Hardware attested
Independent evidence sources are signed into the canonical payload. Cross-validation passed, so the posture is earned instead of asserted.
Every AI workload becomes a signed, anchored,
hardware-attested record.
Verifiable by auditors, regulators and infrastructure teams —
without trusting Serial Alice.
NVML + RAPL · Dual-source validation · Ed25519 + ML-DSA · Polygon anchored · Offline verifiable
The trust chain
Each layer is independent. Each is cryptographically bound to the next. Any tampering at any step breaks the chain and invalidates the proof.
Each evidence flag is part of the signed canonical payload.
Flip one bit → signature invalid → Merkle leaf invalid → anchor invalid.
Trust posture
Every certificate declares a posture computed from the evidence actually present, not from what the operator says is present. The score decides the tier.
Independent evidence sources are signed into the canonical payload. Cross-validation passed, so the posture is earned instead of asserted.
At least two sources agree on the measurement. A single sensor with no peer validation cannot land in this tier.
The operator declared the value. It remains auditable as a starting baseline, but it is not treated as physical proof.
Failed evidence is recorded but never increases the score. Posture is upgrade-only: a certificate never silently downgrades.
Why it matters
Energy and emissions are reported in spreadsheets, exported from vendor dashboards, and reconciled by hand. Auditors trust the operator; regulators trust the auditor; everyone trusts the chain of paperwork.
Serial Alice replaces that chain with cryptographic evidence — measured at the hardware, signed at capture, anchored on-chain.
Trust the paperwork.
Verify the math.
Every watt measured. Every workload optimized. Every proof verifiable.
One system. Any energy source.
Built on a universal energy measurement and verification engine — spanning GPUs, servers, and physical infrastructure.
Measure anything that consumes energy
How it works
Six stages — fully automated. Each one is part of the signed canonical payload, so any tampering breaks every downstream proof.
Hardware-level capture at sub-second resolution. NVML for GPU, RAPL for CPU and DRAM, signed exporter sidecars for tamper-evidence at the source.
agent · /v2/attestationsWorkload-level attribution by cgroup, PID, scheduler binding, or CPU-time share. Per-tenant, per-model, per-session — no shared aggregates.
cgroup · sched · machine_idEnergy Savings Agent computes safe GPU power-limit reductions, applies them, measures real impact, reverts if it breaks throughput.
/v1/optimization/sessionsSHA-256 canonical hash, then hybrid Ed25519 + ML-DSA signature. Post-quantum-ready from day one. Key id attached.
Ed25519 + ML-DSA · FIPS 204Merkle roots committed to Polygon mainnet in batched transactions. Calldata SERIAL-ALICE-BATCH:<id>:<root>.
Anyone, with or without an API key. The offline bundle replays every layer in a 30-line Python script. No service dependency.
/v2/verify · /v2/certificates/{id}/bundleThe output
Six stages collapse into a single canonical object: hardware-measured, signed at capture, anchored on Polygon. That object is what a court, a regulator or a counterparty inspects — without trusting us.
Live verification
This certificate can be verified without trusting Serial Alice.
Cryptographic signatures · independent hardware sensors · on-chain anchor.
Paste any certificate ID below — or open the full public verifier:
Proof of value · RTX 5090 · Anchored on Polygon
FP32 → FP16 on an RTX 5090. Same silicon, same workload type, real NVML telemetry sampled at sub-second resolution.
+229% efficiency gain — cryptographically signed, Merkle-batched, anchored on Polygon mainnet. Not estimated. Not self-reported. Verifiable by anyone, forever.
From 0.92 TFLOPS/Wh on FP32 → 3.03 TFLOPS/Wh on FP16
Use cases
From a single GPU rack to a 50 MW data centre, the same canonical certificate carries through. One signature standard, one Merkle batch, one verification path — regardless of scale.
Certify every inference call, training run, and fine-tuning job. Per-request energy attribution for LLM APIs — scoped to tenant, model, and session. EU AI Act Article 51 compliant from day one.
Floor-level energy certification via BMS and smart meters. Prove consumption by zone, tenant, or equipment type. BREEAM and ISO 50001 ready.
FORTEX reads directly from Modbus and SCADA systems. Certify energy per production line, per shift, per product. GHG Protocol Scope 1 ready.
Auditors get machine-readable, cryptographically signed bundles. No spreadsheets that can be altered. Every number traceable to a raw meter reading.
Attach verifiable production certificates to renewable energy contracts. Buyers get cryptographic proof of origin — not a promise on letterhead.
Scope 3 emissions require energy data from suppliers. Give your partners one API call to certify their consumption and pass it upstream — verified, signed, anchored.
Compliance
Designed to survive audits, not just generate reports.
CSRD-ready. GHG-aligned. ISO-compatible. Every certificate is structured for audit, export, and regulatory validation — automatically.
Independent counter-signer
Serial Alice signs the measurement.
FORTEX signs the validation.
Two keys. Two organisations. One bundle. Either signature can be verified
without the other — a structural separation that holds up in court, audit
and cross-border due diligence.
FAQ
Short, specific answers. Each one cross-links to the technical page that goes deeper.
/v2/issuers, mirrorable). The Merkle inclusion proof and Polygon anchor are independent of our database. Download the offline bundle and verify it in ~30 lines of Python with no API call.
Try the public verifier →
/sys/class/powercap RAPL interface (most x86_64 servers and workstations since Sandy Bridge). The agent runs on Linux and Windows; no special permissions on the kernel beyond what NVML/RAPL already expose.
SERIAL-ALICE-BATCH:<id>:<merkle_root> and proves the root was committed at the block's timestamp.
Pricing
Every plan includes hybrid Ed25519 + ML-DSA signing, Merkle batching, Polygon anchoring, transparency log inclusion, and unlimited offline verification. Verification itself is — and will always be — free and public.
Infrastructure for physical truth in AI systems
Hardware-measured. Cryptographically signed. Anchored on Polygon. Verifiable by anyone, in any jurisdiction, for as long as the chain exists.
Resources
All tools, documentation and dashboards — no extra login required.