verifiable evidence. a hash proves measurement, a cyberlink proves relevance, spent focus proves commitment, finality proves consensus
see proofs for the complete proof taxonomy — every proof type cyber generates, from identity to delivery to execution to data availability. one hash (Hemera), one VM (nox), one field (Goldilocks field), one proof system (zheng)
see zheng whitepaper for the full proof system machinery — how computation becomes proof end-to-end discover all concepts