If it ran,
you can prove it.
$ curl -X POST https://api.serialalice.pt/v2/certificate-requests -H "Authorization: Bearer sa_..." -d '{
"workload_id":"training_run_001",
"measurement_source":"nvml",
"energy_wh":847.3,
"grid_region":"EU-PT"
}'
# 202 Accepted — proof being issued...
{
"certificate_id": "sa-a087bcd798724d5c",
"status": "ISSUED",
"proof": {
"signature": "ed25519:7f3a...",
"overall_valid": true
},
"verify_url": "https://api.serialalice.pt/v2/certificates/.../verify"
}
Compute is no longer a black box.
AI training runs
Turn long-running GPU training into signed records with verifiable energy and execution evidence.
GPU inference jobs
Prove batch and production inference workloads without relying on screenshots, spreadsheets or manual reports.
Batch data pipelines
Attach proof to ETL, scheduled compute and data processing jobs across broader infrastructure contexts.
CPU workloads
Support broader compute environments beyond GPU-first workflows, including CPU and system-level measurement evidence.
Energy reporting
Move from internal estimates to signed evidence for customers, procurement and technical review.
Carbon accounting
Use verifiable compute records as input for sustainability and CSRD-related reporting processes.
Four steps from workload to proof.
Send workload data
POST your compute job metadata — workload ID, energy reading, measurement source, grid region.
Certificate is issued
The policy engine computes energy and CO₂ from your measurement. A signed certificate is persisted.
Signed and anchored
Ed25519 signature over SHA-256 hash. Merkle batch submitted to Polygon. CT log entry appended.
Anyone verifies independently
Verification is public. No auth. No account. No trust in Serial Alice. Just math.
Verification does not require trusting Serial Alice.
Hash integrity
Certificate payload is hashed. Any modification invalidates the hash.
Ed25519 signature
Hash is signed. Public key published at /v2/trust/keys. Offline verification supported.
Merkle inclusion
Certificate batched into a Merkle tree. Root submitted to Polygon calldata.
Blockchain anchor
Merkle root confirmed on-chain. Independent of Serial Alice database.
CT log chain
Append-only transparency log. Hash chain from genesis. Tampering detectable.
AI workloads are exploding. Proof is no longer optional.
One metric. Three tiers.
Start proving your workloads.
Serial Alice is the missing layer between compute and trust. Issue signed records, verify them anywhere, and stop asking counterparties to "just trust the dashboard."