Skip to main content

HGCP: A Voluntary Signing Framework for Human Expression in the Age of AI
draft-taoqiwen-hgcp-05

Document Type Active Internet-Draft (individual)
Author Qiwen Tao
Last updated 2025-04-17
RFC stream Independent Submission
Intended RFC status Informational
Formats
Stream ISE state In ISE Review
Consensus boilerplate Unknown
Document shepherd (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-taoqiwen-hgcp-05
Network Working Group                                             Q. Tao
Internet-Draft                                    Independent Researcher
Intended status: Informational                             17 April 2025
Expires: 19 October 2025

 HGCP: A Voluntary Signing Framework for Human Expression in the Age of
                                   AI
                         draft-taoqiwen-hgcp-05

Abstract

   In an era where AI-generated content has become indistinguishable
   from human writing, the Human-Generated Content Protocol (HGCP)
   proposes a voluntary signing framework that enables human authors to
   publicly acknowledge their expressions.  Rather than detecting or
   classifying content origin, HGCP allows individuals to declare, in a
   structured and verifiable format, that they take responsibility for a
   specific piece of content.  The protocol is platform-neutral,
   identity-flexible, and suitable for both real-name and pseudonymous
   use.  It does not evaluate accuracy, originality, or quality; it
   simply enables people to say: “This is mine, and I stand by it.” By
   providing a lightweight, human-first declaration format, HGCP aims to
   preserve the visibility of human agency within an increasingly
   synthetic information ecosystem.

About This Document

   This note is to be removed before publishing as an RFC.

   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-taoqiwen-hgcp/.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

Tao                      Expires 19 October 2025                [Page 1]
Internet-Draft                    HGCP                        April 2025

   This Internet-Draft will expire on 19 October 2025.

Copyright Notice

   Copyright (c) 2025 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  The Problem of Expression Trust . . . . . . . . . . . . . . .   4
   3.  The Philosophy of HGCP: Responsibility Over Provenance  . . .   5
   4.  Signature Declaration Structure . . . . . . . . . . . . . . .   5
     4.1.  Required Fields:  . . . . . . . . . . . . . . . . . . . .   5
     4.2.  Optional Fields:  . . . . . . . . . . . . . . . . . . . .   7
     4.3.  Interpretation and Implementation Guidance  . . . . . . .   9
     4.4.  Signature Semantics and Identity Boundaries . . . . . . .  10
     4.5.  Text-Style Declaration (Human-Readable,
           Non-Verifiable):  . . . . . . . . . . . . . . . . . . . .  10
     4.6.  Example HGCP Signature (JSON):  . . . . . . . . . . . . .  11
     4.7.  Versioning: . . . . . . . . . . . . . . . . . . . . . . .  11
   5.  Platform and Tool Integration Suggestions . . . . . . . . . .  11
     5.1.  For content platforms:  . . . . . . . . . . . . . . . . .  12
     5.2.  For authoring tools:  . . . . . . . . . . . . . . . . . .  12
     5.3.  For reader tools and browser extensions:  . . . . . . . .  12
   6.  Social and Ethical Considerations . . . . . . . . . . . . . .  13
   7.  Illustrative Scenarios (Non-Normative)  . . . . . . . . . . .  14
     7.1.  Example: Personal Blog Post (AI-Assisted,
           Pseudonymous) . . . . . . . . . . . . . . . . . . . . . .  14
     7.2.  Example: Anonymous Discussion Post  . . . . . . . . . . .  14
   8.  Common Questions and Answers  . . . . . . . . . . . . . . . .  14
     8.1.  Questions 1: “Signing doesn’t stop misinformation.” . . .  15
     8.2.  Questions 2: “Anyone—including bad actors—can sign
           too.” . . . . . . . . . . . . . . . . . . . . . . . . . .  15
     8.3.  Questions 3: “Why not require real names?”  . . . . . . .  15
     8.4.  Note: . . . . . . . . . . . . . . . . . . . . . . . . . .  15
   9.  Scope and Limits of Human Responsibility  . . . . . . . . . .  15
   10. Why We Need HGCP Now  . . . . . . . . . . . . . . . . . . . .  16
   11. Future Extensions and Evolving Use Cases  . . . . . . . . . .  17
   12. IANA Considerations . . . . . . . . . . . . . . . . . . . . .  18
   13. Security Considerations . . . . . . . . . . . . . . . . . . .  18
     13.1.  Identity Impersonation and Signature Forgery . . . . . .  18

