Append-Only Signed Records
Every log entry is Ed25519-signed with hash-chain linkage. Tampering with any entry breaks the chain.
VeriLog turns device telemetry into a verifiable evidence stream: append-only records, signed checkpoints, privacy-aware payloads, and a clear path toward zero-knowledge integrity proofs — all in a single binary.
The open-source base edition provides a complete tamper-evident logging lifecycle for edge devices.
Every log entry is Ed25519-signed with hash-chain linkage. Tampering with any entry breaks the chain.
Fixed-height incremental Merkle tree with per-entry root updates. O(height) cost per append operation.
Generate and verify inclusion proofs for any entry without revealing other records in the log.
Deterministic re-verification of the entire hash chain, signatures, and Merkle roots from stored data.
Portable, signed snapshots for archival anchoring, external timestamping, and third-party audit workflows.
Local HTTP dashboard for demo and inspection: status, proofs, checkpoints, and research instrumentation.
TOML configuration with sensible defaults for tree height, admin bind, privacy budgets, and retention policies.
Explicit fsync boundaries on entries, leaves, and atomic meta writes with parent directory sync for crash safety.
Four crates, one binary. Clean separation of concerns with explicit trust boundaries.
VeriLog assumes the device may be compromised after evidence is captured. The system provides tamper-evidence, not tamper-prevention.
Privacy controls are not bolted on — they are part of the evidence pipeline. Budget tracking and noise application happen before signing.
A fixed-height incremental Merkle tree provides O(height) updates and compact membership proofs without storing the entire tree.
Insert a leaf and update the frontier in height steps. No rebalancing.
Membership proofs are a sibling path: one 32-byte hash per tree level.
Re-hash from leaf to root using the sibling path. Compare against the committed root.
Supports up to 4 billion entries. Configurable at store initialization.
Organized across four pillars: integrity, privacy, efficiency, and federation. Each track has defined hypotheses, milestones, and metrics.
Most products cover one or two of these wedges. VeriLog treats them as one protocol family.
Not just logging — evidence capture on unreliable devices. Tamper detection after compromise, portable proof bundles, and third-party validation without device secrets.
Foundation — partially realizedDifferential privacy on the same proof surface as integrity. Auditors verify policy conformance without seeing raw telemetry.
In progress — base DP primitives shippedSigned checkpoints bridge local logs to long-term archives, external timestamping, and compliance review.
Active — checkpoint system shippedThe long-term leap: correlated evidence transcripts with verifiable forwarding and mesh synchronization.
Research — transcript formats plannedPhased approach: stable base edition first, enterprise research in parallel.