Beyond HTTP

See also: Design Rationale — why these choices were made.

In 1995, attackers tapped traffic at Helsinki University of Technology and captured passwords from plaintext sessions. Tatu Ylönen responded with SSH: encrypt the channel, authenticate endpoints, make interception far harder. That decision was correct, and it worked. In parallel, TLS and HTTPS scaled the same channel-first model to the web. Together they shaped how we think about internet trust: secure the pipe, then trust what came through it.

That model solved confidentiality in transit. It did not solve portable proof for the data itself.

The gap after disconnect

HTTP was designed for documents on servers. It is excellent at request/response exchange. But once the connection is gone, the payload does not carry built-in answers to basic questions:

While online, server identity and TLS state can answer some of this. Offline, a copied payload is just bytes unless you preserve external context.

Over time, platforms filled that gap with central logs, account systems, and policy layers. They became memory, identity, and trust infrastructure for everyone else.

The HTTPS model also shaped social & political assumptions. If trust lives in channels, then platforms look like unavoidable dependencies with concentrated, often unchecked power. Without a message-first paradigm, there is no durable public marketplace of ideas — only administrators granting your (community’s) identity and injecting popularity feeds hosted only on their private servers as a single source of truth.

The inversion

HPPR changes one boundary:

A packet can be verified anywhere it travels, independent of the original connection.

Three packet layers

HPPR builds from three composable packet types.

1) Blob — data with intrinsic identity

A Blob is raw bytes with a typed hash markline.

The hash is both integrity proof and immutable address.

2) Plex — data with coordinate and time

A Plex wraps a Blob with:

Now the packet carries human location semantics such as //u/chess/README inside the signed/hashable structure.

3) Seal — data with authorship

A Seal wraps a Plex with:

Now integrity and authorship travel with the content itself.

Two ways to address the same world

HPPR deliberately keeps two address forms:

This resolves a long-running web tension:

Version selectors (/|/...) let you pin exact historical states when needed.

Repositories become hosts, not truth authorities

A repository stores packets and resolves coordinate lookups. It is operational infrastructure, not the root of truth.

If a repository disappears:

Failure shifts from “history disappears” to “routing needs repair.” That is a better failure mode for communities.

Identity and governance become inspectable

HPPR identity is key-based and packet-defined.

Membership and ACL policy are represented as packets, not hidden tables. That makes governance auditable:

This does not remove governance conflict. It makes governance state explicit.

Route trust and code trust are different decisions

Knowing where content is hosted is not the same as trusting it to execute code.

HAVI keeps these concerns separate:

This separation avoids a common failure in web systems where reachability silently becomes execution permission.

A practical design choice: start from group or app

A useful rule of thumb:

Both growth paths stay compatible because the coordinate model supports both.

What this enables

These are technical primitives with social consequences.

Durable civic memory

A local paper, school board, or neighborhood archive can publish signed records that remain verifiable after server migration, domain loss, or mirror changes.

Community-run software space

Different groups can run the same app model while keeping local membership and policy control.

Portable accountability

Authorship claims move with data. Verification does not require privileged access to a single company log store.

Lower-friction mirrors and backups

Anyone can mirror packets without breaking integrity guarantees, because proof is in the packet, not in transport metadata.

Scope and limits

HPPR does not solve every problem.

What it changes is the substrate:

Conclusion

The core principle is small and practical:

Validate messages by their own cryptographic structure, not by the channel that delivered them.

From that one change, you get a different internet architecture:

HPPR is not alone in exploring hashed and signed message systems. Projects such as Git, IPFS, Secure Scuttlebutt, and Nostr also show the value of content-addressed or signature-first data models. HPPR’s contribution is relative simplicity: three packet layers, explicit coordinates, and minimal rules that stay inspectable.

For exact wire format and validation rules, start with hppr/spec/010-PACKETS.md.