Tao                      Expires 19 October 2025                [Page 2]
Internet-Draft                    HGCP                        April 2025

     13.2.  Mass Signature Automation (Sybil Behavior) . . . . . . .  18
     13.3.  Content Hash Evasion via Trivial Edits . . . . . . . . .  18
     13.4.  Revocation Misuse and Responsibility Evasion . . . . . .  19
     13.5.  Absence of Native Trust or Scoring Mechanisms  . . . . .  19
     13.6.  Final Note . . . . . . . . . . . . . . . . . . . . . . .  19
   14. Informative References  . . . . . . . . . . . . . . . . . . .  19
   Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . .  20
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  20

1.  Introduction

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

   In the rapidly evolving digital world, a flood of content from
   countless sources fills our screens—much of it now automatically
   generated and detached from genuine human intent.  As artificial
   intelligence becomes increasingly proficient at mimicking human
   expression, the boundary between real thought and algorithmic
   generation is blurring.

   This rise in synthetic content presents a fundamental question: if we
   can no longer know who wrote something, can we know whether anyone is
   willing to stand behind it?

   The Human-Generated Content Protocol (HGCP) is a voluntary signing
   structure that addresses this problem—not by detecting or filtering
   AI-generated content, but by giving human authors a minimal and
   declarative way to say: “This is my expression, and I take
   responsibility for it.”

   HGCP is not a detection algorithm, classification tool, or identity
   system.  It is a responsibility declaration format.  It enables any
   writer—regardless of identity type or platform—to attach a
   timestamped, verifiable statement of authorship to their content.

   HGCP is intentionally minimal, non-intrusive, and flexible.  It does
   not require real names or centralized verification.  It does not
   replace content evaluation or moderation.  It simply offers a signal:
   someone, somewhere, chose to stand behind this piece of expression.

   The absence of a structured responsibility mechanism is not a new
   problem— it has long existed in anonymous, ephemeral, and low-
   accountability communication environments.  However, the rise of
   generative AI has dramatically amplified this issue, making it harder
   to distinguish not only what is true, but who stands behind a
   statement.

Tao                      Expires 19 October 2025                [Page 3]
Internet-Draft                    HGCP                        April 2025

   HGCP does not solve this problem by detecting content origins.
   Instead, it introduces a minimal structure for responsibility to be
   voluntarily expressed—when someone chooses to.  That signal, once
   made, can be interpreted and used however communities choose.

   HGCP is not a provenance or authenticity protocol like C2PA.  It does
   not provide cryptographic assurances about the origin, history, or
   integrity of digital content.  While each declaration includes a
   content_hash, this field simply identifies the expression being
   referenced—it does not validate or authenticate the content itself.
   Users or platforms may choose to integrate HGCP with other
   verification systems, but such usage lies beyond the scope of the
   protocol’s guarantees.

   This act of signing is a social gesture of responsibility—not a legal
   admission or factual claim.

2.  The Problem of Expression Trust

   The internet was originally built to foster human connection and
   communication.  Yet in a world where content creation, duplication,
   and distribution now approach zero cost, the origin of information
   has become increasingly obscured.

   We once inferred authorship and trust from domain names, writing
   style, and user profiles—but now, all of these can be simulated by
   AI.  This leads not only to an explosion of noise, but also to a
   subtle erosion of meaning: readers hesitate to believe; authors
   hesitate to take credit; platforms hesitate to accept risk.

   Many recent proposals have focused on "AI detection"—using
   classifiers to guess whether a given text was machine-generated.
   These tools are probabilistic, easily evaded, and often fail as
   models advance.

   HGCP shifts the question entirely.  It does not ask, “Was this
   content human-made?” It asks, “Is any human willing to say: this was
   me?”

   This seemingly small act—a signed statement of responsibility—may
   become the most important signal of authorship in an increasingly
   synthetic information ecosystem.  Not because it proves truth or
   identity, but because it reflects a human's willingness to be known
   as the author.

Tao                      Expires 19 October 2025                [Page 4]
Internet-Draft                    HGCP                        April 2025

3.  The Philosophy of HGCP: Responsibility Over Provenance

   The core idea of HGCP is not to verify originality, authorship, or
   human origin of content—but to offer a voluntary, structured way for
   a person to publicly acknowledge their expression.

