a lookup into someone else's database. |
| Federated | Multi-region resilience without consensus protocols or token economics. |
| Append-only | Auditability without the rigidity or energy cost of a blockchain. |
| Privacy-preserving | The finder protocol proves you can do "scan to contact owner" without doxxing anyone. |
| Works offline | The Merkle chain can be verified with just the root hash and a SHA-256 implementation. |
| One architecture | The notebook product is the wedge. Once proven, everything else runs on the same infrastructure — just different objects and different events. |