Security
Data custody stays with the Client. Offline verification is first class. No telemetry by default.
Design posture
Air gapped capable
No outbound internet is required for runtime.
Zero telemetry
No phone home behavior is required for operation.
Client owned keys
Private keys are injected at runtime. No private keys are stored by the system.
Verification purity
Binding root computation is designed as a pure function flow.