Attested Intelligence
Contact

Trust Model

Verify offline. Do not trust infrastructure.

What Attested Proves

Integrity

The artifact has not been modified since attestation. BLAKE2b-256 hash verification ensures bit-for-bit integrity.

Continuity

Chain of custody from attestation to verification. Evidence bundles maintain provenance through the verification chain.

Policy Binding

Constraints and metadata cryptographically bound to the artifact. Policy artifacts are signed alongside the primary attestation.

Offline Verification

Verification requires no network connectivity or trusted third parties. All cryptographic operations are deterministic and local.

What Attested Does Not Prove

Identity

Attestation does not verify real-world identity of the attester. Keys prove possession, not identity.

Hardware Trust

No hardware attestation or secure enclave verification is implied unless explicitly enabled and documented.

Content Legality

Attestation verifies cryptographic properties, not the legality, accuracy, or fitness of the underlying content.

Timestamp Authority

Unless RFC 3161 TSA is explicitly enabled, timestamps reflect self-reported time, not authoritative time.

Security Posture

Hashing AlgorithmBLAKE2b-256
Signature SchemeEd25519
Schema FormatJSON Schema 2020-12
Transport SecurityTLS 1.3
Key StorageUser-controlled
Audit LoggingImmutable

Version Information

Site Version1.0.4
Schema Version1.0
Registry Version1.0.0

Security Disclosures

For responsible disclosure of security vulnerabilities:

security@attestedintelligence.com

PGP key available upon request. We aim to acknowledge reports within 48 hours.

Questions about our trust model or security practices?

Contact Us →