Verify by Proof ID
Or Upload RunProof File
How Verification Works
๐
Hash Chain
Every event is linked by cryptographic hash to the previous one
โ๏ธ
Signatures
Each proof is signed by the runtime that produced it
๐ก๏ธ
Policy Governance
Proofs record which policies governed the execution