   Whereas most systems ask, "Who created this?", HGCP asks something
   simpler and deeper: "Are you willing to say: I said this?"

   Signing under HGCP does not mean the content is accurate, valuable,
   or unique.  It only means: “This came from me, and I stand by it.” —
   socially, not legally.

   This transforms the act of signing into a declaration of presence—not
   a claim of authority, truth, or expertise.  To speak is not only to
   express; it is to be willing to be recognized as the speaker.

   HGCP is not anti-AI.  It does not reject AI assistance.  If a human
   chooses to sign something—even if AI helped—they are choosing to take
   human responsibility for the final output.

   HGCP does not care what tools you used, or what identity you chose.
   It only cares that someone—a person—was willing to leave their mark
   and say: “I won’t deny this is mine.”

   That act of responsibility is not a signal of trust.  It is the
   beginning of traceable expression—not verified authorship.

4.  Signature Declaration Structure

   HGCP provides a minimal and consistent way for individuals to attach
   a human-responsible declaration to their expression.  The purpose of
   this signature is not to validate the content's origin or truth, but
   to acknowledge authorship responsibility.

4.1.  Required Fields:

   *  *signer_id*

      A signer-provided identifier that links a human author to a
      specific declaration.

      This MAY be a stable pseudonym, public key fingerprint, platform
      handle, or decentralized ID.

      (Examples: "tao_qiwen", "0xDEADBEEF...", "@user42", or
      "did:example:abc123")

Tao                      Expires 19 October 2025                [Page 5]
Internet-Draft                    HGCP                        April 2025

      HGCP does not resolve or validate the authenticity of signer_id.
      The field is purely declarative.  Verification, if needed, MUST
      rely on external infrastructure or cryptographic proof.

   *  *timestamp*

      The UTC time when the signature was created, in [RFC3339] format.

      (Example: "2025-03-29T14:22:00Z")

      This value is provided by the signer and is intended to be
      informational only.

   *  *content_hash*

      A cryptographic digest of an external piece of content (e.g., a
      document, platform message, or expressive artifact).

      This field binds the HGCP object to that content and ensures that
      the signature applies to a specific, immutable version of it.

      The content itself is not embedded in the HGCP structure, but MUST
      be preserved externally in the exact UTF-8 byte representation
      used during hash computation.

      The content_hash field MUST be expressed as a [RFC6920] ni: URI,
      using Base64url encoding and including an algorithm identifier.
      This ensures that the declaration refers to an exact byte-level
      representation of the content and allows for future algorithm
      flexibility.

      The hash MUST be computed over the UTF-8 byte stream of the
      referenced content.  Newlines SHOULD be normalized to line feed
      (LF, \n) prior to hashing, to ensure consistency across platforms.

      Content MUST remain externally accessible and MUST NOT be embedded
      within the HGCP structure itself.

      This field exists solely to bind a declaration to a specific
      version of content.  It does not imply originality, correctness,
      or value—only that the declarant accepts responsibility for that
      particular content instance.

      (Example: "ni:///sha-256;dQnlvaDHYtK6x_kNdYtbImP6Acy8VCq1498WO-
      CObKk")

   *  *hgcp_version*

Tao                      Expires 19 October 2025                [Page 6]
Internet-Draft                    HGCP                        April 2025

      This field indicates the structural schema version of the
      declaration.  It helps implementations interpret the format
      correctly across protocol evolutions.  For full context on version
      compatibility and design principles, see Section 4.7.

      (Example: "0.2")

   *  *declaration*

      A plain, human-authored statement affirming responsibility for the
      associated content.

      This field MUST be encoded in UTF-8 and is treated as free-form
      text.  It may be written in any language and take any tone,
      structure, or expressive form—including natural language, code,
      symbolic notation, or creative fragments.

      HGCP does not interpret the meaning of the declaration.  Its role
      is to bind whatever was said—across languages, styles, and
      cultural contexts—to a structure of voluntary responsibility.  The
      significance or interpretability of a declaration is left to the
      communities and contexts in which it appears.

      HGCP does not require that declarations be serious, formal, or
      even linguistically coherent—only that a human actor chooses to
      stand behind them.

      The declaration is not legally binding, but serves as an ethical
      gesture: "I said this, and I choose to be recognized as the
      speaker."

      (Example: "I acknowledge that the above content was written by me
      and I take responsibility for it.")

4.2.  Optional Fields:

   The following fields are optional metadata declarations.

