Trust Model
Verify offline. Do not trust infrastructure.
What Attested Proves
Integrity
The artifact has not been modified since attestation. BLAKE2b-256 hash verification ensures bit-for-bit integrity.
Continuity
Chain of custody from attestation to verification. Evidence bundles maintain provenance through the verification chain.
Policy Binding
Constraints and metadata cryptographically bound to the artifact. Policy artifacts are signed alongside the primary attestation.
Offline Verification
Verification requires no network connectivity or trusted third parties. All cryptographic operations are deterministic and local.
What Attested Does Not Prove
Identity
Attestation does not verify real-world identity of the attester. Keys prove possession, not identity.
Hardware Trust
No hardware attestation or secure enclave verification is implied unless explicitly enabled and documented.
Content Legality
Attestation verifies cryptographic properties, not the legality, accuracy, or fitness of the underlying content.
Timestamp Authority
Unless RFC 3161 TSA is explicitly enabled, timestamps reflect self-reported time, not authoritative time.
Security Posture
Version Information
Security Disclosures
For responsible disclosure of security vulnerabilities:
security@attestedintelligence.comPGP key available upon request. We aim to acknowledge reports within 48 hours.
Questions about our trust model or security practices?
Contact Us →