To verify any attested information.
The verification frontend allows anyone to verify proofs that specific checks or verifications were performed inside a Trusted Execution Environment (TEE). When someone makes a claim like “I verified my Reddit karma is over 1000” and provides a TEE attestation as proof, this frontend lets others cryptographically verify that claim was actually checked within a secure hardware environment.
Many systems need to verify user claims or credentials while preserving privacy. The TLS attestation system allows these checks to happen inside a TEE, which then produces cryptographic proof that the verification occurred and passed. The verification frontend makes it easy for anyone to validate these proofs.
When you paste a TLS attestation into the frontend, it verifies three critical properties:
The exact code that ran in the TEE matches a known, trusted hash. This confirms what verification logic executed.
The specific claim or check being attested to was satisfied according to the TEE’s verification.
The hardware executing the check was a legitimate TEE, verified against the hardware manufacturer’s root of trust public key.
The frontend provides a simple interface for verifying attestations:
Shows the expected code hash representing the verification logic that should have run
Displays information about what claim was being verified
Provides an input field for the attestation proof
Includes a “Verify” button to trigger validation
Upon successful verification, the frontend confirms:
Code hash matches the open-source implementation, proving exactly what verification logic ran
The specific check or claim being verified was satisfied inside the TEE
Hardware authenticity is confirmed through the attestation chain back to the manufacturer
The attestation object contains:
Measurements of the code executed in the TEE
Details of what was verified in the TLS session
Hardware-signed proof of secure execution
Chain of signatures linking to the hardware manufacturer’s root of trust
The frontend performs these checks:
Validates the signature chain back to the hardware manufacturer
Verifies the code measurements match the expected verification logic
Confirms the specific claim or check was satisfied
Validates the hardware instance identifiers
Navigate to the verification frontend
Note the expected code hash that should have performed the verification
Review what claim or check was being verified
Paste the attestation proof
Click “Verify” to validate the attestation
Review the results confirming all security properties
This system allows anyone to verify that specific checks or claims were legitimately verified within a TEE without having to trust the entity making the claim. The cryptographic attestations prove that the verification occurred in secure hardware running the expected code. This enables trustless verification of user claims while maintaining privacy, since only the fact that a check passed (not the underlying data) is revealed.
To verify any attested information.
The verification frontend allows anyone to verify proofs that specific checks or verifications were performed inside a Trusted Execution Environment (TEE). When someone makes a claim like “I verified my Reddit karma is over 1000” and provides a TEE attestation as proof, this frontend lets others cryptographically verify that claim was actually checked within a secure hardware environment.
Many systems need to verify user claims or credentials while preserving privacy. The TLS attestation system allows these checks to happen inside a TEE, which then produces cryptographic proof that the verification occurred and passed. The verification frontend makes it easy for anyone to validate these proofs.
When you paste a TLS attestation into the frontend, it verifies three critical properties:
The exact code that ran in the TEE matches a known, trusted hash. This confirms what verification logic executed.
The specific claim or check being attested to was satisfied according to the TEE’s verification.
The hardware executing the check was a legitimate TEE, verified against the hardware manufacturer’s root of trust public key.
The frontend provides a simple interface for verifying attestations:
Shows the expected code hash representing the verification logic that should have run
Displays information about what claim was being verified
Provides an input field for the attestation proof
Includes a “Verify” button to trigger validation
Upon successful verification, the frontend confirms:
Code hash matches the open-source implementation, proving exactly what verification logic ran
The specific check or claim being verified was satisfied inside the TEE
Hardware authenticity is confirmed through the attestation chain back to the manufacturer
The attestation object contains:
Measurements of the code executed in the TEE
Details of what was verified in the TLS session
Hardware-signed proof of secure execution
Chain of signatures linking to the hardware manufacturer’s root of trust
The frontend performs these checks:
Validates the signature chain back to the hardware manufacturer
Verifies the code measurements match the expected verification logic
Confirms the specific claim or check was satisfied
Validates the hardware instance identifiers
Navigate to the verification frontend
Note the expected code hash that should have performed the verification
Review what claim or check was being verified
Paste the attestation proof
Click “Verify” to validate the attestation
Review the results confirming all security properties
This system allows anyone to verify that specific checks or claims were legitimately verified within a TEE without having to trust the entity making the claim. The cryptographic attestations prove that the verification occurred in secure hardware running the expected code. This enables trustless verification of user claims while maintaining privacy, since only the fact that a check passed (not the underlying data) is revealed.