Cryptographic provenance and AI accountability for regulated systems.

A post-quantum WORM ledger, hybrid signature primitives, and signed AI inference receipts — built so a federal auditor can verify any decision years later without contacting the vendor.

See Demo See the stack

Three primitives, sold as a slice or a stack

01 / LEDGER

Hyfstele Ledger

Append-only chain with KMS-anchored block and checkpoint signing. Each WORM artifact is independently verifiable from its own bytes plus a published HSM public key — no live ledger lookup needed.

SHA-256 canonical · ECDSA P-256 (Cloud KMS HSM) · 7-year retention

02 / HASH

Hyfstele Hash

Hybrid classical + post-quantum signature primitives and key-set intersection (Bezout) tooling. One crypto core powers federal, commercial, and AI surfaces — FIPS-aligned defaults with cloud-agnostic deployment.

ML-DSA-65 + ECDSA hybrid · FIPS 204 aligned · patent pending

Read the engineering brief →

03 / CAIR

Hyfstele CAIR

Cryptographically Auditable Inference Receipts. Every model decision becomes a signed event chained into the ledger, with an anomaly-detector proof component. AI accountability that survives a vendor going dark.

cair-v1 event schema · ZK anomaly proofs · ledger-anchored

Live demo

Live · ARM26BX01-NV001

Army ITV — coalition in-transit visibility

Operator console for multi-party chain-of-custody on coalition logistics. Sealed batches publish to a hardware-rooted ledger; tampered events fail a deterministic verification protocol that runs entirely in the browser.

See Demo