Public verifier · no API key required

Verify an
energy attestation.

This certificate can be verified without trusting Serial Alice.
Cryptographic signatures · independent hardware sensors · on-chain anchor.

Try an anchored example certificate →
Trust posture
Trust score
Anchor
·
Signature Ed25519
Awaiting verification…
·
Trust posture policy
Awaiting…
·
Evidence sources multi-sensor
Awaiting…
·
Merkle inclusion proof
Awaiting…
·
On-chain anchor Polygon
Awaiting…
·
Offline bundle portable
Awaiting…
📦 Download offline bundle 🔗 View Polygon transaction ⚖ Policy decisions View raw certificate →

Why this verification is independent

The certificate's hash and Ed25519 signature are checked against the issuer's public key in /v2/issuers — a registry you can mirror. Trust posture and confidence score derive from multiple independent hardware sensors (NVML GPU + RAPL CPU/DRAM), a signed exporter sidecar, a host fingerprint match, and an optional TEE attestation. Each evidence flag is part of the signed canonical payload — flipping any one of them invalidates the signature.

The Merkle leaf for this certificate is committed to Polygon mainnet as part of a batch root. The on-chain transaction's calldata reads SERIAL-ALICE-BATCH:<batch_id>:<merkle_root> — Polygon itself certifies that root was committed in the block, and the inclusion proof lets you recompute that root from the leaf without trusting our database.

The offline bundle gives you everything (cert, evidence chain, issuer key, inclusion proof, anchor metadata) as a single signed file you can verify in air-gapped environments with a 30-line Python script — no Serial Alice API call required.