background gif

Security

Security principles from the whitepapers: capability over identity, stateless offline verification, index‑recoverable commitments, and binary↔pool binding. (Sources: THE NEW ERA…, USER.EXPLAINER, HOLOGRAPHIC.)
Self‑Authenticating Operations
Every action carries a short‑lived capability tied to time (tau), context, and the intended entropy pool.
Replay & Deepfake Resistance
Tau windows and context binding prevent reuse; transcripts prove liveness and scope without server calls.
Index‑Recoverable Commitments
Authorized verifiers can recover indices by enumeration; outsiders learn nothing—privacy by construction.
No Keys at Rest
Eliminate static credentials entirely. Capabilities are scoped to a single action and expire quickly.
Air‑gapped & Edge Ready
Deterministic, offline verification—ideal for edge devices and disconnected or regulated environments.
Tamper‑Evident Evidence
Portable transcripts and integrity hashes provide immutable audit artifacts you can replay later.

Threats addressed

Guarantees