/ manifest
append-only · merkle-rooted · ceremony-signed

Manifest.

The 3DCIPHER manifest is the public record of cryptographic and AI-artifact state. Ceremony root, build keys, customer roots (by anonymous fingerprint), signing-scheme revisions, advisories, firmware hashes, AI model bundle hashes, and evidence-schema revisions. Append-only. Every revision signed by the build keys; the build keys themselves signed by the ceremony root. The revision below is the current head.

$head

Current head.

revision:        current
signed_at:       2026-05-19T03:00:14.082Z
signed_by:       build_key_2026q2 (fingerprint 0x3B81...4A12)
merkle_root:     0x7c4a2f9b...e802d188
previous:        2026.05.r18 (2026-05-12T03:00:09Z, merkle 0x9d12...7f30)
height:          18,402
ceremony_root:   0xA1F4...9C2D
phase:           0 (Ed25519 + Dilithium-3 shadow)
$ceremony

Ceremony root.

fieldvalue
fingerprint0xA1F4…9C2D
created2024-09-14T11:38:00Z
schemeEd25519 (Dilithium-3 shadow per 3DC-2026-05-A1)
quorum5-of-9 across three jurisdictions
observerDr. M. Karras (formerly NCSC); observer report delivered in signed customer package
rotation policyevery 36 months; planned 2027-09 ceremony
compromise procedureRB-01 (ceremony-key compromise); RB-09 (emergency quorum)
$build-keys

Build keys.

Build keys sign manifest revisions, advisories, firmware, schemas, and SDK packages. Rotated quarterly; the rotation event is itself a manifest entry signed by the previous build key and counter-signed by the ceremony root.

key idfingerprintactive periodschemestatus
build_key_2026q20x3B81…4A122026-04-01 → 2026-06-30Ed25519 + Dilithium-3 shadowcurrent
build_key_2026q10xD207…6FE02026-01-01 → 2026-03-31Ed25519 + Dilithium-3 shadowretired (verifies historical)
build_key_2025q40x4F18…A87C2025-10-01 → 2025-12-31Ed25519retired
build_key_2025q30xB7CC…52192025-07-01 → 2025-09-30Ed25519retired
build_key_2025q20x86A4…3DD72025-04-01 → 2025-06-30Ed25519retired
build_key_2025q10x2E0E…7C182025-01-01 → 2025-03-31Ed25519retired
build_key_2024q40x9F77…0BB62024-09-22 → 2024-12-31Ed25519retired (first post-ceremony)
$ai-artifacts

AI artifact registry.

Customer deployments pin AI model bundles and evidence schemas through the manifest. A verifier can check which model family prepared a TwinCert draft or MeshGuard detection result without trusting the UI.

artifactpurposeverification material
meshguard-detector-2026.05watermark detection and confidence scoringmodel hash + signed threshold profile
evidence-extractor-2026.05inspection and material-lot field extractionmodel hash + schema compatibility range
anomaly-scorer-2026.05printer posture and bundle-context triagemodel hash + deployment policy id
audit-summarizer-2026.05reviewer-facing audit notesmodel hash + prompt/policy bundle hash
$customers

Customer root anchors.

Customer roots are published by anonymised fingerprint only. The customer themselves controls the name-to-fingerprint mapping; we do not disclose customer identity.

customer fingerprintanchor dateschemeprinters
cust:0x4a02…1b882024-11-02Ed25519 + Dilithium-3 shadow11
cust:0xee71…73302024-12-19Ed25519 + Dilithium-3 shadow4
cust:0x9032…8a1c2025-01-30Ed25519 + Dilithium-3 shadow22
cust:0x18ad…5e622025-03-08Ed25519 + Dilithium-3 shadow6
… 37 further customer roots, page 2 (signed roll-up); the customer console exposes per-customer roll-ups for entitled customers only.
$signing-scheme

Signing scheme history.

revisionschemeactive fromnote
SCH-2026.01Ed25519 + Dilithium-3 shadow (phase 0)2026-01-09per 3DC-2026-05-A1
SCH-2025.04Ed25519 (bundle schema v2 default)2025-04-18v1 deprecation announced
SCH-2024.09Ed25519 (bundle schema v1)2024-09-22first post-ceremony scheme
$firmware

Firmware manifest.

Production firmware hashes, current and the two preceding releases. Older releases live in the signed archive; the archive itself is referenced by Merkle root from the current head.

releasedateSHA-256RB
fw 2026.05.r32026-05-122c8e…1c80RB-25 dual control
fw 2026.04.r22026-04-087a14…3a91RB-25 dual control
fw 2026.02.r12026-02-209b40…ff62RB-25 dual control
$merkle

Merkle proof for the current head.

# the head's Merkle root commits to the full leaf set;
# the verifier-CLI can produce a Merkle path for any leaf you care about.

$ 3dc-verify manifest path \
    --manifest current \
    --leaf "build_key_2026q2"
ok    leaf "build_key_2026q2" committed to root 0x7c4a...d188
      path: 18 hashes, depth 14
      verifies under ceremony root 0xA1F4...9C2D

$ 3dc-verify manifest path \
    --manifest current \
    --leaf "cust:0x9032...8a1c"
ok    leaf committed to root 0x7c4a...d188
      path: 18 hashes, depth 14
      verifies under ceremony root 0xA1F4...9C2D
$history

Recent manifest revisions.

revisionsigned atmerkle rootnotable
current2026-05-19T03:00:14Z0x7c4a…d188(current head)
2026.05.r182026-05-12T03:00:09Z0x9d12…7f303DC-2026-05-A1 PQ plan announce
2026.05.r172026-05-05T03:00:11Z0x2a08…ee61routine
2026.04.r42026-04-28T03:00:08Z0x0ca7…ff203DC-2026-04-A2 MeshGuard field report
2026.04.r32026-04-21T03:00:13Z0x7720…c813routine
2026.04.r22026-04-15T03:00:10Z0xa402…1cd93DC-2026-04-N1 Magics attestation notice; fw 2026.04.r2
2026.04.r12026-04-07T03:00:09Z0xd811…5e02build_key rotation 2026q1 → 2026q2
2026.03.r22026-03-14T03:00:08Z0xb077…6a313DC-2026-03-A1 NIS2 profile
$cadence

Cadence and SLOs.

  • Routine manifest revision: weekly, every Tuesday 03:00 UTC.
  • Out-of-cadence revision: triggered by advisory issuance, firmware release, or key rotation. Notified via the signed advisory channel.
  • Build-key rotation: quarterly (Q1/Q2/Q3/Q4 boundaries).
  • Ceremony-root rotation: every 36 months; next planned 2027-09.
  • Manifest publish latency SLO: revision signed and published within 5 minutes of the rotation event; live since 2025 Q1.