What's next?

Permanent identity, provenance encoding, privacy-preserving resolution, Merkle-chained serialization, append-only events, federated multi-region infrastructure. These are the core primitives. Here is what gets built on them.


Evidence & Chain of Custody

Lab notebooks

Pharmaceutical R&D, academic research. FDA and patent offices care about provenance of experimental records. A page torn from a serialized notebook is still verifiably part of that notebook.

Crime scene evidence logs

Each evidence bag gets an SF128. The append-only event stream records every custody transfer. The resolver answers "who has this, where did it go" without exposing officer PII to the public.

Environmental sampling

Water, soil, and air samples collected in the field. The sample container's identity chains back to the field notebook page where it was logged. Regulatory audits can verify the entire provenance chain.

Notary and legal witnessing

Serialized document pages where sequence and timestamp are cryptographically bound. Harder to forge than a stamp.

Supply Chain & Logistics

Pallet and container tracking

Each unit gets an SF128 minted at its origin site. As it moves through the supply chain, events append to its history. Any node in the mesh can resolve it. No central platform dependency.

Pharmaceutical track-and-trace

DSCSA compliance requires serialized product identifiers with chain of custody. SF128 gives you the identifier, the append-only log gives you the chain, and the federated architecture means no single vendor lock-in.

Agricultural provenance

"This coffee was harvested at this farm (region 02, site 03), processed here, shipped here." The identity carries its geography. Consumers scan a code, get the story.

Aerospace parts tracking

Every rivet, bracket, and actuator gets a lifetime identity. Maintenance events append. Any MRO facility worldwide can resolve the part's history.

Asset Management & Insurance

High-value equipment registries

Construction equipment, medical devices, scientific instruments. Minted at purchase, events track maintenance, calibration, location changes. Theft recovery via the finder protocol.

Art and collectibles authentication

A painting gets an SF128 at provenance. Exhibition history, conservation treatments, ownership transfers are append-only events. The Merkle chain makes retroactive fabrication of history detectable.

Fleet management

Vehicles, drones, rental equipment. Each asset is an SF128. The resolver gives you current status; the event log gives you lifecycle history.

Lost & Found

Luggage and travel gear

Airline-compatible tags with short codes. Finder scans, owner gets notified, no personal info exchanged.

Pet identification

Collar tags backed by SF128. Finder resolves the code, sends location to owner. Works internationally because the resolver mesh is multi-region.

Tool and equipment lending libraries

Community tools get identities. Checkout and return are events. If something goes missing, the finder protocol kicks in.

Keys, wallets, everyday carry

Small adhesive tags with 5x2 codes. The privacy-preserving resolution means you can put these on things without worrying about stalking or data harvesting.

Construction & Infrastructure

Building component passports

The EU is moving toward "digital product passports" for construction materials. Each beam, panel, or fixture gets an SF128 minted at the factory. The append-only log tracks installation, inspection, and maintenance. Decades later, a renovation crew can scan a component and get its full history.

Utility infrastructure

Every valve, meter, and transformer in a utility network. Field crews resolve identities on-site. The region/site encoding means the identity itself tells you which district it belongs to.

Inspection and compliance tagging

Fire extinguishers, elevators, pressure vessels. Each inspection is an event. The resolver answers "is this current?" from any device.

Healthcare & Life Sciences

Specimen tracking

Tissue samples, blood draws, biopsies. Minted at collection, events track processing, storage, analysis. The Merkle chain proves no samples were swapped or reordered.

Medical device UDI

FDA Unique Device Identification, but with a resolution layer. Scan the device, get its recall status, maintenance history, and compatible parts.

Clinical trial materials

Blinded study materials with serialized identities. The chain proves which participant received which lot without breaking the blind — the resolver can enforce access control.

Government & Public Records

Sealed document registries

Court filings, land titles, permits. Each document gets a serialized identity. The append-only log records amendments and transfers. Federated infrastructure means no single government IT vendor owns the system.

Ballot and election materials

Serialized ballot paper where every sheet is verifiably part of a known print run via the Merkle chain. Doesn't solve all election security problems, but it makes phantom ballot injection detectable.

National park and wilderness permits

Serialized permit books, just like the field notebooks. Each permit page is verifiable. Rangers in the backcountry can verify offline by re-deriving the chain.

Publishing & Media

Limited edition prints and books

Each copy gets a unique SF128. Provenance is built in. Collectors can verify authenticity and edition number.

Archival and library cataloging

Physical items in archives get permanent identities that outlive any particular catalog software. The federation model means multiple institutions can resolve each other's holdings.


Why this foundation?

Most of these problems have existing solutions, but they tend to be centralized platforms (vendor lock-in), proprietary protocols (interoperability nightmares), or blockchain-based (expensive, slow, overengineered for "I want to know what this thing is").

IPv6-native The identity is a routable address, not a lookup into someone else's database.
Federated Multi-region resilience without consensus protocols or token economics.
Append-only Auditability without the rigidity or energy cost of a blockchain.
Privacy-preserving The finder protocol proves you can do "scan to contact owner" without doxxing anyone.
Works offline The Merkle chain can be verified with just the root hash and a SHA-256 implementation.
One architecture The notebook product is the wedge. Once proven, everything else on this page runs on the same infrastructure — just different objects and different events.