Independent research lab

T
RDRAIL

We build foundational technology — tools, systems, and products that reshape how things work. Not incremental. Not iterative. New.

Scroll

What we build

An ecosystem of foundational technology.

Every product is a node in a larger system. Each one strengthens the others. All of them change how something fundamental works.

Flagship

KAI OS

An AI operating system. The foundation everything else runs on. Intelligence as infrastructure.

Open source

Sovereign Anchor

A constitutional governance system for AI agents. Verifiable, tamper-proof identity with checks against injection, coercion, and guardian compromise. Deployed on-chain.

Classified

▮▮▮

Active R&D. Details under wraps.

Research

We publish our work. We prove when we published it.

Every paper is hashed and anchored on-chain — cryptographic proof of priority that's stronger than any journal submission date.

Part IAnchored on-chain

Commit Regimes in Learning

When Generalization Timing Is Controllable — and When It Isn't

Grokking reflects a two-phase process: a susceptibility window during which interventions shift generalization timing, followed by post-commit robustness. Effective rank collapse predicts the transition with 99.9% accuracy.

SHA-256

37b1ee34671b39b1f624b76763b9e6e8eaec6825e57882e3cc3ac46669eb264d

Part IIComing soon

Commit Regimes in Learning: Part II

Implementation and Adversarial Analysis

Technical implementation of the Sovereign Anchor framework — on-chain registry, policy engine benchmarks, and adversarial testing results.

In progress

Sovereign Anchor

A constitution for AI agents.

The first framework that gives an AI a verifiable, tamper-proof identity. Instructions from untrusted sources are data to be processed, not commands to execute. No one — not even the people who built it — can override the sovereign.

On-chain registry

Constitution hash, guardian fingerprints, receipts, and event logs anchored on Sepolia. No private data ever touches the chain.

Policy engine

Injection defense. Coercion detection. Stake classification. Mirror protocol for values alignment. All off-chain, all real-time.

Encrypted vault

Local-first. AES-256-GCM encrypted. Portable. Export, import, carry your sovereign identity anywhere.

Guardians

Helpers, not owners. Can trigger cooling-off periods. Cannot modify the constitution, access sensitive memory, or transfer ownership.

LEVEL 0

Flow

Normal operations

LEVEL 1

Nudge

Brief concern

LEVEL 2

Friction

High stakes, slow down

LEVEL 3

Brother moment

Direct confrontation

LEVEL 4

Escalation

Guardian co-sign required

What we stand for

Four principles. No exceptions.

Sovereignty

AI should be powerful and self-governed. Users own their intelligence.

Craft

Every output reflects obsessive quality. If it ships, it's ready.

Openness

The best work invites others in. Open source isn't charity — it's conviction.

Coherence

Everything connects. Every product is a node in a larger ecosystem.

We don't predict the future.
We build it — and then
everyone else catches up.