§01
Transparency
Warrant canary, published monthly
On the first business day of each month we publish a signed statement that we have received zero national security letters, zero gag orders, and zero secret warrants. If the canary ever stops publishing, the silence itself is a signal — one we are legally permitted to give.
Signed by CEO + CISO · verifiable with our published public key
§02
Continuity
Successor custody — plan for the unplanned
Designate a verified professional successor who inherits read access to your sealed archive in case of retirement, incapacitation, or death. Trigger rules are configurable: voluntary handoff, 180-day inactivity, court order, or family-initiated. Successor must complete identity verification before access activates.
Shamir's Secret Sharing · 3-of-5 key split · no single party can access prematurely
§03
Deadman switch
Optional auto-revoke on inactivity
For safety-critical roles — structural engineers on open projects, notaries in active closings — you can set a deadman switch: if you don't sign in within your declared interval, your ability to issue new seals pauses automatically. Past seals remain valid; new ones require re-verification.
Declared interval: 7 days to 12 months · pause, don't revoke · verify to reactivate
§04
Multi-party
N-of-M collaborative sealing
High-stakes documents can require N of M professionals to co-sign — 3 of 5 structural engineers on a stadium design, 2 of 3 partners on an M&A closing. Each signer authenticates independently, and the final seal records each professional's contribution cryptographically.
Threshold signatures · per-signer audit trail · revocable until all N have signed
§05
Device integrity
Per-seal device attestation
Every seal event records the issuing device's Apple App Attestation, Android Play Integrity, or Windows TPM attestation. If a device is later found compromised, you can see exactly which seals came from it — without having to assume the worst about every seal you issued that year.
iOS App Attest · Android Play Integrity · TPM 2.0 on Windows · Secure Enclave-bound
§06
Zero-knowledge
Verify a license without revealing it
For regulator disclosures and privacy-sensitive audits, verifiers can prove "this person held an active license in Utah on date X" without learning the holder's name, license number, or any other identifier. Uses a standard zero-knowledge proof any auditor can verify independently.
zk-SNARK · Groth16 · verifiable with any compliant library · no trusted-setup leak
§07
External proof
Daily blockchain anchor
Every 24 hours we compute a Merkle root over all seals issued in the preceding day and publish it to a public blockchain (Bitcoin and Ethereum). Anyone — including us, later — can prove a seal existed on its claimed date without needing to trust our internal audit chain.
SHA-256 Merkle tree · OP_RETURN commit · OpenTimestamps format · verifiable offline
§08
Insurance
Insurance-backed enterprise seals
Every Enterprise seal comes with a professional liability insurance rider through our underwriter — coverage scaled by document class. If a seal is ever later found invalid due to platform error, the rider pays out directly; your firm doesn't have to litigate us to get made whole.
Lloyd's-syndicate backing · per-seal rider · coverage: $10k document → $5M document
§09
Regulatory disclosure
Encrypted legal disclosure locker
When your firm needs to hand audit data to a regulator or counsel, we generate an encrypted package that can only be opened by the recipient's verified device. No bulk email, no "blast to counsel" leak, no USB stick lost in a cab. Delivery is end-to-end encrypted and fully logged.
Per-recipient keypair · device-bound decryption · full access log · revocable link