Platform

Overview

How It Works

Beneficiary Identity

Policy Corridors

Deterministic Finality

Architecture

Security Model

Governance

Integration

Solutions

Corridors Overview

Institutional Overview

Pricing

All Scenarios

Humanitarian Impact Fund

Assurance

Technical Assurance

Verify Receipt

Receipt Example

Developers

Documentation

APIs & Bridges

Architecture Docs

Glossary

BID API

Company

About

Team

Partners

Roadmap

Investors

Contact

Blog

All Documentation

Schedule Consultation
Performance Assurance

Evidence Pack

Technical diligence package for institutional review. Claims register, trust assumptions, benchmark methodology, security architecture, bridge security model, and risk disclosures. Artifacts are classified by evidence maturity level.

← All Proof
16
Diligence Sections
80+
Linked Artifacts
4
Maturity Levels
48
Patent Claims
Evidence Maturity Framework

Artifact classification

Every artifact declares its maturity level. Reviewers can assess reliability at a glance.

L1 Internal Documentation

Architecture docs, specifications, and internal design records authored by the engineering team.

L2 Reproducible Methodology

Published methodology with disclosed parameters, reproducible test harnesses, and verifiable outputs.

L3 Independently Verified

Third-party audit, external review, or independent validation by a qualified firm.

L4 Production Proven

Deployed on mainnet with measurable production volume, uptime data, and operational history.

Diligence Framework

Five core diligence questions

Does it work? Sections 01-04, 08
Is it secure? Sections 03, 07, 09
Can it be operated? Sections 05, 10, 16
Can institutions integrate? Sections 06, 12, 14
Are claims supportable? Sections 01, 02, 11, 13, 15
🔒

Trust Assumptions & Thresholds

Institutional reviewers start here. All cryptographic thresholds, minimum honest node assumptions, key rotation authorities, emergency controls, and halt conditions - documented in one place.

View section ↓
01 Claims Register
Version 1.0
Owner Executive Team
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification Pending
Classification Public

Formal register of material claims. Each claim maps to a specific artifact, identifies the responsible owner, and declares whether independent verification exists. Claims without evidence are flagged.

ClaimEvidence ArtifactOwnerMaturityIndependent
Sub-second settlement finalityPerformance benchmark report, Rust ledger testsEngineeringL2Pending
Non-custodial wallet (user holds keys)MPC 2-of-3 architecture specificationSecurityL1Pending
10,000+ TPS throughputDeterministic benchmark harnessPerformanceL2Pending
$250K protection coveragePolicy configuration, protection tier documentationProductL1Pending
Post-quantum cryptographyDilithium/Kyber integration, ZK circuit specificationsCryptographyL1Pending
14-of-20 validator consensusFleet registry, validator geography documentationInfrastructureL4On-chain verifiable
48 patent claims filedProvisional patent applicationLegalL1USPTO filing
7 mainnet smart contractsEtherscan verified contract addressesEngineeringL4Sourcify verified
SOC 2 Type II compliance-OperationsPendingPending

Executive Documentation

DocumentMaturityClassificationLink
VC Pitch Deck (17 slides)L1PublicView
Business PlanL1PublicView
Whitepaper - Protection & CustodyL1PublicView
Whitepaper - Settlement InfrastructureL1PublicView
Whitepaper - Validator NetworkL1PublicView
Whitepaper - Tokenomics & GovernanceL1PublicView
FAQL1PublicView
02 Trust Assumptions & Thresholds
Version 1.0
Owner Security / Infrastructure
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification On-chain verifiable
Classification Public

Multiple cryptographic thresholds operate across the system. This section defines each threshold, minimum honest node assumptions, key rotation authorities, and emergency controls.

