Build it like your business

Tick what applies. Type your numbers. ROI rebuilds live.

No fixed demo. Tell us what you operate, what a dispute costs you, and what deflection rate you target. The pricing column on the right rebuilds itself with the same outcome-aligned model in our briefing vaults: $25K pilot floor · $0.10 per signed receipt · 7% of on-chain-verified recovery (capped 2× usage / $500K Y1) · $50K platform fee. There is no scenario where you pay Hive without recovering verifiable value.

Inputs · tick + type

Your business, your way

Live ROI · outcome-aligned

What this is worth on your books

Tick a box to start. Your numbers, your math. Hive's pricing rebuilds itself live as you type.

Addressable cost

$0 disputes/yr × loaded cost

Recoverable value

$0 at deflection target

What you pay Hive (Y1)

$75K pilot + platform + usage + recovery share

Net to you, Year 1

$0 Recovery minus everything you pay Hive

Worst-case CFO math

Year-1 floor (pilot + platform only): $75K. Year-1 ceiling (with full caps reached): $575K. There is no scenario where you pay Hive without verifiable recovery on your books.

Floor: $75K · Ceiling: $575K

Industry anchors: Mastercard 2025 chargeback economics · Citi Institute Feb 2026 · NIST CSWP 48 (Sept 2025) · DoD CIO PQC memorandum (Nov 2025). Hive's marginal-cost figure ($0.02 USDC per receipt) is auditable against the live x402 rail at hivecompute-g2g7.onrender.com.

Verify

Offline receipt verification and sealed inspection

Paste a Hive receipt or a ViewKey-wrapped envelope below. Every cryptographic operation runs in your browser using the platform’s native WebCrypto runtime. Nothing is sent to a Hive server. Nothing is logged.

No backend call · Ed25519 / SHA-256 / AES-GCM · Source: window.crypto.subtle
Input

Receipt envelope

Paste a JSON receipt produced by the Hive substrate. The envelope contains a payload, an Ed25519 public key, and a signature. We verify the signature and recompute the payload hash (SHA-256) so you can check both fields independently.

Samples
Result

Cryptographic check

All checks happen client-side. The signature is verified against the embedded public key. The payload hash is recomputed and compared. Both must pass.

Awaiting input
Paste a receipt and click Verify, or load a sample.
Input

Sealed envelope + auditor key

A Hive sealed inspection envelope is an AES-GCM ciphertext wrapped to an authorized auditor key. Paste the envelope and your auditor key (base64). We decrypt locally and surface the signed transcript along with its provenance chain.

Samples
Decrypted transcript

Provenance + signed events

Decryption uses the AES-GCM authenticated mode. If the auditor key does not match or the ciphertext was tampered, decryption fails and no plaintext is surfaced.

Awaiting input
Paste a sealed envelope and your auditor key, then click Inspect.
No backend
Local-only

Open DevTools, kill your network, paste a receipt. It still works. The cryptographic primitives are part of the browser.

No logs
No telemetry

This page contains no analytics, no fingerprinting, no third-party scripts. Inspect the source.

Real algorithms
Ed25519 + AES-GCM

Receipts use Ed25519 signatures and SHA-256 payload hashes. Sealed inspection uses AES-256-GCM authenticated encryption.

Open path
Reproducible

The verifier source is below. Run the same checks in any language with a comparable WebCrypto port.

Next action
Move from understanding → proof → activation. Same URL throughout.