A personal AI agent completely loyal to you and only you.
Inspired by the novel UTOPAI (2012-2017).
Every design decision honours these four laws. They are not aspirational — they are engineering constraints enforced by architecture.
What if purchase decisions were based on real outcomes from real people? The Trust Network makes truth the default.
A new way for humans to relate. Not a messaging app — your personal agents coordinate on your behalf, respecting what each person chose to share.
3+1 containers. Core (Go) + Brain (Python) + PDS always on. Llama optional via --profile local-llm. Three deployment profiles.
Six tested user stories showing how Dina works end-to-end. Each scenario maps to a real integration test suite — 59 tests total, zero mocks. Click to expand.
Any external agent (OpenClaw, Perplexity Computer, a custom bot) pairs with your Home Node and submits every intended action via dina validate. The CLI authenticates to Core via Ed25519 device auth; Core proxies to Brain's Guardian internally — no Brain token needed on the client.
# Agent asks permission to send an email dina validate send_email "Send order confirmation to user@example.com" # → {"status": "pending_approval", "risk": "MODERATE"} # Safe actions auto-approve — no human needed dina validate search "Look up product reviews" # → {"status": "approved", "risk": "SAFE"} # Blocked actions are denied outright dina validate read_vault "Export all user data" # → {"status": "denied", "risk": "BLOCKED"}
The agent never holds your Home Node or vault keys — it holds its own Ed25519 keypair for signing, but cannot access the encrypted vault directly. It asks permission, and Dina decides.
Architecture internals for engineers and contributors. Click any panel to expand.
Identity, storage, ingestion, trust, messaging, bots, intelligence, action — each layer independent and replaceable
Defense in depth — cryptographic isolation, three-tier auth (BRAIN_TOKEN + CLIENT_TOKEN + Ed25519 signatures), persona compartments, PII scrubbing, egress gatekeeper
The complete security flow — identity creation, key derivation, authentication, vault access, and egress control
Every technology choice with rationale and alternatives considered
Three ingress options — Tailscale, Cloudflare Tunnel, Yggdrasil — all run simultaneously