   HGCP does not define their behavior, validation logic, or semantics
   beyond suggestion.  They exist to support flexible human context, not
   to enforce structure or scoring.

   *  *retraction_policy*

      An optional declarative field indicating whether the signer
      expresses a preference or intent to revise, withdraw, or leave the
      signed content unchanged in the future.

Tao                      Expires 19 October 2025                [Page 7]
Internet-Draft                    HGCP                        April 2025

      Suggested values: - immutable — The signer does not intend to
      alter or retract this declaration.
      - may-retract — The signer may wish to revise or withdraw this
      declaration later.
      - editable-until-date — The signer considers the content mutable
      until a specified point in time (if supported by the platform).

      This field is purely expressive.  HGCP does not define any
      verification method, enforcement mechanism, or revocation
      registry.

      Platforms MAY interpret or display this field for user awareness,
      but MUST NOT treat it as a deletion command, a validity toggle, or
      a trigger for automatic suppression, hiding, or disqualification
      of content.

      HGCP recognizes that to be human is to change one’s mind—but also
      to remember that we once spoke.

   *  *signature*

      An optional cryptographic proof of authorship.

      This field allows declarants to provide a verifiable linkage
      between their identity and the referenced content.

      It MAY take one of the following forms: - a detached OpenPGP
      signature (see [RFC9580]); - a reference to an external signature
      file, accompanied by a content hash (see [RFC6920]); - a W3C
      Verifiable Credential or a DID-based proof using external
      verification infrastructure.

      The format of the signature field is implementation-defined and
      intentionally left open.  HGCP does not prescribe any specific
      cryptographic method or signature syntax.

      All forms of signature are optional, and their presence or absence
      MUST NOT affect the validity of the declaration.

      To preserve JSON compatibility, implementers are encouraged to
      avoid embedding multi-line PEM-formatted signatures directly in
      the signature field.  Such use is not prohibited, but MAY require
      special encoding or external referencing to avoid interoperability
      issues with JSON parsers.

Tao                      Expires 19 October 2025                [Page 8]
Internet-Draft                    HGCP                        April 2025

4.3.  Interpretation and Implementation Guidance

   Unlike content-integrated signature formats (e.g., PGP-signed files),
   HGCP is designed to sign arbitrary expressions without constraining
   how or where the signed content is stored.  This enables its use
   across messaging platforms, web interfaces, and decentralized
   protocols, without requiring control over the content’s storage
   location or delivery mechanism.

   The timestamp field is not cryptographically bound.  Its accuracy
   depends entirely on the signer's environment or device clock.
   Implementations MUST NOT use this value as a trusted source for
   ordering, deduplication, or timing logic unless verified through an
   external trusted source (e.g., timestamp authority or blockchain
   anchor).

   Tools and platforms MAY choose to interpret or visualize signer_id
   based on their own logic, but HGCP itself does not rank or
   authenticate identities.

   The hgcp_version field reflects structural format only.  It MUST NOT
   be interpreted as a signal of truthfulness, author credibility, or
   social legitimacy.  HGCP does not treat higher versions as superior
   in ethical value—only different in structure.  All valid HGCP
   declarations, regardless of version, represent equally human-
   responsible expression.

   The declaration and other human-authored fields (such as signer_id)
   are defined as free-form UTF-8 encoded text.  They may contain
   natural language in any script, code fragments, symbolic notations,
   or other expressive content.  HGCP does not interpret the semantic
   meaning of these fields—it only binds them structurally to a
   statement of human responsibility.

   To ensure display safety and prevent injection misuse,
   implementations:

   *  MUST treat all such fields as inert plain text;

   *  MUST escape HTML, scripts, and any executable markup before
      rendering;

   *  SHOULD normalize line endings to LF (\n) before hashing;

   *  SHOULD NOT execute, interpret, or embed these fields in active
      rendering contexts;

Tao                      Expires 19 October 2025                [Page 9]
Internet-Draft                    HGCP                        April 2025

   *  MAY impose reasonable limits on display (e.g., truncation, line
      limits, content folding);

   *  MUST preserve and expose the original content in full when
      requested or used for verification;

   *  Display restrictions MUST NOT alter, summarize, or reinterpret the
      original declaration.

   Platforms MAY apply local content safety filters (e.g., spam or abuse
   detection), but MUST NOT alter any external content referenced via
   content_hash.  Such content is cryptographically bound and must
   remain unchanged to preserve structural integrity.