ThresholdConfigurationScopeAuthority
L1 Validator Consensus14-of-20 (70% BFT)Settlement finality, block productionProtocol - no single entity override
Bridge Validator Threshold14-of-20 (70% BFT)Cross-chain mint/burn authorizationBridge validator set
Wallet MPC Signing2-of-3Transaction authorizationUser + platform + recovery shard
Emergency Chain Halt14-of-20 validatorsNetwork pauseValidator quorum only
Bridge Pause1-of-1 deployer OR 14-of-20 validatorsBridge contract pauseDeployer (during bootstrap), then validator quorum
Key RotationPer-validatorValidator signing keysIndividual validator operator

Minimum Honest Node Assumptions

  • L1 consensus requires at least 14 of 20 honest validators (tolerates up to 6 Byzantine)
  • Bridge requires at least 14 of 20 honest bridge validators (tolerates up to 6 Byzantine)
  • Wallet MPC requires at least 2 of 3 shards (user always holds 1 shard)
  • Chain halts automatically if fewer than 10 validators are healthy
  • Adaptive quorum targets 70%, minimum 7 validators for any consensus action
  • No single entity controls enough validator keys to reach any threshold unilaterally

Reference Documentation

DocumentMaturityLink
Validator Network WhitepaperL1View
Canonical ParametersL1View
Bridge ArchitectureL1View
MPC Architecture SpecificationL1View
03 Architecture & System Design
Version 1.0
Owner Engineering
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification Pending
Classification Partner

System architecture covering 190+ microservices, protocol parameters, service topology, and inter-service communication. Port mappings, canonical parameters, and settlement flow documentation.

DocumentMaturityClassificationLink
System Architecture OverviewL1PublicView
Port Mappings (153 services)L1PartnerView
Canonical ParametersL1PartnerView
Settlement Lifecycle FlowL1PublicView
Settlement Process FlowL1PublicView
Platform Infrastructure ProofL1PublicView
04 Security Architecture
Version 1.0
Owner Security Team
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification Pending (audit planned)
Classification Public

Threat model, key management, authorization design, fleet monitoring, and incident response architecture. Covers insider threats, validator compromise, supply chain attacks, bridge exploits, wallet compromise, and API abuse vectors.

DocumentMaturityClassificationLink
SentinelAI Fleet InspectorL4PublicView
MPC Architecture SpecificationL1PublicView
Security Controls ProofL1PublicView
Threat Model DocumentationL1PublicView
Post-Quantum Cryptography SpecificationL1PublicView
Third-Party Protocol Security AuditPending--
Third-Party Penetration TestPending--
SOC 2 Type II ReportPending--

Threat Model Coverage

  • Insider threats (operator compromise, key theft)
  • Validator compromise (Byzantine behavior, collusion)
  • Supply chain attacks (dependency injection, image tampering)
  • Bridge exploits (replay, double-spend, reserve drain)
  • Wallet compromise (shard theft, session hijack)
  • API abuse (rate limiting, authentication bypass)
05 Performance & Benchmark Methodology
Version 1.0
Owner Performance Team
Last Updated 2026-03-06
Evidence Type Internal (Reproducible)
Independent Verification Pending
Classification Public

Throughput and latency claims are backed by deterministic benchmarks with fully disclosed methodology. Test parameters, hardware profiles, network topology, and measurement methodology are published for reproducibility.

DocumentMaturityClassificationLink
Performance Proof PageL2PublicView
Benchmark MethodologyL2PublicView
Test Harness (7 scenarios)L2PartnerView
Rust L1 BenchmarksL2PartnerView

TPS Benchmark Methodology

  • Hardware: Hetzner CPX52/62 (16 vCPU, 32 GB RAM, NVMe SSD)
  • Validator count: 20 nodes (10 active + 10 sentry) across 13 jurisdictions
  • Network topology: full mesh P2P, Hetzner private network (Nuremberg primary)
  • Transaction type: standard settlement intent (structured JSON, ~512 bytes)
  • Workload generation: deterministic test harness, 7 pluggable scenarios
  • Measurement tool: wall-clock timer, intent submission to finality receipt
  • Peak observed: 9,500 TPS per node; ~200K aggregate projected across 20 nodes
  • Limitations: single-region latency profile; cross-region adds ~50-150ms RTT
  • Failure mode: benchmark aborts on consensus timeout or validator failure
  • Block size: 10 MB maximum; block time: 1.5 seconds (frozen parameter)

Finality Benchmark Methodology

  • Definition: time from intent submission to cryptographically signed finality receipt
  • Consensus model: CometBFT (Tendermint), instant finality after block commit
  • Measured latency: sub-second under normal load (1.5s block time)
  • Receipt contents: policy hash, beneficiary binding, quorum attestation, timestamps
  • Verification: receipts independently verifiable via Ed25519 signature check
  • Degraded mode: finality delayed proportional to validator response time

