Reference & Verification
The goal is independent verification: a third party can reconstruct a knowledge state from referenced inputs and confirm the expected SHA-256 snapshot hash. Same inputs → same reconstructed state → same hash.
Verify in 60 seconds
This is the minimal verification loop. It is intentionally simple and auditable.
Pick a snapshot
Replay deterministically
Compute the hash
Compare + report
Verification Example
A minimal public example of the verification flow. Independent implementations performing deterministic replay must obtain the identical snapshot hash.
$ digiemu verify demo_bundle_v1.json Snapshot: 9c6a1e4e8d5c... Computed: 9c6a1e4e8d5c... Result: PASS
This example is illustrative and shows the expected public verification shape: select inputs, replay deterministically, compute the canonical SHA-256 state hash, compare against the expected snapshot, and emit a result.
CLI Contract v1 (reference interface)
This interface reflects the locked CLI contract v1. It documents the normative input/output shape and does not imply a distributed binary release.
# Placeholder (interface example — not a released CLI yet)
digiemu verify \
--snapshot <SHA256> \
--inputs ./inputs \
--out ./report.json
# Expected output:
# report.json (PASS/FAIL, computedHash, expectedHash, referencedInputs, metadata)Audit artifacts
These artifacts define the verification mechanics, test expectations, and decision provenance. Drafts are published as downloadable PDF while the public spec stabilizes.
Specification
Authoritative definition of data formats, snapshot semantics, and verification APIs.
DownloadV1.0Determinism (Formal)
Formal definition of determinism, replay invariants, and reproducibility guarantees.
DownloadV1.0Audit Framework
Procedures for capturing, storing, and validating audit evidence and decision provenance.
DownloadV1.0Conformance
Testable requirements and acceptance criteria implementers must meet for compliance.
DownloadV1.0Certification
Technical evidence and assessment steps used during certification and audits.
DownloadV1.0Governance
Roles, change control, and release practices that ensure traceability and accountability.
DownloadV1.0Security Model
Threat assumptions and protection goals.
DownloadV1.0Threat Model
Adversaries, attack surfaces and mitigations.
DownloadV1.0Deployment Guidelines
Operational guidance for reproducible builds and verification.
DownloadV1.0Independent verification principle
Verification must be possible without privileged access. A third party should be able to implement replay independently and still obtain the identical hash for the same referenced inputs.