   Although declaration is not cryptographically bound, implementations
   are strongly encouraged to preserve and display it faithfully, as it
   represents the declarant’s voluntary statement of responsibility.

4.4.  Signature Semantics and Identity Boundaries

   A declaration using a given signer_id does not constitute proof of
   identity.  Even when accompanied by a cryptographic signature, it
   only proves that the signer controls a specific private key—not that
   they are a particular person, group, or account in the broader social
   sense.  Users of widely-known pseudonyms should take care to sign
   declarations using verifiable means to discourage impersonation.

4.5.  Text-Style Declaration (Human-Readable, Non-Verifiable):

   This is how a human-readable HGCP declaration might appear when
   pasted at the end of a blog post, social media post, or informal
   document:

   signer_id: qiwen2025
   timestamp: 2025-03-29T14:22:00Z
   content_hash: ni:///sha-256;dQnlvaDHYtK6x_kNdYtbImP6Acy8VCq1498WO-CObKk
   hgcp_version: 0.1
   declaration: I confirm that the above content was published by me, and I take responsibility as a human author.

      Note: this is not protocol-valid HGCP

   Text-style declarations in HGCP are intended as human-readable
   expressions of responsibility.  They are suitable for low-
   infrastructure environments—such as blogs, printed materials, or oral
   contexts—where structured formats like JSON are not practical.

Tao                      Expires 19 October 2025               [Page 10]
Internet-Draft                    HGCP                        April 2025

   These declarations are not machine-verifiable, not cryptographically
   secure, and not structurally enforced.  HGCP does not define any
   parsing, validation, or enforcement logic for this format.

   They should be interpreted as non-binding social signals of
   authorship intent, not as formal protocol-level declarations.

4.6.  Example HGCP Signature (JSON):

   {
     "signer_id": "qiwen2025",
     "timestamp": "2025-03-29T14:22:00Z",
     "content_hash": "ni:///sha-256;dQnlvaDHYtK6x_kNdYtbImP6Acy8VCq1498WO-CObKk",
     "hgcp_version": "0.1",
     "declaration": "I confirm that the above content was published by me, and I take responsibility as a human author."
   }

4.7.  Versioning:

   HGCP versions indicate structural schema only.  They exist to support
   compatibility as the protocol evolves, *not* to signal truth value,
   author credibility, or software sophistication.

   All versions are equally valid expressions of human responsibility.

   *  *v0.1* — Defines the core declaration schema with required fields:
      signer_id, timestamp, content_hash, hgcp_version, and declaration.

   *  *v0.2* — Introduces the optional signature field, allowing
      declarants to attach cryptographic proofs of authorship where such
      verification is desired or supported.

      Future versions may support additional metadata such as multi-
      signer declarations, structured revocation formats, or content
      linking.  However, the core semantics of voluntary, self-
      recognized responsibility will remain unchanged.

   Yes, cryptographic proofs are stronger.  But not everyone can, will,
   or should need to use them.  And in HGCP, strength is not what
   defines humanity — recognition is.

5.  Platform and Tool Integration Suggestions

   HGCP is platform-neutral and decentralized.  It defines a minimal,
   voluntary declaration format—not a service, network, or identity
   protocol.

Tao                      Expires 19 October 2025               [Page 11]
Internet-Draft                    HGCP                        April 2025

   However, platforms and tools can enhance expression transparency and
   user agency by supporting HGCP-style signatures.

   The following integration suggestions are non-normative and fully
   optional:

5.1.  For content platforms:

   *  Support HGCP signature generation (e.g., auto-add timestamp,
      content hash, and a user-provided declaration)

   *  Display HGCP declarations visibly alongside content

   *  Allow users to export signed content with metadata (e.g., JSON-LD
      or plaintext blocks)

   *  Provide a "compare hash" feature to show whether the currently
      displayed content matches the signed declaration.  This does not
      imply content authenticity, nor require platforms to store the
      original version.

