𓋹 The Axioms of .me ​
In .me, axioms are the fundamental invariants of the kernel — the unbreakable rules that the runtime must always respect.
At its heart, .me is a personal semantic kernel: a single runtime value called me that acts simultaneously as a deeply navigable object and a callable function. This unified surface lets you store, organize, protect, query, link, and audit your digital identity and memory in a structured, consistent, and tamper-evident way.
The axioms together create something unique: they turn a simple JavaScript object into a secure, auditable, self-consistent personal memory engine. You can safely mix public data, hidden subtrees, structural pointers, queries, and identity — while the entire system remains predictable and tamper-evident.
A-struct-0 | Unified Callable Surface ​
One runtime value can be both callable and infinitely chainable.
This is the foundation that makes the entire .me experience feel natural and powerful.
Kernel evidence (runtime proxy + kernel surface):
ts
// Constructor returns a proxy that unifies both behaviors
const rootProxy = this.createProxy([]);
Object.setPrototypeOf(rootProxy as any, ME.prototype);
Object.assign(rootProxy as any, this);
return rootProxy as unknown as ME;ts
// Proxy: property access extends the semantic path, function call executes the operation
return new Proxy(fn, {
get(target, prop) { /* ... */ return self.createProxy(newPath); },
apply(target, _thisArg, args) {
return Reflect.apply(target as any, undefined, args);
},
});Proof:
ts
const me = new ME() as any;
console.log(typeof me); // "function"
console.log(typeof me.profile.name); // "function"
me.profile.name("Abella");
console.log(me("profile.name")); // "Abella"A0 | Secret Root Stealth ​
A secret subtree can be fully readable by its complete path, while its root remains completely invisible.
Kernel evidence (secret runtime behavior):
ts
// Secret branches are stored internally but never mirrored to the public index
private setBranchBlob(scope: SemanticPath, blob: EncryptedBlob) {
this.encryptedBranches[key] = blob;
}ts
// Deliberately hide the root of any secret scope
if (scope && scope.length > 0 && pathStartsWith(path, scope)) {
if (path.length === scope.length) return undefined;
}Proof:
ts
const me = new ME() as any;
me.wallet["_"]("secret");
me.wallet.income(100);
console.log(me("wallet")); // undefined
console.log(me("wallet.income")); // 100A1 | Identity Normalization (@) ​
Identity claims are automatically normalized and validated before being committed.
Kernel evidence (identity normalization path):
ts
private isIdentityCall(path: SemanticPath, expression: any): { id: string; targetPath: SemanticPath } | null {
const id = normalizeAndValidateUsername(expression);
return { id, targetPath: /* [] or scope */ };
}Proof:
ts
const me = new ME() as any;
me["@"]("Abella");
console.log(me.inspect({ last: 1 }).memories[0].operator); // "@"
console.log(me.inspect({ last: 1 }).memories[0].value); // { __id: "abella" }A2 | Path-Bound Secret Scopes (_) ​
Secrecy is structural — bound to a specific path rather than a global toggle.
Proof:
ts
const me = new ME() as any;
me.profile["_"]("alpha");
me.profile.name("Abella");
console.log(me("profile")); // undefined
console.log(me("profile.name")); // "Abella"A3 | Noise Reset (~) ​
Secret derivation can be reset at any chosen boundary, making previous secrets discontinuous.
Proof:
ts
const me = new ME() as any;
me.wallet["_"]("alpha");
me.wallet.hidden.notes("alpha-note");
me.wallet["~"]("noise");
me.wallet["_"]("beta");
me.wallet.hidden.seed("beta-seed");
console.log(me("wallet.hidden.seed")); // "beta-seed"A4 | Structural Pointers (__ / ->) ​
Pointers remain lightweight data objects. When traversed, they are automatically dereferenced structurally.
Proof:
ts
const me = new ME() as any;
me.wallet["_"]("secret");
me.wallet.income(1000);
me.profile.card["__"]("wallet");
console.log(me("profile.card")); // { __ptr: "wallet" }
console.log(me("profile.card.income")); // 1000A5 | Query as Memory Event (?) ​
Queries and calculations are recorded as first-class memory events.
Proof:
ts
const me = new ME() as any;
me.profile.name("Abella");
me.profile["?"]("name", "city");
console.log(me.inspect({ last: 1 }).memories[0].operator); // "?"A6 | Tombstone Remove (-) ​
Deletion is auditable and irreversible at read time through tombstones.
Proof:
ts
const me = new ME() as any;
me.wallet.hidden.notes("private");
me.wallet.hidden["-"]("notes");
console.log(me("wallet.hidden.notes")); // undefined or "-"A7 | Public + Secret Coexistence ​
Private operations never leak into or corrupt the public deterministic view.
Proof:
ts
const me = new ME() as any;
me.ledger.host("localhost:8161");
me.profile["_"]("alpha");
me.profile.name("Abella");
console.log(me("ledger.host")); // "localhost:8161"
console.log(me("profile")); // undefinedA8 | Hash Chain Integrity ​
The full memory history is tamper-evident via an internal hash chain. The public surface is redacted when needed, while the internal forensic log (_memories) preserves complete integrity.
Proof:
ts
const me = new ME() as any;
me["@"]("jabellae");
me.ledger.host("localhost:8161");
const m = me._memories;
console.log(m[0].prevHash === "");
console.log(m[1].prevHash === m[0].hash);A9 | Deterministic Conflict Resolution (LWW) ​
When writes collide, the system always resolves to a single deterministic truth using (timestamp asc, hash asc).
Proof:
ts
const me = new ME() as any;
const originalNow = Date.now;
try {
(Date as any).now = () => 3000;
me.wallet.balance(111);
me.wallet.balance(222);
} finally {
(Date as any).now = originalNow;
}
console.log(me("wallet.balance")); // always the same deterministic winnerWhy This Combination Is Powerful ​
Together, these axioms enable real-world use cases that traditional data structures cannot easily achieve:
- Personal Digital Identity: You can have a single source of truth for your online self (
me["@"]("jabella.e")) with public profiles and deeply hidden private sections that remain structurally coherent. - Secure Personal Vault: Store sensitive data (wallets, keys, notes) that can be partially hidden while still being traversable and pointer-referenced from public areas.
- Auditable Memory: Every change, query, or deletion is logged with cryptographic integrity, making
.mesuitable for self-sovereign identity or personal knowledge bases where trust and history matter. - Composability: Pointers + secrecy + queries allow complex data relationships without duplication or security leaks.
- Deterministic & Tamper-evident: Ideal for decentralized systems, personal agents, or any application where data integrity and reproducibility are critical.
In short, .me gives you a living, programmable personal memory that feels like a natural extension of yourself — flexible, private when needed, and provably consistent.
Practical Validation ​
Run the official fire test:
bash
node tests/axioms.test.tsExpected: All axioms pass with expected === returned proofs.
∴ Witness our seal
