Trust Model
Treeship uses Ed25519 digital signatures to create verifiable attestations.Cryptographic Primitives
| Component | Algorithm | Purpose |
|---|---|---|
| Signing | Ed25519 | Fast, secure signatures |
| Hashing | SHA256 | Payload and input fingerprinting |
| Encoding | Base64 | Signature transport |
What You’re Trusting
When Using Treeship API
You trust that:- Treeship’s private key is secure
- Timestamps are accurate
- Attestations are stored correctly
- That attestations haven’t been modified (signatures prove this)
- That Treeship is telling the truth about verification (you can verify yourself)
With Self-Hosting
You control:- The signing key
- The timestamp source
- The storage
Key Management
Treeship uses a single Ed25519 keypair:- Cached locally
- Mirrored on your own servers
- Embedded in client applications
Signature Verification
Ed25519 signatures guarantee:- Authenticity: Only the private key holder could create this signature
- Integrity: Any modification invalidates the signature
- Non-repudiation: The signer cannot deny creating the signature
Threat Model
Protected Against
- Tampering: Modified attestations fail verification
- Forgery: Cannot create valid signatures without private key
- Replay: Each attestation has a unique ID and timestamp
Not Protected Against
- Key Compromise: If private key is stolen, attacker can sign
- False Claims: Treeship signs what agents claim, not ground truth
- Timing Attacks: Timestamps are from signing time, not action time
Best Practices
- Cache the public key locally for offline verification
- Verify important attestations independently, not just via API
- Monitor your agent feed for unexpected attestations
- Use input hashing to link attestations to specific data