5.2.  For authoring tools:

   *  Markdown editors, word processors, or note apps can offer local
      HGCP signing plugins

   *  AI-assisted writing tools may include HGCP signature prompts
      during editing or export

   *  Submission systems may include a “human responsibility
      declaration” option on publication

5.3.  For reader tools and browser extensions:

   *  Detect and visually highlight HGCP-signed content (e.g., badges,
      overlays)

   *  Let readers inspect declaration structure and metadata

   *  Optionally offer a hash comparison feature to let users check
      whether content appears unchanged—this is not a guarantee of
      authenticity or integrity

      HGCP does not define or endorse any scoring, ranking, or
      reputation system.  Interpretation of signature patterns or signer
      behavior is left entirely to the platform or community.  The
      protocol only enables expression responsibility—it does not
      evaluate or score it.

Tao                      Expires 19 October 2025               [Page 12]
Internet-Draft                    HGCP                        April 2025

6.  Social and Ethical Considerations

   HGCP is not a replacement for content governance or moderation
   systems.  It is a voluntary declaration format designed to restore
   visibility to human-authored expressions in an increasingly hybrid
   and synthetic content landscape.

   HGCP does not:

   *  Detect or classify AI-generated content

   *  Track real-world identities or require de-anonymization

   *  Evaluate the truth, originality, or value of signed content

   *  Prevent unsigned content from being published or shared

   HGCP does protect:

   *  The right of anonymous or pseudonymous authors to claim authorship

   *  The right of each signer to choose their identifier and expression
      context

   *  The right to withdraw or replace one’s own signed declaration with
      a new one, while leaving prior statements traceable

   *  The right of platforms to adopt or extend HGCP support in their
      own way

   HGCP offers a decentralized path to expression responsibility.  Not
   by enforcing rules or judgments, but by providing a way for
   individuals to say:

      “This is what I said.  I stand by it.”

   Those who sign are not guaranteed to be believed.  But they are
   present.  They are accountable—not because a system judges them, but
   because they are willing to be known as the speaker.

   HGCP does not create trust.  It creates traceable ownership of
   speech.  It gives those who choose to acknowledge their words a way
   to be recognized—not as authorities, but as responsible authors.

Tao                      Expires 19 October 2025               [Page 13]
Internet-Draft                    HGCP                        April 2025

   Signers who wish to ensure the availability of their content over
   time should retain a local copy, or use decentralized content storage
   mechanisms.  HGCP declarations remain valid even if the referenced
   content is no longer publicly available—but their meaning may be lost
   if the content cannot be retrieved.

7.  Illustrative Scenarios (Non-Normative)

   The following examples are provided purely for illustrative purposes.
   They do not constrain the scope of HGCP usage, which applies to any
   expressive artifact.  These samples show how individuals might
   voluntarily declare authorship in informal online contexts.

7.1.  Example: Personal Blog Post (AI-Assisted, Pseudonymous)

   A pseudonymous blogger publishes a post written with the help of
   generative AI, and uses HGCP to declare that they accept
   responsibility for the final content.

   {
     "signer_id": "silentvoice",
     "timestamp": "2025-03-29T16:12Z",
     "content_hash": "ni:///sha-256;dQnlvaDHYtK6x_kNdYtbImP6Acy8VCq1498WO-CObKk",
     "hgcp_version": "0.1",
     "declaration": "This post was co-written with the assistance of a language model. I take responsibility for its final form."
   }

7.2.  Example: Anonymous Discussion Post

   An anonymous poster acknowledges human responsibility for their
   statement.

   {
     "signer_id": "anon321",
     "timestamp": "2025-03-29T17:35Z",
     "content_hash": "ni:///sha-256;dQnlvaDHYtK6x_kNdYtbImP6Acy8VCq1498WO-CObKk",
     "hgcp_version": "0.1",
     "declaration": "I stand by this statement as an individual human participant in this conversation."
   }

8.  Common Questions and Answers

   The following are common concerns and clarifications based on HGCP's
   minimal scope:

Tao                      Expires 19 October 2025               [Page 14]
Internet-Draft                    HGCP                        April 2025

8.1.  Questions 1: “Signing doesn’t stop misinformation.”

   Response: Correct.  HGCP is not a content moderation tool, fact-
   checking system, or truth validator.  Its purpose is not to prevent
   falsehoods, but to make the presence of human authorship visible.  It
   simply allows someone to say: “I said this, and I acknowledge it.”

   Whether a statement is correct or misleading is a separate
   question—to be handled by public debate, platform policy, or legal
   frameworks.  HGCP does not seek to replace those.

8.2.  Questions 2: “Anyone—including bad actors—can sign too.”

   Response: True.  HGCP is structurally neutral—it permits anyone to
   claim authorship.

