49 results for “topic:tamper-evident”
immudb - immutable database based on zero trust, SQL/Key-Value/Document model, tamperproof, data change history
Simplifies comparing photos of tamper-evident seals and patterns using your eyes
Scalable and practical Byzantine fault detection middleware for transactional database systems
The scalable, auditable and high-performance tamper-evident log project
The open protocol for cryptographically sealed audit records of autonomous AI operations. SHA3-256 + Ed25519 + hash chain. Spec, conformance suite, and reference implementations in Python and TypeScript.
https://forgeproof.flyingcloudtech.com
Reference architecture for fail-open, witness-only evidence systems with independent verification and public settlement.
Small playground for ideas and mini-trees for QED
ARI — Artificial Reasoning Intelligence. Personal AI operating system with 7-layer architecture, three-pillar cognition (LOGOS/ETHOS/PATHOS), constitutional governance, and tamper-evident SHA-256 audit trails. Local-first. Multi-agent. TypeScript.
Open-source SDK and CLI for tamper-evident audit logging. Standalone verification, no server required.
No description provided.
Flash is a C library and CLI for append-only, verifiable event streams stored in ".flsh" files.
Go verifier for the Capsule Protocol Specification (CPS). Canonical JSON, SHA3-256, Ed25519. Passes all 16 golden vectors.
A tamper-evident audit built in Rust from IoT devices to cloud services
A consent-first framework for human–ASI collaboration: versioned, cryptographically signed, and written from lived experience of identity continuity.
Capsule Protocol integration for LiteLLM. Automatic cryptographic audit trail for every LLM call.
Capture autonomous agent execution as verifiable semantic events with JSONL, SQLite, and PostgreSQL backends.
Cryptographically verifiable, tamper-evident audit logging for Java and .NET.
Evidex is a command-line tool designed to capture and verify the integrity of collections of files. It produces deterministic manifests and tamper-evident audit logs so that the state of digital evidence can be verified later
Tamper-evident audit trail for OpenClaw agent runs
A cryptographically verifiable distributed time system, designed for systems that require trusted, monotonic, replay‑resistant time.
Cryptographic receipt system for AI agent accountability. Tamper-evident, hash-chained receipts with Ed25519/HMAC signing.
Provide tamper-proof, CMMC-compliant execution receipts that document AI agent actions in regulated environments for clear accountability.
An Identity, Security, and Governance Framework for autonomous agents
Tamper-evident AI decision audit trail for Python — EU AI Act, HIPAA, GDPR, SOC 2 compliant logging for LangChain, CrewAI, AutoGen, OpenAI agents
A verifiable Quality-on-Demand (QoD) proof service that produces cryptographically signed telemetry artifacts and enables independent verification of network performance claims.
A contestable, checkable, versioned public record for humans and AI.
MCP server — 10 tools, Ed25519 signing, deterministic state
High-speed cryptographic liability scanner for WORM compliance. Evaluates data gravity, identifies missing Ed25519 sidecars, and calculates exposure risk against SEC 17a-4 and ESIC chain-of-custody standards.
Tamper-evident audit trail with SHA-256 hash chaining, Ed25519 signatures, and Merkle tree anchoring