Sovereign, cryptographically-anchored memory.
The Forever Memory Doctrine. A memory cell is non-fakeable if and only if all three conditions hold: cryptographically bound (blake3 content commitment), anchored in publicly verifiable state (FIELD.MEMORY), and independently verifiable without trusting our server (Ed25519 signature).
If it cannot produce a receipt, it did not happen.
Store a memory cell. The cell is committed to FIELD.MEMORY at the live tip, signed by the sovereign Ed25519 key, and a receipt is returned that you can verify offline.
Verify that a memory exists at a given content commitment. This is public - anyone can do it without authentication.
Your current rate limits (issued per visitor DID, refreshed hourly).
Don't trust us - verify cryptographically on your own machine.
A single-file Python script. Runs offline. Uses only well-known audited libraries (blake3, pynacl). Recomputes content commitments, recomputes receipt hashes, verifies Ed25519 signatures - all on your machine.
Ed25519: ...
Domain separator: GENESIS-MEMORY-RECEIPT-v1|
GET /api/memory/health
GET /api/memory/v1/memory/manifest
GET /api/memory/v1/memory/pubkey
GET /api/memory/v1/memory/verify/{content_commitment}
POST /api/memory/v1/memory/visitor/issue
POST /api/memory/v1/memory/store requires X-Genesis-Session
POST /api/memory/v1/memory/recall requires X-Genesis-Session
POST /api/memory/v1/memory/forget requires X-Genesis-Session