Identity in computing has historically been framed as a static attribute: a device is defined by its keys, fuses, or load-time measurements. This mirrors substance-based accounts of identity in philosophy, where persistence is attributed to fixed properties rather than to continuity across time, as in Parfit’s analysis of psychological continuity 1 and Dennett’s stance-dependent model of identity 2. Modern AI systems break this framing. Their behavior is shaped by the coupled dynamics of hardware, runtime, and model execution. Their identity is not a stored artifact but a realized phenomenon—something that emerges from execution rather than configuration. Bridge Overview. This article serves as the connective layer between the two foundational components of the Engram corpus. Engram Signature established execution‑realized identity and the structural mapping that extracts invariants from the substrate. Engram Provenance defined execution‑rooted chain‑of‑custody and temporal identity projection. The present bridge article unifies these constructs by introducing substrate‑rooted attestation, the mechanism that links identity continuity to provenance continuity. This integration forms the doctrinal spine—identity → attestation → provenance → governance—that the Engram Layer Taxonomy will formalize in subsequent work. This article builds on two foundational preprints: **Engram Signature**, which introduced execution-realized identity 14, and **Engram Provenance**, which defined execution-rooted chain-of-custody 15. We treat **Engram**, the execution-realized cognitive process, as the ontological base; **Engram Signature** as the identity invariant extracted from that process; and **provenance** as the historical projection of that invariant across time. These constructs are distinct yet inseparable: Engram identity, Signature provenance, and provenance reproducibility. All three are functions of the same execution substrate, observed at different temporal resolutions. By grounding identity in execution behavior, we make it impossible to discuss provenance without execution, and impossible to discuss identity without substrate. This reframing unifies two previously separate lines of work—execution-realized identity and execution-rooted provenance—into a single doctrinal arc. The result is a substrate-rooted attestation model that treats continuity, stability, and behavioral invariants as first-class security properties.
Building similarity graph...
Analyzing shared references across papers
Loading...
Aure Ecker-Fils
Building similarity graph...
Analyzing shared references across papers
Loading...
Aure Ecker-Fils (Sat,) studied this question.
www.synapsesocial.com/papers/698979e9f0ec2af6756e7f88 — DOI: https://doi.org/10.5281/zenodo.18517407