Transparency log
We record every privileged decryption of user data in an append-only, hash-chained log. Every ten minutes the running Merkle root is signed by an HSM-rooted key and submitted to Sigstore Rekor, a publicly-operated log we don't run. Anyone can verify any anchored checkpoint.
Loading…