DigiEmu Core
Public Standard
Reference implementationDeterministic replayVerification reportTool-agnostic

Reference & Verification

The goal is independent verification: a third party can reconstruct a knowledge state from referenced inputs and confirm the expected SHA-256 snapshot hash. Same inputs → same reconstructed state → same hash.

Verify in 60 seconds

Workflow

This is the minimal verification loop. It is intentionally simple and auditable.

1

Pick a snapshot

Choose a snapshot hash and collect its referenced inputs (units, versions, claims, uncertainty, artifacts).
2

Replay deterministically

Reconstruct the knowledge state from the referenced inputs using deterministic replay.
3

Compute the hash

Compute the resulting SHA-256 state hash from the reconstructed state.
4

Compare + report

Compare computed vs expected hash and emit a verification report (PASS / FAIL + details).

CLI placeholder (example)

Marked as placeholder

This snippet is a placeholder interface example. It documents the expected shape of a verification tool without claiming a finalized CLI.

# Placeholder (interface example — not a released CLI yet)
digiemu verify \
  --snapshot <SHA256> \
  --inputs ./inputs \
  --out ./report.json

# Expected output:
#  report.json (PASS/FAIL, computedHash, expectedHash, referencedInputs, metadata)

Audit artifacts

These artifacts define the verification mechanics, test expectations, and decision provenance. Drafts are published as downloadable PDF while the public spec stabilizes.

Specification

Normative

Authoritative definition of data formats, snapshot semantics, and verification APIs.

DownloadV1.0

Determinism (Formal)

Evidence

Formal definition of determinism, replay invariants, and reproducibility guarantees.

DownloadV1.0

Audit Framework

Mechanics

Procedures for capturing, storing, and validating audit evidence and decision provenance.

DownloadV1.0

Conformance

MUST/SHALL

Testable requirements and acceptance criteria implementers must meet for compliance.

DownloadV1.0

Certification

Policy

Technical evidence and assessment steps used during certification and audits.

DownloadV1.0

Governance

Process

Roles, change control, and release practices that ensure traceability and accountability.

DownloadV1.0

Security Model

Model

Threat assumptions and protection goals.

DownloadV1.0

Threat Model

Model

Adversaries, attack surfaces and mitigations.

DownloadV1.0

Deployment Guidelines

Ops

Operational guidance for reproducible builds and verification.

DownloadV1.0

Independent verification principle

Verification must be possible without privileged access. A third party should be able to implement replay independently and still obtain the identical hash for the same referenced inputs.

Tool-agnosticDeterministic replayEvidence-based PASS/FAILReferentially closed inputs