Skip to main content

Deployment Model

Reference Stack

Typical architecture may include:

  • Application layer (e.g., FastAPI)
  • Deterministic proof generation
  • Append-only ledger database
  • Canonical JSON output
  • Optional timestamp anchoring
  • TLS-secured gateway layer

The specific stack may evolve.

The deterministic proof model must remain stable.


Sovereign Configurations

Institutions may require:

  • Data residency guarantees
  • Isolated infrastructure
  • Private verification endpoints
  • Internal governance controls

Verification logic must remain interoperable across deployments.


Public Verification Separation

Verification endpoints can operate independently from:

  • Authentication systems
  • Business logic
  • Data storage

This ensures long-term verifiability even under organizational change.