JITTER-HVP · Technical specification · the geometry of intent
Measuring the pulse of human thought.
The JITTER-HVP Seal is a verifier-facing receipt: evidence of human drafting in Google Docs—session rhythm, pauses, and composition—rather than a statistical guess about polished prose. Teachers and institutions can ask for that receipt; students keep the substance of their work local.
Abstract
Under the hood, JITTER-HVP is a deterministic study of cognitive micro-latencies: three biometric signals (rhythmic variance, pause architecture, composition ratio) bound into one cryptographically sealed attestation with a deterministic humanity score—mathematical evidence, not probability.
Explore the three signals in the interactive specification, open technical details when you need them, then review the seal and privacy architecture. Install JITTER when you're ready.
Why — Proof of process
The enemy is not the machine. It is the absence of effort.
Plagiarism in the AI age is theft of process — the human labor behind the line. Surface-pattern detectors cannot win that arms race. JITTER anchors proof in the human pulse: cryptographic attestation of effort, not a statistical guess.
1,000%+Surge in AI-generated websites masquerading as reliable news outlets.NewsGuard, 2024
68%College instructors expect GenAI to harm academic integrityWiley — U.S. higher education survey, 2024
2028Estimated year when the supply of high-quality human-written data for AI training will be exhausted.Epoch AI, 2024
PlagiarismBorrowed words, assembled and presented as original thought.
Copy-paste assemblyCompiled knowledge, stripped of cognitive ownership.
Synthetic assemblyPlausible language composed without the labor of a mind.
Patchwork draftingThe human voice, replaced by an architecture of fragments.
Proof of Process is biometric proof of work: JITTER captures the Human Pulse locally and signs it cryptographically — sovereign, local, and free.
JITTER-HVP · Technical pillars
JITTER-HVP is deterministic: one canonical explanation, then three signals measured in sequence. We attest process integrity through rhythmic vitality, cognitive pauses, and assembly balance.
Determinism & ordering↓
Signals are evaluated in a fixed pipeline so the seal is reproducible for a given session: vitality and pause architecture inform cognitive layers, then assembly balance is weighed before normalization and cryptographic binding.
I
Pillar I · Biometric vitalitySection 1.1 — Rhythmic coefficient analysis
Biometric vitality score
Signal focus
This chapter isolates rhythmic variance only: the writer's living cadence measured across inter-keystroke intervals.
Every mind has a cadence. We measure variation in inter-keystroke timing to verify the unique biological signature of the writer.
Read the full signal rationale↓
A human's typing rhythm, measured as the standard deviation of inter-keystroke intervals relative to their mean, is stable, personal, and utterly unlike a generative model's output.
Technical parameters↓
Human CV range18% — 60%
Machine CV< 0.5%
Sample required≥ 200 keys
Confidence99.97%
Diagram↓
Verified authorship seal
The seal binds vitality, cryptographic session weighting, and the cognitive pillars into one normalized, session-locked output — deterministic, non-probabilistic, and irreproducible from synthetic drafting alone.
σSigmoid normalizationEnsures output is continuous 0 — 1
V_bioBiometric vitalityThe core human-presence signal
ωHMAC weightCryptographic session binding
ΣCᵢCognitive layersComposite of all biometric pillars
Institutional deployments apply a private attestation bar — not published here.
The humanity score inside the JITTER-HVP Seal is not a probability. It is a mathematical attestation bound to a unique session. It cannot be replicated. It cannot be forged.
Trust — Privacy-first architecture
Trust built on accurate design.
JITTER is privacy-first: rich analysis stays on your device, while only the minimal encrypted metadata required for signing and verification is sent over HTTPS — never your full document.
Privacy-first architecture
Local analysis, minimal server metadata
Encrypted at rest (AES-256-GCM)
HVP-PRIVACY · DEFENSE IN DEPTH
MULTI-PERIMETER SECURITY ARCHITECTURE
Outward-only egress: each gate adds assurance; readable document content never crosses the device boundary.
LAYER 01DEVICE ENCLAVE
LAYER 02TLS ATTEST
LAYER 03REGISTRY (OPT)
01
LAYER 01 / LOCALOn-device drafting analysisRhythm, pauses, and composition signals.
Keystroke timing, editing statistics, and a local SHA-256 fingerprint (textHash) of observed typing-related inputs are processed in your browser to compute a session humanity score. No readable document text leaves your device. Raw event logs stay local and are stored encrypted in Chrome extension storage; they are not uploaded as raw logs.
02
LAYER 02 / SIGNCryptographic signing (HTTPS)Minimal metadata for HMAC-SHA256 attestation.
To bind your session to a tamper-evident seal, the extension sends your Google Doc ID plus a deterministic digest of aggregated score details over TLS to our signing API. The secret key never lives in the extension; the server returns the signature used in reports and verification.
03
LAYER 03 / REGISTRYOptional registry fieldsScore, word count, one-way hash.
A separate endpoint may receive document id, rounded humanity score, observed word count, and the one-way cryptographic hash textHash (SHA-256), solely to support third-party verification flows. Your actual document text never leaves your device.
DATA FLOW: DEVICE → SIGNING API (TLS) → OPTIONAL REGISTRY · NO FULL-TEXT EXFIL