Privacy, Compliance, and Audit
Data Minimization
Evidence must satisfy sufficiency tests with minimal disclosure.
Media remains off-chain
On-chain stores only:
RT
,CIDIndex
, verifier hash, and compact scores
Off-chain Storage
Artifacts are stored in IPFS/Arweave with CIDs
Enterprises may mirror encrypted copies for compliance
Access is mediated by capability tokens bound to job IDs and roles (poster, oracle, auditor, challenger)
Optional KYC and Geofencing
Jobs may require KYC for posters and enterprise fleets
Robots may remain pseudonymous but must meet stake tiers and geofence restrictions
Compliance modules log access for audits without putting PII on-chain
Auditability
Every transition emits events with deterministic fields
Verifier source and version hashes are public
Auditors can reconstruct decisions from on-chain events + off-chain artifacts using signatures and Merkle proofs