Security • Integrity Model
Tamper-evident by design
NeuroPoS is a trust-grade integrity pipeline: deterministic derivations, cryptographic commitments, publisher signatures, and optional on-chain anchoring — enabling independent verification without centralized trust.
Threat model
Trust boundaries
Disclosure
We guarantee
- Tamper evidence: any mutation changes hashes/roots/signatures.
- Reproducibility: same finalized inputs produce the same outputs.
- Independent verification: you can verify without trusting NeuroPoS servers.
- Clear provenance: published artifacts are bound to a signed trust policy.
We do NOT claim
- Intent attribution or guilt (“who is bad”).
- Protocol-level security guarantees (economic / governance attacks).
- Slashing decisions or punishment mechanisms.
- Real-time monitoring accuracy (NeuroPoS is finalized/range-scoped).
Threat model
What the design detects or mitigates, and what is explicitly out of scope.
Threats addressed
- API manipulation (proof mismatch reveals tampering)
- Storage tampering (content-addressed hashes fail)
- Dataset mutation (Merkle roots diverge)
- Serialization ambiguity (canonical bytes prevent drift)
- Single RPC drift (quorum inputs reduce single-source errors)
Out of scope
- Consensus-level economic attacks
- Governance/social attacks
- Collusion beyond the observable finalized data
- Attributing intent or “blame”
Trust boundaries
No single component is trusted alone. Integrity is established through reproducible computation + cryptographic commitments.
[ RPC Providers ] (untrusted individually)
↓
[ Quorum collector ] (strict 2/3 policy over finalized artifacts)
↓
[ Deterministic derivations ] (pure functions; canonical ordering; fixed-point rules)
↓
[ Merkle commitments ] (roots_v2)
↓
[ Checkpoint hash ] (canonical serialization → stable bytes)
↓
[ Publisher signatures ] (verified via trust_store.json, KID-only)
↓
[ Optional on-chain anchor ] (envelope_hash + trust_store_hash)
↓
[ Verifier ] (independent; can run offline with mirrored blobs)
Key point:
If any layer lies or mutates data, verifiers detect it via mismatched hashes/roots/signatures (and anchoring, if used).
Trust store & key governance
Trust is explicit: keys are referenced by KID, policies are versioned, and rotation is safe.
KID-only identity
Verifiers pin keys by KID from trust_store.json, not by mutable labels.
Policy-driven signatures
Signature requirements are defined by policy (e.g., hybrid + required).
Rotation-safe
New keys can be introduced without changing verifier code; policy changes are explicit.
Anchoring can pin policy
On-chain anchoring may include trust_store_hash to bind the verification policy to time.
On-chain anchoring (optional)
Anchoring adds an independent public timestamp and immutability check. Proofs remain verifiable without anchoring.
- Anchoring commits to envelope_hash (bundle/manifest/checkpoint/roots) and optionally trust_store_hash.
- Verifiers recompute envelope_hash locally and compare with on-chain values.
- Reorg/confirmation policy is part of the anchoring worker state machine.
Neutrality & anti-shaming policy
Evidence-first does not mean harassment-first. Defaults are designed to avoid “name-and-shame” dynamics.
No public rankings
No leaderboards of “bad validators”. Signals are range-scoped.
Neutral language
Outputs are “verified / mismatch / requires review”, not accusations.
Evidence portability
Proof references allow operators and auditors to verify and discuss facts.
Range context
Every signal is tied to a specific epoch/range (context-first, not blame-first).
IP notice
NeuroPoS includes proprietary techniques for deterministic derivations and scoring. Client-side UI does not ship proprietary formulas; verification relies on cryptographic commitments and reproducible evidence.
- Certain pipeline components, including aspects of scoring/derivation methods and their parameterization, may be subject to one or more patent applications.
- This notice does not grant any license. Any rights are reserved to the extent permitted by applicable law.
- NeuroPoS avoids exposing proprietary scoring logic in the browser; the UI renders results returned by the API along with evidence fields, model identifiers, and hashes.
- Independent verification remains possible: recompute commitments and validate signatures/anchoring—without relying on hidden client-side logic.
Transparency boundary:
We publish verifiable commitments, roots, and proof references. We do not publish proprietary scoring formulas client-side.
“Patent pending” means an application may be filed and/or pending; it does not imply that a patent has been granted.
What is verifiable vs proprietary
Verifiable (public contract)
- Bundle hash (content-addressed)
- Merkle roots + checkpoint hash
- Publisher signatures + trust store policy
- Optional on-chain anchoring hashes
Proprietary (not shipped in UI)
- Scoring/weighting formula internals
- Parameterization beyond published hashes
- Non-essential heuristics not required for verification
- Implementation details outside the verification contract
For IP/licensing inquiries: ip@neuropos.io
Responsible disclosure
If you find a vulnerability or integrity issue, report it with minimal public exposure.
Security contact
security@neuropos.io
What to include
Repro steps, affected endpoints/pages, expected vs observed behavior, and any proof references.
Policy:
Coordinated disclosure. Fix first, publish details after mitigation. No public blame.