Validator Topology

  • 20 validators: 10 active (consensus participants) + 10 sentry (hot standbys)
  • Geographic distribution: 13 jurisdictions (US, DE, EU, SG, CH, JP, GB, AE, BR, plus 4 sentry zones)
  • Server specs: Hetzner CCX33/CPX52 (8-16 vCPU, 16-32 GB RAM, NVMe)
  • Consensus port: 26656 (P2P), 26657 (RPC), 9090 (metrics)
  • Quorum: 70% adaptive, minimum 7 validators for any consensus action
  • Halt threshold: fewer than 10 healthy validators triggers automatic halt
  • Network: full mesh topology (every validator peers with every other)
  • No single jurisdiction controls enough keys to reach any threshold unilaterally
06 Operations & Fleet Management
Version 1.0
Owner Infrastructure / DevOps
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification Pending (SOC 2 planned)
Classification Partner

Autonomous fleet management via SentinelAI. Health scoring, automated recovery, golden snapshot backups, anti-loop protection, and fleet-wide cycling across 10 mainnet validators.

DocumentMaturityClassificationLink
SentinelAI Fleet InspectorL4PublicView
Fleet Management APIL4PublicView
AATM Operational SpecificationL1PublicView
Monitoring Stack (Prometheus / Grafana)L4Confidential-

Operational Runbooks

  • Validator failure: auto-detection via heartbeat, fleet-cycle recovery
  • Key rotation: per-validator, no downtime, HMAC-authenticated
  • Disaster recovery: golden snapshot restore from Hetzner S3
  • Security incident: SentinelAI auto-isolation, manual escalation path
  • Fleet health below 30%: auto-triggers fleet-wide cycle (max 3 per 2h)
  • Image deployment: DevNet build, digest verify, staged rollout
07 Wallet & Custody Security
Version 1.0
Owner Security Team
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification Pending (audit planned)
Classification Public

Non-custodial architecture. MPC 2-of-3 threshold signing, Passkey/WebAuthn device authentication, guardian recovery, and hardware key support. User always holds one shard.

DocumentMaturityClassificationLink
MPC Architecture SpecificationL1PublicView
Protection & Custody WhitepaperL1PublicView
Wallet API SpecificationL1PublicView
Web Wallet (deployed)L4PublicView
Third-Party Wallet Security AuditPending--

Key Management Details

  • MPC key generation: distributed, no single party sees full key
  • Shard distribution: user device, platform HSM, recovery guardian
  • Device authentication: WebAuthn/FIDO2 passkeys
  • Recovery: guardian-assisted shard reconstruction
  • Key storage: AES-256-GCM encrypted at rest
  • Signing protocol: threshold ECDSA (2-of-3 required)
08 Settlement & Finality
Version 1.0
Owner Engineering
Last Updated 2026-03-06
Evidence Type Internal (Reproducible)
Independent Verification Pending
Classification Public

Settlement produces a cryptographically signed finality receipt containing policy hash, beneficiary binding, quorum attestation, and timing metadata. DvP workflows and receipt verification tooling.

DocumentMaturityClassificationLink
Settlement API SpecificationL1PublicView
Finality Receipt ExampleL2PublicView
Settlement Proof PageL1PublicView
Receipt Verification ToolL4PublicView
Policy Enforcement ProofL1PublicView
Settlement Lifecycle FlowL1PublicView
09 Bridge Security Model
Version 1.0
Owner Security / Engineering
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification Pending (formal verification planned)
Classification Public

Cross-chain bridge deployed on Ethereum mainnet with 14-of-20 validator threshold (70% BFT). Custody assumptions, mint/burn logic, replay protection, reserve accounting, and emergency pause triggers.

