Trust without trusting us.
The goal is simple: you should be able to verify our claims offline—without our infrastructure, without our word.
Threat model (what can go wrong)
- Systems drift. Documentation lies.
- Logs get edited, deleted, or rewritten.
- Vendors disappear. Links rot.
- Audits become disputes.
What we commit to
- Offline verification: bundles include verifier scripts and content hashes.
- Continuity: append-only receipts with chain linkage between events.
- Determinism: the same inputs produce the same outputs.
What we don't do
- No silent mutations.
- No "trust our dashboard" as the only proof.
- No opaque attestations you can't validate independently.