Veracity & IP Proof
Result shielding strategy and trade secret protection.
Proof of Results Veracity
Your fear of someone questioning the results is legitimate. To shield against this, we use a three-layer protection and evidence strategy.
1. Immutable Timestamp
Guarantee the irrefutable chronology of your innovation.
Blockchain Notarization
Use of the free OriginStamp or OpenTimestamps to engrave documents and results on the Bitcoin blockchain with an immutable hash.
GitHub Audit
Your eusheriff/abs-core repository already serves as evidence of
prior art — each commit has an auditable date and SHA-1 hash.
Implementation Protocol (Free)
To perform "Blockchain Notarization" at no cost, we use the OpenTimestamps standard, which aggregates hashes of thousands of documents into a single Bitcoin transaction, making it free for the end user.
Hands-on (Via Script)
We added a utility to the repository to facilitate this process.
# 1. Choose the evidence file (e.g., benchmark logs or architecture PDF)
./scripts/notarize.sh docs/technical/benchmarks.mdx
# Expected Output:
# Success! Proof file created: docs/technical/benchmarks.mdx.otsHow to verify (Proof of Authorship)
Any independent auditor can verify the proof using the original file and the timestamp file (.ots):
ots verify docs/technical/benchmarks.mdx.ots
# > Calendar timestamp: confirmed by Bitcoin block #834021Important: The .ots stamp proves that the file existed in that exact format
at that exact moment. If you change a single byte of the file, the proof
fails. That's why we use this on final versions or snapshots.
2. Public Technical Evidence
Publish benchmarks with auditable methodology to secure technical credibility without exposing business secrets.
Real Logs (Anonymized)
Real logs demonstrating the <50ms latency of the WASM kernel, proving performance without disclosing the client.
Reproducible Tests
Reproducible test cases available directly in the public repository for independent validation.
Signed Results
A RESULTS.md file cryptographically signed with your public GPG key, ensuring data hasn't been tampered with.
3. Public Documentation Protection (Layer 3)
"Layer 3 Protection" defines what should be public for commercial purposes and what is kept as a Trade Secret.
Publishing Matrix
Public (What to sell)
- High-level concepts and architecture. * Business benefits and ROI. * Just enough to sell — not enough to replicate.
Private (Trade Secret)
- Exact semantic entropy analysis algorithm. * Internal execution of the Risk Engine (Rust/WASM). * AICCP scoring formulas.
Trade Secret: Trade secrets do not need formal notary registration. They only require reasonable measures of secrecy (such as restricted access and NDAs) to acquire global legal protection via TRIPS agreements.