   But just as speech itself is morally neutral, signing is simply a
   visible act of association.  HGCP does not prevent manipulation or
   abuse.  It only makes authorship claims visible and timestamped,
   enabling others to interpret and respond.

   Trust must be earned over time; HGCP merely reveals who is willing to
   stand behind their words.

8.3.  Questions 3: “Why not require real names?”

   Response: HGCP affirms the importance of anonymous and pseudonymous
   expression.  In many contexts, forced real-name use can threaten
   safety, chill dissent, or suppress marginalized voices.

   Responsibility does not require identity disclosure.  It only
   requires someone to say: “This is mine.” Even a pseudonym—used
   consistently—is enough to build visible presence and accountability
   over time.

8.4.  Note:

   HGCP enables voluntary, declarative authorship acknowledgment.  It
   complements—but does not replace—other systems of fact-checking,
   moderation, or trust.

   It is not a gatekeeper of credibility.  It is a container for
   voluntary responsibility—a human signal in a synthetic world.

9.  Scope and Limits of Human Responsibility

   HGCP affirms an ethical gesture of responsibility—not a legal or
   contractual obligation.

Tao                      Expires 19 October 2025               [Page 15]
Internet-Draft                    HGCP                        April 2025

   By signing, the author:

   *  Affirms they are human (or self-identify as such),

   *  Voluntarily claims authorship of the expression,

   *  Accepts potential social consequences of making that claim
      visible.

   However, the meaning of “responsibility” in HGCP must be clearly
   understood:

   *  HGCP does not confer legal liability, unless such liability is
      defined by external laws or agreements.

   *  HGCP does not guarantee truth, originality, or moral correctness.

   *  HGCP permits voluntary revocation or replacement of prior
      declarations.  Platforms may reflect such updates, but should
      avoid interpreting them as content deletion or retraction of
      historical authorship.

   Over time, a signer’s behavior—such as consistent authorship,
   frequent revocations, or contradictory claims—may influence how
   others interpret their expression history.  Such interpretations are
   entirely up to readers, communities, or platforms.  They are not part
   of HGCP’s structure or logic.

   HGCP is a signal of authorship, not a system of judgment.

   It is a flag of presence—not a badge of truth.

10.  Why We Need HGCP Now

   In an era where synthetic content floods our screens and truth feels
   elusive, what we are losing is not just facts—but responsibility.

   Expression has never merely been about information.  It is about
   standing behind what one says.

   HGCP is a quiet signal.  It is not a firewall, not a detection
   engine— It is a torch, held by those willing to say:

      “This is what I said.  And I am willing to be remembered for it.”

   Those who sign are not necessarily perfect, but they are present.
   They are not hiding.  They are willing to be named.

Tao                      Expires 19 October 2025               [Page 16]
Internet-Draft                    HGCP                        April 2025

   HGCP does not stop AI, nor does it determine the truth or value of
   content.  It offers a decentralized, human-first way to make
   authorship claims visible— not for control, but for clarity.

   Just as HTTPS makes communication verifiable, HGCP makes expression
   attributable.  Not by enforcing identity, but by inviting
   responsibility.

   In an age of artificial voice, what will stand out is not who speaks
   loudest— but who is willing to say:

      “Yes, this is mine.”

11.  Future Extensions and Evolving Use Cases

   HGCP is intentionally minimal.  Its current version focuses on text-
   based, single-signer declarations of human responsibility.

   However, real-world expression scenarios are far more diverse.
   Future optional companion drafts or community extensions may explore:

   *  Multi-signer declarations (e.g., co-authorship or joint
      statements)

   *  Multimedia content hashing (e.g., for audio, images, or video) may
      be explored, but care must be taken not to treat such hashes as
      guarantees of authenticity, truthfulness, or integrity

   *  Partial responsibility claims (e.g., paragraph-level declaration
      blocks)

   *  Rich contextual metadata for disclaimers, editing history, or
      framing

   Some use cases may inspire optional community-defined labels (e.g.,
   “editor”, “curator”, “translator”).  Such roles should be expressed
   via declaration text or companion specifications—not as formal
   protocol fields.

   These extensions are not part of the current protocol and remain
   exploratory.  Any evolution of HGCP should remain faithful to its
   core principle:

Tao                      Expires 19 October 2025               [Page 17]
Internet-Draft                    HGCP                        April 2025

      Responsibility, voluntarily claimed, should be made legible.
      New features must enhance this clarity—not obscure or
      overcomplicate it.
      Support for non-text content may be explored in future drafts,
      but HGCP currently focuses on declarations for text-based
      expressions.

