Verification Frontend
To verify any attested information.
The verification frontend allows anyone to verify proofs that specific checks or verifications were performed inside a Trusted Execution Environment (TEE). When someone makes a claim like “I verified my Reddit karma is over 1000” and provides a TEE attestation as proof, this frontend lets others cryptographically verify that claim was actually checked within a secure hardware environment.
Purpose
Many systems need to verify user claims or credentials while preserving privacy. The TLS attestation system allows these checks to happen inside a TEE, which then produces cryptographic proof that the verification occurred and passed. The verification frontend makes it easy for anyone to validate these proofs.
What Gets Verified
When you paste a TLS attestation into the frontend, it verifies three critical properties:
-
The exact code that ran in the TEE matches a known, trusted hash. This confirms what verification logic executed.
-
The specific claim or check being attested to was satisfied according to the TEE’s verification.
-
The hardware executing the check was a legitimate TEE, verified against the hardware manufacturer’s root of trust public key.
Components
Verification Interface
The frontend provides a simple interface for verifying attestations:
-
Shows the expected code hash representing the verification logic that should have run
-
Displays information about what claim was being verified
-
Provides an input field for the attestation proof
-
Includes a “Verify” button to trigger validation
Verification Results
Upon successful verification, the frontend confirms:
-
Code hash matches the open-source implementation, proving exactly what verification logic ran
-
The specific check or claim being verified was satisfied inside the TEE
-
Hardware authenticity is confirmed through the attestation chain back to the manufacturer
More Details
Attestation Structure
The attestation object contains:
-
Measurements of the code executed in the TEE
-
Details of what was verified in the TLS session
-
Hardware-signed proof of secure execution
-
Chain of signatures linking to the hardware manufacturer’s root of trust
Verification Process
The frontend performs these checks:
-
Validates the signature chain back to the hardware manufacturer
-
Verifies the code measurements match the expected verification logic
-
Confirms the specific claim or check was satisfied
-
Validates the hardware instance identifiers
Usage Instructions
-
Navigate to the verification frontend
-
Note the expected code hash that should have performed the verification
-
Review what claim or check was being verified
-
Paste the attestation proof
-
Click “Verify” to validate the attestation
-
Review the results confirming all security properties
This system allows anyone to verify that specific checks or claims were legitimately verified within a TEE without having to trust the entity making the claim. The cryptographic attestations prove that the verification occurred in secure hardware running the expected code. This enables trustless verification of user claims while maintaining privacy, since only the fact that a check passed (not the underlying data) is revealed.