verifiable evidence. a hash proves measurement, a cyberlink proves relevance, spent focus proves commitment, finality proves consensus

see proofs for the complete proof taxonomy — every proof type cyber generates, from identity to delivery to execution to data availability. one hash (Hemera), one VM (nox), one field (Goldilocks field), one proof system (zheng)

see zheng whitepaper for the full proof system machinery — how computation becomes proof end-to-end discover all concepts

Local Graph