Trust

Trust is what is provable, not what is promised.

Hive’s trust model is mechanical. Every claim on this page is implemented in code that produces an artifact you can verify yourself — most of them in under a minute, offline, with no Hive endpoint involved.

Cryptographic by construction · Verifiable offline · Independent of Hive
Mechanical proofs

Six things you can verify without us.

Each block below maps to a specific cryptographic primitive and a specific surface in the platform. There is no honor system.

LIVE

Receipt verification

Ed25519 signatures from requester, operator, and Hive are verified against SHA-256 anchors of the request and response. Tampering, forgery, or substitution is detected offline. Run it now →

signingEd25519 · 3-of-3
integritySHA-256
verificationoffline
LIVE

Sealed inspection

Sensitive payloads are sealed at the operator with AES-256-GCM. ViewKey grants are time-bound, scope-bound, and themselves signed receipts. The platform never sees plaintext. Wrong-key authentication fails closed.

sealingAES-256-GCM
accessViewKey · time-bound
plaintextnever seen by platform
LIVE

Settlement

USDC on Base. Circle-issued contract 0x833589f…A02913. Settlement hash is co-signed into the receipt at close. Hive does not operate this contract and does not custody balances. Treasury receipt: 0x15184Bf…B436E.

assetUSDC · Circle
chainBase
custodynon-custodial
LIVE

Operator attestation

Operators co-sign region, training-region, and hardware-class fields with their own keys. If the operator cannot sign, the route is denied before compute begins. There is no fall-through.

fieldsregion · training · hardware
signingoperator key · independent
fallbackdeny on unmatched
LIVE

Independence

Hive is neutral by charter. Hive is not a model lab, not a cloud provider, not an exchange, not a recommendation engine. Routing decisions are determined by the requester’s signed policy, not by Hive.

policydeclared by requester
routingdeterministic
commercial steeringnone
LIVE

Continuity

Receipts are portable, offline-verifiable artifacts. Verification does not require a Hive endpoint. If Hive is unavailable, every receipt ever issued remains independently verifiable using public keys you have already pinned.

verificationstateless · offline
dependencenone on Hive

Failure mode. If any primitive above fails to verify — signature, hash, seal, attestation, or settlement — the receipt is treated as invalid and the call is rejected at routing time, before settlement. There is no silent fallback.

Audit posture

Status. Reported plainly.

We will not tag a control as held until it is held. We will not tag a track as live until it is.

ControlStatusNotes
Ed25519 signing · 3-of-3LIVEReceipts in production
AES-256-GCM payload sealingLIVEOperator-side sealing, ViewKey access
USDC on Base settlementLIVECircle-issued contract
Operator co-signatureLIVERegion · training · hardware
SOC 2 Type IIN PROGRESSReadiness assessment under way
ISO 27001 readinessIN PROGRESSPre-cert scoping
SOC 2 Type IINOT YET HELDWill follow Type I
ISO 27001 certificationNOT YET HELDWill follow readiness
FedRAMPNOT YET HELDRoadmap only
Track · Post-Quantum Readiness

Hive Standard ships today. Hive-PQ is a pilot premium evidence profile.

Hive Standard uses live classical verification rails today. Hive-PQ is a pilot premium evidence profile for regulated, high-retention workflows. We separate what is shipping from what is in pilot from what is on the roadmap. We do not relabel pilot work as live.

CapabilityStatusNotes
Ed25519 signed receiptsLIVEHive Standard rail, in production
SHA-256 / BLAKE3 hash commitmentsLIVEAs applicable per receipt profile
AES-256-GCM sealed inspectionLIVEOperator-side sealing, ViewKey access
Offline verifierLIVEBrowser-side, five round-trips
USDC on Base settlement referenceLIVECircle-issued contract
Hive-PQ receipt profilePILOTPremium evidence mode for regulated workflows
Crypto-agile receipt metadataPILOTAlgorithm-agnostic envelope structure
Dual-signature receipt posturePILOTClassical + post-quantum-ready signature metadata
SMSH-PQ sealed evidence profilePILOTDesigned to support ML-KEM / Kyber-class envelopes
SHOD-PQ declaration profilePILOTEd25519 today; ML-DSA-ready posture
RubricMesh proof-tier selectionPILOTPer-transaction Standard / Pro / PQ
Formal ML-DSA / Dilithium-class signaturesROADMAPNot yet implemented
Formal ML-KEM / Kyber-class sealed envelopesROADMAPNot yet implemented
Independent cryptographic reviewROADMAPThird-party assessment of PQ profile
Post-quantum verifier compatibility testingROADMAPCross-implementation verifier suite
Hive-PQ is post-quantum-ready and crypto-agile by design. Hive does not claim quantum-proof, unbreakable, or production ML-KEM / ML-DSA integration unless implemented.
Powered by Wave-Lattice. The singularity-class receipt profile — ML-DSA-65 · ML-KEM-768 · 6-axis MAPET physical entropy, CAVP self-test PASS against NIST ACVP vectors — delivers post-quantum agent identity and attestation integrity as live infrastructure. See the cryptographic evidence →
Next

Verify a receipt now.

The reference verifier runs in your browser. Five round-trips: valid receipt, tampered receipt, forged signature, sealed-valid AES-GCM, wrong-key authentication failure. Roughly sixty seconds end to end.

Next action
Move from understanding → proof → activation. Same URL throughout.
From verification to deployment
You have verified the primitives.
The next step is to scope where Hive fits your transaction surface.
Design my private Hive briefing Activate pilot