Level 0 — Deterministic Integrity
Status: Active
- SHA-256 integrity hashing of all decision inputs, outputs, and policy snapshots
- Canonical JSON serialisation for reproducible computation
- Replay verification — recompute and compare at any time
- Frozen policy snapshots bound to each decision
| Property | Value |
|---|---|
| Hash algorithm | SHA-256 |
| Canonicalisation | Recursive key-sort + JSON.stringify |
| Replay endpoint | GET /v1/decisions/{id}/replay |
Level 1 — Cryptographic Signatures
Status: Active
- Ed25519 digital signature on every decision receipt
- Key versioning (
msk_v1) with documented rotation runbook - Offline verification — no network call required to validate
- Current + previous key support for graceful rotation
| Property | Value |
|---|---|
| Signature algorithm | Ed25519 (RFC 8032) |
| Key format | SPKI DER, base64-encoded |
| Key ID | msk_v1 |
| Verification | Web Crypto API / Node.js crypto |
Level 2 — Transparency Anchoring
Even if MeshQu disappears, receipts remain independently verifiable. Capabilities:- Anchored to Sigstore Rekor — a public, immutable transparency log
- DSSE envelope with in-toto attestation statement
- Merkle tree inclusion proofs for tamper-evident ordering
- Graceful degradation — signing is never blocked by log availability
| Property | Value |
|---|---|
| Transparency log | Sigstore Rekor (rekor.sigstore.dev) |
| Entry format | DSSE envelope + in-toto statement |
| Proof type | Merkle tree inclusion proof |
| Degradation | Signed but unanchored if Rekor unreachable |
Why DSSE, not hashedrekord? Ed25519 is incompatible with Rekor’s
hashedrekord entry type (sigstore/rekor#851). MeshQu uses DSSE envelopes with in-toto attestation statements instead.Level 3 — Hardware-Bound Identity
Signing keys never leave secure hardware. Capabilities:- Hardware security modules (HSM) or Cloud KMS for key storage
- Agent-level identity binding — each agent gets its own attested key
- Attestation chains linking decisions to specific hardware enclaves
- FIPS 140-2 Level 3+ compliance path
How to Verify
Web Verifier
Paste any decision receipt JSON. Integrity hash, signature, and transparency anchor are validated in your browser — no API call, no authentication.
Verification CLI
Open-source command-line tool for independent receipt verification. Coming soon.