Verify an
energy attestation.
This certificate can be verified without trusting Serial Alice.
Cryptographic signatures · independent hardware sensors · on-chain anchor.
Why this verification is independent
The certificate's hash and Ed25519 signature are checked against the
issuer's public key in /v2/issuers — a registry you can mirror.
Trust posture and confidence score derive from
multiple independent hardware sensors (NVML GPU + RAPL CPU/DRAM),
a signed exporter sidecar, a host fingerprint match, and an optional TEE
attestation. Each evidence flag is part of the signed canonical payload —
flipping any one of them invalidates the signature.
The Merkle leaf for this certificate is committed to Polygon mainnet as
part of a batch root. The on-chain transaction's calldata reads
SERIAL-ALICE-BATCH:<batch_id>:<merkle_root> — Polygon itself
certifies that root was committed in the block, and the inclusion proof
lets you recompute that root from the leaf without trusting our database.
The offline bundle gives you everything (cert, evidence chain, issuer key, inclusion proof, anchor metadata) as a single signed file you can verify in air-gapped environments with a 30-line Python script — no Serial Alice API call required.