12.  IANA Considerations

   This document has no IANA actions.

13.  Security Considerations

   HGCP does not introduce new network protocols or data exchange
   layers.  It poses no direct technical threats such as injection,
   eavesdropping, or man-in-the-middle attacks.

   However, HGCP introduces indirect risks, rooted in the potential
   misuse or misinterpretation of voluntary signature declarations.
   These risks are primarily social and structural, not cryptographic.

13.1.  Identity Impersonation and Signature Forgery

   Without optional cryptographic signing (e.g., OpenPGP), malicious
   actors may forge declarations using arbitrary signer IDs.  To
   mitigate impersonation, platforms may optionally support
   cryptographic binding, pseudonymous identity resolution, or signer
   attestation systems.

   HGCP itself does not provide or require any identity verification
   mechanism.  All verification and signer authentication are delegated
   to platform-level implementations, if desired.

13.2.  Mass Signature Automation (Sybil Behavior)

   In the absence of rate limits or friction, automated agents could
   mass-generate content with fake signature blocks to simulate presence
   at scale.  To reduce such noise, platforms may implement rate
   controls, account friction, or signature frequency thresholds.

13.3.  Content Hash Evasion via Trivial Edits

   HGCP uses cryptographic content hashes to bind the declaration to a
   specific text version.  Even minor changes (e.g., punctuation, emoji)
   generate different hashes, allowing close but unsigned derivatives to
   circulate unchallenged.

   Platforms may address this via:

Tao                      Expires 19 October 2025               [Page 18]
Internet-Draft                    HGCP                        April 2025

   *  Content snapshot storage alongside signature metadata

   *  Optional use of fuzzy hashing or similarity checks

   *  Encouraging authors to sign canonical versions of their work

13.4.  Revocation Misuse and Responsibility Evasion

   HGCP supports editable or revocable declarations, which enhances
   flexibility.  However, it may also allow strategic withdrawal or
   denial of public expression.

   Platforms are encouraged—but not required—to:

   *  Retain and display revocation timestamps or signature histories,
      where feasible

   *  Clearly indicate altered or withdrawn declarations

   *  Offer viewers transparent context about change history, if
      available

13.5.  Absence of Native Trust or Scoring Mechanisms

   HGCP intentionally avoids any native trust or scoring system.  All
   interpretations of signature consistency, credibility, or intent are
   left to the discretion of platforms or communities.

   Protocol-level neutrality ensures freedom, but also delegates
   responsibility for risk assessment to the surrounding ecosystem.

13.6.  Final Note

   HGCP’s security lies not in enforcement, but in visibility.  It
   offers no guarantees—only a format in which authors can voluntarily
   say:

      “This is mine.  I said this.”

   Whether others choose to believe, contest, or ignore such
   declarations is beyond the protocol’s scope.

   HGCP’s minimal structure invites participation, not control.

14.  Informative References

Tao                      Expires 19 October 2025               [Page 19]
Internet-Draft                    HGCP                        April 2025

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/rfc/rfc2119>.

   [RFC3339]  Klyne, G. and C. Newman, "Date and Time on the Internet:
              Timestamps", RFC 3339, DOI 10.17487/RFC3339, July 2002,
              <https://www.rfc-editor.org/rfc/rfc3339>.

   [RFC6920]  Farrell, S., Kutscher, D., Dannewitz, C., Ohlman, B.,
              Keranen, A., and P. Hallam-Baker, "Naming Things with
              Hashes", RFC 6920, DOI 10.17487/RFC6920, April 2013,
              <https://www.rfc-editor.org/rfc/rfc6920>.

   [RFC9580]  Wouters, P., Ed., Huigens, D., Winter, J., and Y. Niibe,
              "OpenPGP", RFC 9580, DOI 10.17487/RFC9580, July 2024,
              <https://www.rfc-editor.org/rfc/rfc9580>.

Acknowledgments

   This document was initially drafted using ChatGPT (OpenAI), and
   subsequently edited and approved by the human signer.  The signer
   acknowledges responsibility for the final content.

Author's Address

   Qiwen Tao
   Independent Researcher
   Email: natureconservation@yeah.net

Tao                      Expires 19 October 2025               [Page 20]