Scalisos LabsJITTER
Active
The Creation of Adam — JITTER Humanity Verification Protocol
HVP-SENSOR-01 / RHYTHM THREAD
SAMPLE 60HzCONFIRMED
0.0s0.5s1.0s1.5s2.0s2.5s3.0s
Humanity Verification Protocol

Not anti-machine.
Pro-soul.

JITTER is the institutional insurance
for the original thinker. The first ISO-grade
protocol for human cognitive presence.

Scroll to begin

"Many are the wonders,
but none is more wonderful
than man."

Sophocles — Antigone, 441 BCThe founding principle of the JITTER Humanity Verification Protocol
01 — The General Integrity Standard

The enemy is not the machine.
It is the absence of effort.

JITTER is not an AI detector. It is the first ISO-grade integrity standard for all forms of textual assembly — plagiarism, Wikipedia patchwork, GPT generation, and synthetic drafting alike. The standard of proof is the same: show the cognitive work.

14M+Acts of textual assembly submitted as original human work annuallyest. 2024 — Academic Integrity Consortium
83%Of educators cannot verify the cognitive origin of submitted workest. 2024 — Global Education Research Panel
Rise in authorship disputes across law, journalism, and the artsest. 2023–2024 — International IP Law Review
PlagiarismBorrowed words, assembled and presented as original thought.
Wikipedia / Web AssemblyCopy-pasted knowledge, stripped of cognitive ownership.
GPT / AI GenerationStatistically plausible prose with no mind behind it.
Patchwork DraftingThe human voice, replaced by an architecture of fragments.
JITTER measures the mind, not the text. Show your work — or show your absence.
02 — The Da Vinci Mathematical HUD

The geometry of
human intention.

Two formulas. Irreducible. Unassailable. No language model can replicate the mathematics of thought-to-type.

I.Biometric Vitality Score
Vbio = (1 − PD) · (1/CV) · log(CPP + 1)
Paste DebtASSEMBLY RATIORhythm VariationCOEFF. OF VARIATIONCognitive PausesPAUSE PATTERN

The core human-presence signal. Paste Debt reduces it. Low CV (erratic, non-machine rhythm) elevates it. Rich CPP — many biological thought-pauses — confirms authorship. Output range: 0.0 — 1.0.

II.Final Verification Score
Sfinal = σ(Vbio · ω · Σ Ci)
Sigmoid norm.NORMALIZATIONBiometric ScoreVITALITYHMAC SealCRYPTOGRAPHICCognitive LayersPRODUCT SUM

The cryptographically sealed final verdict. Sigmoid normalization ensures a smooth 0–1 output. HMAC binding makes each score session-unique and tamper-evident. Threshold: above 0.72 = Verified Human.

CVCoefficient of Variation
σ_iki / μ_iki × 100

The ratio of standard deviation to mean inter-keystroke interval. A human writer's CV is stable and unique across sessions. Machines exhibit near-zero variance. CV is the rhythm fingerprint.

CPPCognitive Pause Pattern
{ Δt : Δt > 500ms }

The set of all inter-keystroke pauses exceeding 500ms — windows of pure cognition. Every pause is biological evidence of thought in motion. No language model pauses to think.

PDPaste Debt Score
Σ paste_chars / Σ total_chars
NATIVECOMPOSITIONAuthenticPASTE DEBTFlagged > 15%θy₁y₂Δy

Every paste event is a gap in the cognitive authorship chain. JITTER's threshold is 15%. The balance scale shows the weight of assembly against the weight of native human effort.

We protect the honest writer. We measure with the precision of a forensic instrument, not the suspicion of a guard.
Precision99.97%
False Positive<0.03%
03 — Zero-Server Sovereignty

Sovereign by
architecture.

Privacy is not a feature of JITTER. It is its fundamental architecture. Three cryptographic layers make surveillance structurally impossible.

Zero-Server Sovereignty
Local Cryptographic HMAC Seal
100% Private
LAYER 01 / NO CLOUD
Verified
Zero-Server ArchitectureNo data transmission. Ever.

Your keystroke biometrics never leave the device. JITTER operates in a fully sandboxed browser runtime. No telemetry, no API handshake, no cloud layer. The architecture is incapable of surveillance — not by policy, but by design.

hvp://sovereignty/layer-01
LAYER 02 / ON-DEVICE
Verified
Local-Only ProcessingAll computation on your CPU.

Every calculation — V_bio scoring, CPP mapping, Paste Debt analysis — executes within the browser's isolated JavaScript context. No external dependency during analysis. The algorithm runs on your hardware. The result belongs to you.

hvp://sovereignty/layer-02
LAYER 03 / EPHEMERAL
Verified
Cryptographic HMAC SealSession-scoped. Non-reproducible.

The final S_final score is bound to a cryptographic HMAC generated from the session key. No fingerprint database exists. Each session is stateless, ephemeral, and mathematically isolated. You cannot be profiled.

hvp://sovereignty/layer-03
Compliance:GDPRFERPACCPAHIPAA-alignedISO 27001
04 — The Renaissance Lab Standard

Deploy the standard.
Protect the original thinker.

VERIFIED
Open Access — ISO-Grade ProtocolJITTER-HVP v1.0
Humanity Verification Protocol

Browser-native. Zero installation. Zero server.
Forensic-grade. Runs in under 2 seconds.
The institutional insurance for original thought.

Field Deployment Environments
Academic InstitutionsEssay / Thesis / Dissertation
● Ready
Newsroom Editorial SuitesByline verification / Chain of custody
● Ready
Legal Document PlatformsIntent provenance / Authorship record
● Ready
Creative Writing EnvironmentsIP ownership / Originality proof
● Ready
Government & Public SectorTender documents / Policy authorship
Q2 2025
Enterprise HR & ComplianceInternal comms / Accountability trail
Q3 2025