You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs(geolocation): Add TPM-Signed ZKP Output for end-to-end hardware binding
- ZKP proof hash is signed by TPM on Keylime-attested host
- Proves proof was generated on specific server, prevents replay
- Input binding (TPM-signed coordinates) + Output binding (TPM-signed proof)
- Performance note: 1-5 min refresh means ~100ms TPM overhead is negligible
For **absolute privacy guarantees**, the ZKP proof itself is signed by the TPM on the Keylime-attested host. This ensures the proof was generated on a specific verified server and cannot be replayed from elsewhere.
1.**Input Binding:** TPM-signed coordinates prove the GPS came from genuine hardware
175
+
2.**Output Binding:** TPM-signed proof hash proves the ZKP was generated on **that specific Keylime-attested server**
176
+
3.**No Replay:** An attacker cannot generate a valid ZKP elsewhere and replay it—the output signature would fail TPM verification
177
+
178
+
> [!NOTE]
179
+
> **Performance Impact:** Geolocation proofs are refreshed every 1-5 minutes (not per-request). At this frequency, the ~100ms TPM signing overhead is negligible.
AegisSovereignAI uses **hardware-rooted multi-sensor fusion** to prevent location spoofing. This builds on the architecture detailed in the **[Unified Identity & Trust Framework](../hybrid-cloud-poc/README-arch-sovereign-unified-identity.md)**.
0 commit comments