Why verification matters
Verification ensures your AI workloads run securely in genuine TEE hardware. You get cryptographic proof that:- Hardware is authentic - GPUs and CPUs are from trusted vendors and running in secure TEE mode
- Software is untampered - The entire software stack from OS to application code is verified
- Responses are trustworthy - Every AI response comes with proof it ran in a secure TEE
1
TEE Hardware Stack
Verify the physical hardware stack, including CPU and GPU, is genuine and running in a secure TEE. Confirm the signing key is cryptographically bound to the hardware.
2
TEE Software Stack
Verify that the software stack, including operating system, Docker compose configuration, container build provenance, network end-to-end encryption, and distributed root-of-trust, is secure and trustworthy.
3
Integrity Proof
Verify the integrity of request and response content through cryptographic signatures.
How the trust chain works
These verification steps create a complete security chain:- Fresh Nonce prevents replay attacks - ensures attestations are generated fresh for your request
- TEE Hardware Stack establishes the physical foundation - genuine NVIDIA GPUs and Intel CPUs with TEE enabled
- Report Data Binding proves the signing key belongs to the TEE - signing address and nonce are cryptographically embedded in hardware-signed attestation
- TEE Software Stack extends trust to the software layer - verified OS, exact Docker compose configuration, and container build provenance
- Integrity Proof ensures data authenticity - cryptographic signatures prove responses came from the verified TEE
Verify Attestation
Learn how to verify hardware authenticity, report data binding, operating system integrity, Docker compose configuration, container build provenance, network end-to-end encryption, and distributed root-of-trust
Integrity Proof
Learn how to verify cryptographic signatures to ensure request and response integrity

