Portable verification means that admissibility decisions can be verified independently of the runtime that produced them - by any party, on any infrastructure, at any point in time.Documentation Index
Fetch the complete documentation index at: https://docs.manthan.systems/llms.txt
Use this file to discover all available pages before exploring further.
The problem with runtime-bound trust
When governance trust is bound to a specific runtime instance, verification requires access to that runtime. This creates fragile compliance evidence:- Distributed nodes cannot verify decisions made by other nodes
- Auditors cannot independently verify historical decisions
- Long-term lineage reconstruction requires the original runtime to still be available
- Compliance evidence is fragile - it depends on infrastructure that may not exist at audit time
What an attestation contains
An attestation is self-contained - it includes everything needed for independent verification:The verification model
- 5 minutes after signing
- 5 years after signing
- On any platform
- In any language
- By any party with the public key
Runtime provenance
TheruntimeHash in every attestation pins the exact runtime that produced the decision:
- Historical attestations remain verifiable after the runtime is updated
- The runtime version that governed the decision is part of the signed proof
- Auditors can independently confirm the runtime version was known and trusted at signing time
Long-term archival
A governance decision made today must be verifiable in seven years. This requires:- The attestation is self-contained (no external state needed for verification)
- The
runtimeHashidentifies the exact runtime used - The policy version is pinned in the signed payload
- The signature algorithm (Ed25519) is stable, standardized, and widely supported
Portability in practice
| Scenario | What portability enables |
|---|---|
| Regulatory audits | Auditors verify without infrastructure access |
| Counterparty verification | Business partners verify decisions independently |
| Distributed systems | Each node verifies attestations from other nodes |
| Cross-jurisdiction compliance | Evidence verified by any regulatory authority |
| Long-term archival | Decisions verifiable years after signing |
The single rule
If a property of the signed payload can differ between the moment of signing and the moment of verification, trust is not portable.Wall-clock time, session identifiers, and non-deterministic state are excluded from the signed payload precisely because they would break this guarantee.
See also
- Trust Portability - the full portability model and what breaks it
- Attestations - the complete attestation field reference
- Verifier Package - standalone verification without the full runtime
- Deterministic Governance - why determinism is the foundation