You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs(poc): clarify geofencing implementation status
- Distinguished between implemented hardware-rooted egress geofencing (claims in SVID) and roadmap privacy-preserving geofencing (ZKP-based)
- Clarified that ZKP geofencing is applicable to both ingress and egress stages in the roadmap
- Aligned architecture documentation bullets with these distinctions
- ✅ mTLS with hardware-bound certificates (workload attestation)
79
79
80
80
**Roadmap (Architecturally Defined):**
81
-
- 🔲 Privacy-preserving geofencing (ZKP-based Reg-K compliance without storing GPS) - See Architecture Documentation section below
82
-
- 🔲 Privacy-preserving data center audit trail (batch & purge proofs) - See main [README](../README.md#layer-3-ai-governance-verifiable-logic--privacy)
81
+
- 🔲 Privacy-preserving Geofencing (Ingress & Egress): ZKP-based Reg-K compliance without storing GPS - See Architecture Documentation section below
82
+
or Mo- 🔲 Privacy-preserving data center audit trail (batch & purge proofs) - See main [README](../README.md#layer-3-ai-governance-verifiable-logic--privacy)
83
83
84
84
---
85
85
@@ -101,15 +101,13 @@ For the complete technical breakdown of the **Unified Identity & Trust Framework
-**Stage 1 (Verified Ingress)** - Hardware-rooted attestation of client devices, privacy-preserving geofencing, and data provenance
105
-
-**Stage 2 (Trusted Egress)** - Data center infrastructure attestation, workload identity, and policy enforcement
104
+
-**Stage 1 (Verified Ingress)** - Hardware-rooted attestation of client devices, privacy-preserving (ZKP) geofencing, and data provenance
105
+
-**Stage 2 (Trusted Egress)** - Data center infrastructure attestation, workload identity, policy enforcement, and hardware-rooted geofencing
106
106
107
107
### Current PoC Implementation Status
108
108
109
109
The current PoC implementation provides a complete, **upstream-ready** integration demonstrating **Stage 2: Egress Unified Identity**. This stage secures the **Managed Data Center Infrastructure** (Sovereign Cloud) by ensuring that the on-premise servers and AI workloads are attested before they can release sensitive egress data. This provides the "Server-Side" mathematical proof required for **Use Case 4 (Automated Regulatory Audit)**.
0 commit comments