Skip to content

Commit 1b94e6b

Browse files
committed
docs(poc): clarify geofencing implementation status
- Distinguished between implemented hardware-rooted egress geofencing (claims in SVID) and roadmap privacy-preserving geofencing (ZKP-based) - Clarified that ZKP geofencing is applicable to both ingress and egress stages in the roadmap - Aligned architecture documentation bullets with these distinctions
1 parent 3d871e3 commit 1b94e6b

File tree

1 file changed

+5
-7
lines changed

1 file changed

+5
-7
lines changed

hybrid-cloud-poc/README.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -72,14 +72,14 @@ This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data
7272

7373
**What This PoC Currently Demonstrates:**
7474
- ✅ Hardware-rooted identity (TPM attestation via Keylime)
75-
- ✅ Unified SPIFFE/SPIRE identity with geolocation claims (sensor metadata in SVID)
75+
-Hardware-Rooted Geofencing (Egress): Unified SPIFFE/SPIRE identity with geolocation claims (sensor metadata in SVID)
7676
- ✅ Envoy-based policy enforcement (fail-closed WASM filtering)
7777
- ✅ Degraded SVID detection (insider threat protection)
7878
- ✅ mTLS with hardware-bound certificates (workload attestation)
7979

8080
**Roadmap (Architecturally Defined):**
81-
- 🔲 Privacy-preserving geofencing (ZKP-based Reg-K compliance without storing GPS) - See Architecture Documentation section below
82-
- 🔲 Privacy-preserving data center audit trail (batch & purge proofs) - See main [README](../README.md#layer-3-ai-governance-verifiable-logic--privacy)
81+
- 🔲 Privacy-preserving Geofencing (Ingress & Egress): ZKP-based Reg-K compliance without storing GPS - See Architecture Documentation section below
82+
or Mo- 🔲 Privacy-preserving data center audit trail (batch & purge proofs) - See main [README](../README.md#layer-3-ai-governance-verifiable-logic--privacy)
8383

8484
---
8585

@@ -101,15 +101,13 @@ For the complete technical breakdown of the **Unified Identity & Trust Framework
101101
👉 **[Unified Identity & Trust Framework](README-arch-sovereign-unified-identity.md)**
102102

103103
This document provides detailed architecture for:
104-
- **Stage 1 (Verified Ingress)** - Hardware-rooted attestation of client devices, privacy-preserving geofencing, and data provenance
105-
- **Stage 2 (Trusted Egress)** - Data center infrastructure attestation, workload identity, and policy enforcement
104+
- **Stage 1 (Verified Ingress)** - Hardware-rooted attestation of client devices, privacy-preserving (ZKP) geofencing, and data provenance
105+
- **Stage 2 (Trusted Egress)** - Data center infrastructure attestation, workload identity, policy enforcement, and hardware-rooted geofencing
106106

107107
### Current PoC Implementation Status
108108

109109
The current PoC implementation provides a complete, **upstream-ready** integration demonstrating **Stage 2: Egress Unified Identity**. This stage secures the **Managed Data Center Infrastructure** (Sovereign Cloud) by ensuring that the on-premise servers and AI workloads are attested before they can release sensitive egress data. This provides the "Server-Side" mathematical proof required for **Use Case 4 (Automated Regulatory Audit)**.
110110

111-
112-
113111
### Architecture Overview
114112

115113
**Sovereign Cloud Or Edge Cloud (Client Side):**

0 commit comments

Comments
 (0)