Validator Network

The validator network verifies recording authenticity without accessing content:

  • Decentralized pool of node operators.

  • Focused solely on validating recording legitimacy.

  • Provides consensus-based verification without privacy compromise.

Secure Validation Process

Validators work with encrypted data to maintain privacy:

  1. Encrypted Submission - Audio data is encrypted before submission.

  2. Secure Processing - Validation occurs within secure computing enclaves.

  3. Blind Verdict - Validators issue PASS/BLOCK decisions without seeing content.

  4. Consensus Formation - Multiple validators must agree for verification.

Privacy Guarantees

The validation system maintains strict privacy boundaries:

  • Validators never access raw audio content

  • End-to-end encryption between user devices and secure enclaves

  • Only derived metrics and verification results are visible to validators

Last updated