Search papers, labs, and topics across Lattice.
This paper introduces the "Right to History," a principle asserting individuals' entitlement to verifiable records of AI agent actions on their hardware, motivated by increasing AI agency and emerging regulations like the EU AI Act. The authors formalize this principle with five system invariants and implement it in PunkGo, a Rust-based sovereignty kernel integrating Merkle tree audit logs, capability-based isolation, energy-budget governance, and human-approval mechanisms. Adversarial testing validates the invariants, and performance benchmarks show sub-millisecond action latency and high throughput.
Individuals can now demand a tamper-proof, verifiable record of every action taken by AI agents operating on their own devices, thanks to a new sovereignty kernel.
AI agents increasingly act on behalf of humans, yet no existing system provides a tamper-evident, independently verifiable record of what they did. As regulations such as the EU AI Act begin mandating automatic logging for high-risk AI systems, this gap carries concrete consequences -- especially for agents running on personal hardware, where no centralized provider controls the log. Extending Floridi's informational rights framework from data about individuals to actions performed on their behalf, this paper proposes the Right to History: the principle that individuals are entitled to a complete, verifiable record of every AI agent action on their own hardware. The paper formalizes this principle through five system invariants with structured proof sketches, and implements it in PunkGo, a Rust sovereignty kernel that unifies RFC 6962 Merkle tree audit logs, capability-based isolation, energy-budget governance, and a human-approval mechanism. Adversarial testing confirms all five invariants hold. Performance evaluation shows sub-1.3 ms median action latency, ~400 actions/sec throughput, and 448-byte Merkle inclusion proofs at 10,000 log entries.