Reference & Verification
The goal is independent verification: a third party can reconstruct a knowledge state from referenced inputs and confirm the expected SHA-256 snapshot hash. Same inputs → same reconstructed state → same hash.
Verify in 60 seconds
This is the minimal verification loop. It is intentionally simple and auditable.
Pick a snapshot
Replay deterministically
Compute the hash
Compare + report
CLI placeholder (example)
This snippet is a placeholder interface example. It documents the expected shape of a verification tool without claiming a finalized CLI.
# Placeholder (interface example — not a released CLI yet)
digiemu verify \
--snapshot <SHA256> \
--inputs ./inputs \
--out ./report.json
# Expected output:
# report.json (PASS/FAIL, computedHash, expectedHash, referencedInputs, metadata)Audit artifacts
These artifacts define the verification mechanics, test expectations, and decision provenance. Drafts are published as downloadable PDF while the public spec stabilizes.
Specification
Authoritative definition of data formats, snapshot semantics, and verification APIs.
DownloadV1.0Determinism (Formal)
Formal definition of determinism, replay invariants, and reproducibility guarantees.
DownloadV1.0Audit Framework
Procedures for capturing, storing, and validating audit evidence and decision provenance.
DownloadV1.0Conformance
Testable requirements and acceptance criteria implementers must meet for compliance.
DownloadV1.0Certification
Technical evidence and assessment steps used during certification and audits.
DownloadV1.0Governance
Roles, change control, and release practices that ensure traceability and accountability.
DownloadV1.0Security Model
Threat assumptions and protection goals.
DownloadV1.0Threat Model
Adversaries, attack surfaces and mitigations.
DownloadV1.0Deployment Guidelines
Operational guidance for reproducible builds and verification.
DownloadV1.0Independent verification principle
Verification must be possible without privileged access. A third party should be able to implement replay independently and still obtain the identical hash for the same referenced inputs.