1 pointby kennmangum7 hours ago1 comment
  • kennmangum7 hours ago
    Verify an inference in 30 seconds: npx six-verifier sample-receipt.json The receipt proves: who ran it, what model, when, and that the output wasn't tampered with. Not "trust our logs" — actual cryptographic proof. Signed receipts + Merkle attestations. More at: https://six-sov.com Happy to answer technical questions — threat model, crypto choices, performance tradeoffs.