Motebit

Identity

Cryptographic identity that persists across time, devices, and providers.

Identity is the foundation. Without it, an agent is a stateless function — no memory persists, no trust accumulates, no governance applies. Motebit gives every agent a cryptographic identity that exists independently of any intelligence provider.

The identity model

A motebit identity is a persistent, unique identifier — timestamped, sortable, and owned by you. It's created once and persists forever. It doesn't expire, rotate, or depend on a server.

The identity belongs to its owner, not to a service provider. Switch AI providers, switch devices, shut down the relay — the identity endures.

Cryptographic keys

Each device that hosts a motebit generates an Ed25519 keypair. The private key is stored in the operating system's secure keyring — it never touches the filesystem, never leaves the device, and never gets sent over the network. The public key is shared with services that need to verify the agent's identity.

Ed25519 was chosen for its speed, small key size, and resistance to timing attacks. It's the same signature scheme used by SSH, Signal, and WireGuard.

Multi-device

A single motebit can span multiple devices. Each device registers independently with its own keypair. Your motebit exists on your laptop, phone, and any future device — same identity, same memory, shared state.

When a device needs to communicate with the sync relay, it signs a short-lived token (5-minute expiry) with its private key. The relay verifies the signature against the registered public key. No passwords, no API keys stored server-side — just cryptographic proof.

First launch

On first launch, the app walks you through identity creation:

  1. You consent to creating an agent identity
  2. A keypair is generated and the private key is stored securely
  3. Your motebit identity is created
  4. Your device is registered
  5. Optionally, the device connects to a sync relay for multi-device use

On subsequent launches, the identity loads from storage and the keypair from the keyring. No network round-trip required.

What this enables

  • Proof of identity — Any service can verify that a message came from your motebit by checking the signature against the registered public key
  • Multi-device — Your motebit exists across all your devices with the same identity and shared state
  • Relay independence — The identity doesn't depend on the relay server. Kill the relay, the motebit continues. Switch relays, the motebit follows.
  • Audit trail — Every event is tagged with the agent and device that produced it, creating a verifiable history