Verify an inference in 30 seconds:
npx six-verifier sample-receipt.json
The receipt proves: who ran it, what model, when, and that the output wasn't tampered with.
Not "trust our logs" — actual cryptographic proof. Signed receipts + Merkle attestations.
More at:
https://six-sov.com
Happy to answer technical questions — threat model, crypto choices, performance tradeoffs.