Tamper-Evident
Every event is signed and hash-chained. Evidence can be verified independently.
Provara Protocol
Provara Protocol makes memory tamper-evident, replayable, and readable on a 50-year horizon.
Every event is signed and hash-chained. Evidence can be verified independently.
Vault operators own keys and logs. No hosted dependency is required for verification.
Append-only NDJSON, deterministic replay, and non-normative indexes for scale.