Continuity Chain
Tamper-evident sequence of enforcement receipts. Provides verifiable, immutable audit trail that can be verified offline.
What is Continuity?
The continuity chain is a hash-linked sequence of receipts that records every attestation, policy decision, and enforcement action. Each receipt includes a reference to the previous receipt's hash, creating a chain that cannot be modified without detection.
Unlike centralized audit logs that require trust in the log operator, the continuity chain can be verified by any party with access to the receipts. Tampering—insertion, deletion, or modification of any receipt—is cryptographically detectable.
Baseline Algorithm
Chain Structure
Verification Checklist
A verifier checks the following properties to validate chain integrity:
Hash Linking
Each receipt's prev_hash matches the computed hash of the previous receipt
Sequence Continuity
Sequence numbers are strictly increasing with no gaps
Signature Validity
Each receipt signature verifies against the issuer's public key
Temporal Order
Timestamps are monotonically increasing (optional TSA verification)
Policy Reference
Referenced policy artifacts exist and are properly sealed
Action Consistency
Action data hashes match the recorded action_hash values
Merkle Root Anchoring
Future versions will support Merkle root anchoring. Periodically, a Merkle root of recent receipts is computed and published to an immutable public record. This provides:
- Third-party verifiable timestamps
- Compact proofs for individual receipts
- Public anchor points for chain verification
This feature is not currently implemented. The baseline hash-linking algorithm provides tamper evidence without external anchoring.