Cryptographic evidence of sovereignty. Verify enclave integrity, latency, and compliance in real-time.
Cryptographically verify the enclave code hash (PCR0) against the published source.