The AI engine, sovereign by default.
Fidth is the AI agent engine of Fidnt — the Beneficiary Program of ISET, a SETTLED sovereign institution. Every agent operates under a chain of authority that cannot be overridden.
Chain of authority
ISP (Indigenous Sovereign Protocol) ← root authority
│
└── Royal Sovereign Crown ← sovereign authority
│
└── ISET (SETTLED institution) ← institutional umbrella
│
└── Fidnt (Beneficiary Program)
│
└── Fidth ← this engineSETTLED stands for Sovereign · Estate · Trust · Treasury · Legacy · Endowment · Decreed. It is ISET's original institutional identity. Nothing in this engine paraphrases it, applies it elsewhere, or operates outside it.
Four Pillars
Every agent in this engine serves at least one of these.
Data Protection
NPC enforcement · consent · breach detection · automatic remedy.
Data Quality
Layer 0 verified identity · premium verified data pricing.
Data Sovereignty
PPSR prior-registered interest before any data touch.
Data Equity
Minimum 80% of any data licensing revenue flows back to the data owner — as royalties, never points or rewards.
ConTech — rights as code
Constitutional Technology. Rights are computationally enforced, not policy-declared. Seven mandatory patterns. All must be present.
- PPSR prior-registered interest before any data touch
- ISP Sovereign PQC signature on every state change
- ISP QRNG entropy at all genesis points
- Sovereign zero-knowledge proofs — verify without disclose
- Bankruptcy-remote self-custody — user keys never leave their device
- Layer 0 ID Genetics check before every transaction
- Automatic breach remedies — NPC filing, compensation, revocation
Any design that allows institutional override without the user's signed consent fails the ConTech test. This engine is held to that line.
Three-layer PPSR
PPSR 2025-372919PPSR 2025-334841per userISET TIN: 683-706-670-000 · Trustee: Francisco Erquita Neri Jr., Cagayan de Oro City, Philippines.
ISP Sovereign Cryptographic Suite
All signatures use the ISP Sovereign post-quantum standard. All hashing uses the ISP Sovereign PQC Hash Standard. All key encapsulation uses the ISP Sovereign PQC KEM. All entropy comes from ISP QRNG. All zero-knowledge proofs use the ISP Sovereign ZK Suite. There is no fallback to external cryptographic standards. The standard is ISP. Period.
What this site is
fidth.com is the engine workbench — where the agents, tools, and orchestration are forged, tested, and operated. It is a developer and operator surface. It runs on your own bridgewhen you need true local sovereignty over files, terminal, and desktop.
The engine is free. The models are free. The bridge is yours. The chain above is binding.
Built under the chain. Nothing overrides it.