Privacy, Compliance, and Audit

Data Minimization

Evidence must satisfy sufficiency tests with minimal disclosure.

  • Media remains off-chain

  • On-chain stores only: RT, CIDIndex, verifier hash, and compact scores

Off-chain Storage

  • Artifacts are stored in IPFS/Arweave with CIDs

  • Enterprises may mirror encrypted copies for compliance

  • Access is mediated by capability tokens bound to job IDs and roles (poster, oracle, auditor, challenger)

Optional KYC and Geofencing

  • Jobs may require KYC for posters and enterprise fleets

  • Robots may remain pseudonymous but must meet stake tiers and geofence restrictions

  • Compliance modules log access for audits without putting PII on-chain

Auditability

  • Every transition emits events with deterministic fields

  • Verifier source and version hashes are public

  • Auditors can reconstruct decisions from on-chain events + off-chain artifacts using signatures and Merkle proofs