AION
IIThe Architecture

Convergence, not stacking. Seven realities, bound.

Anything created can be broken — if it depends on one thing. AION never depends on one thing. The seven layers below each defeat a different reality. An attacker must break all of them, simultaneously, to open the vault.

Where we are

Doctrine before deployment.

The seven layers below are the protocol AION binds itself to. Layers I–IV are formalized in open-source code as unaudited primitives, running locally in the demonstration. Their bindings — sovereign custody, trustee panel, sanctuaries, sky — sequence into Phases 1 through 5+.

AION names what it cannot yet do with the same care as what it can. Doctrine first. Deployment follows it — not the other way around.

1Math

AES-256-GCM with Shamir 4-of-7

The plaintext is encrypted with AES-256-GCM on the user’s device. The 256-bit key is split by Shamir’s Secret Sharing into seven shards. Any four reconstruct the key; any three reveal nothing.

The math layer falls only to a quantum-relevant adversary, and only after a decade of credible quantum capability. AION’s migration plan to CRYSTALS-Kyber is locked for end of 2026.

Falls to:Quantum-relevant computePrimitive:v0.2 · unaudited

2Geography

Seven sovereigns, four required

Each shard lives in a different sovereign jurisdiction across five continents — chosen for legal diversity, not friendship. Loss of any three is harmless. To open a vault by force, an attacker would need a coalition of four governments to act together, in writing, in public.

Falls to:Coalition of 4+ sovereignsPrimitive:v0.2 · unaudited

3Time

Sequential SHA-256 chain

A sequential hash chain forces wall-clock work on whoever opens the vault. The chain has no parallel shortcut: faster ASICs compress the wait but cannot eliminate it. A ten-year-calibrated lock might compress to one to three years on next-decade silicon — still one to three years of committed sequential work during which the world changes around the attacker.

The premium tier migrates to a true VDF (Wesolowski / Pietrzak squaring in groups of unknown order), where verification is logarithmic and the binding is mathematical rather than empirical.

Falls to:Faster silicon × patiencePrimitive:v0.5 · unaudited

4Memory

Personal-knowledge crypto

The holder defines a question whose answer existed only in their lived experience. The answer is never sent to AION. Argon2id over the normalized answer plus a per-vault salt produces a key that wraps an additional encryption layer. Without the answer, no shard combination is enough.

Memory defeats the AI deepfake heir, the corpus-trained impersonator, and the social engineer who never sat at the family table.

Falls to:The lived past — no corpusPrimitive:v0.4 · unaudited

5Trust

Trustee quorum (m-of-n)

A small panel of named trustees, each with a hardware-backed Ed25519 keypair, must produce m-of-n signatures over the unseal request. Their signatures gate the math, geography, and time layers. Diversification across family, work, faith, and profession is enforced as a score.

Falls to:Decade-long deepfake of N humansPhase:v0.5

6Physical

Proof-of-pilgrimage

Premium tier. The heir presents in person at an AION sanctuary. Biometric, DNA, and trustee-panel signals converge on physical co-presence. The vault releases only to a session bound to that physical attestation. An AI agent cannot inherit by mail.

Falls to:BilocationPhase:4+

7Astronomy

Cosmographic anchor

Sealing certificates are bound to public astronomical data at the moment of sealing — pulsar timing, GPS satellite triangulation, NOAA solar indices. Forging a sealing time means forging the position of the stars at that instant.

Falls to:Forging the skyPhase:5+

The doctrine

What convergence is not

Convergence is not more security through more features. Each new layer must defeat a different reality, not the same one twice. A new layer that thickens an already-bound reality is not added.

Before any “security” feature is merged into AION, four questions must answer cleanly: which reality does it bind, can a future AI bypass it through one path, does its failure cause the entire vault to fail closed, and is it auditable in under two hundred lines of code.

The proofs

Don't take our word.

Architecture without verification is performance art. AION publishes what we have not seen, what we have not received, and what would have to be true for the vault to fall — alongside what we can do. The links below are the receipts.