DocumentMaturityClassificationLink
JILBridge.sol (Ethereum Mainnet)L4PublicEtherscan
Bridge API SpecificationL1PublicView
Bridge ArchitectureL1PublicView
Wrapper Token Specification (7 tokens)L1PublicView
Third-Party Bridge Security AuditPending--
Formal Verification ReportPending--

Reserve Invariants

  • minted_assets <= locked_assets at all times
  • Withdrawal requires verified burn transaction
  • Deposit requires finalized on-chain event (21 confirmations)
  • Replay protection: nonce-based, per-chain transaction ID
  • Emergency pause: deployer (bootstrap) or 14-of-20 validator quorum
  • Anomaly detection: rate limiting on mint volume, alert thresholds
  • 5 registered tokens: ETH (native), USDC, USDT, WBTC, DAI
  • Monitoring: on-chain reserve vs. minted supply reconciliation

Bridge Reserve Model

  • Custody: assets locked in JILBridge.sol on Ethereum mainnet (verifiable on-chain)
  • Mint authority: bridge_authority key executes only after 14-of-20 validator attestation
  • Deposit flow: lock on source chain, validator attestation, mint on JIL L1
  • Withdrawal flow: burn on JIL L1, validator signature collection, release on destination chain
  • Deposit idempotency: unique on (source_chain, tx_hash, log_index) prevents double-mint
  • Daily outflow caps: configurable per-asset limits, auto-pause on breach
  • Reserve check: total_minted <= total_deposited - total_withdrawn enforced before every mint AND withdrawal
  • Auto-pause triggers: reserves mismatch or daily outflow cap breach
10 Compliance & Regulatory Architecture
Version 1.0
Owner Compliance Team
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification Pending
Classification Public

Zone-based compliance enforcement, ZK proof circuits, BEC fraud detection, BID identity verification, sanctions screening, transaction monitoring, and jurisdiction-aware policy corridors.

DocumentMaturityClassificationLink
Compliance Architecture SpecificationL1PublicView
Compliance API SpecificationL1PublicView
BID API SpecificationL1PublicView
ZK Compliance Operational SpecificationL1PublicView
BEC Schema ExamplesL2PublicView
Identity Verification ProofL1PublicView
11 Tokenomics & On-Chain Contracts
Version 1.0
Owner Engineering / Legal
Last Updated 2026-03-06
Evidence Type External (Sourcify verified)
Independent Verification Sourcify code match
Classification Public

JIL ERC-20 (10B supply), multi-vault treasury (5 vaults, 7.5B funded), legacy migration swap contracts, and cliff-vesting sale contracts. All contracts deployed on Ethereum mainnet and verified on Sourcify.

ContractMaturityVerificationLink
JIL ERC-20 Token (10B supply)L4Sourcify verifiedEtherscan
JILTreasury (5 vaults, 7.5B)L4Sourcify verifiedEtherscan
Token Sale - Main (800M)L4Sourcify verifiedEtherscan
Token Sale - Legacy (200M)L4Sourcify verifiedEtherscan
Token Swap v1 to v3 (100M)L4Sourcify verifiedView
Token Swap v2 to v3 (100M)L4Sourcify verifiedView

Economic Documentation

DocumentMaturityLink
Tokenomics & Governance WhitepaperL1View
Supply ThesisL1View
Independent Tokenomics ReviewPending-
Game Theory / Attack Vector AnalysisPending-
12 API Integrations & Enterprise Access
Version 1.0
Owner Engineering
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification Sandbox testable
Classification Public

18 published API specifications, enterprise API gateway, ISO 20022 message support, webhook infrastructure, and sandbox access for evaluation.

DocumentMaturityClassificationLink
Settlement API SpecificationL1PublicView
Enterprise API SpecificationL1PublicView
ISO 20022 Gateway SpecificationL1PublicView
Webhook API SpecificationL1PublicView
Analytics & Integrations APIL1PublicView
API Index (all 18 specifications)L1PublicView
Sandbox Environment (TestNet)L4PartnerAccess
13 Legal, IP & Governance
Version 1.0
Owner Legal / Executive
Last Updated 2026-03-06
Evidence Type Internal (USPTO filed)
Independent Verification USPTO filing
Classification Public

Entity structure, 48 provisional patent claims across 10 independent inventions, validator governance model, upgrade governance, and emergency controls.

DocumentMaturityClassificationLink
Provisional Patent Application (48 claims)L1PublicView
Patent Claim Index (36 detail pages)L1PublicView
Validator Governance ModelL1PublicView
Terms of ServiceL1PublicView
Privacy PolicyL1PublicView

Governance Coverage

  • Ownership structure: JIL Sovereign Technologies, Inc.
  • Validator governance: admission, removal, slashing conditions
  • Upgrade governance: staged rollout, validator opt-in
  • Emergency controls: chain halt (14-of-20), bridge pause (deployer or quorum)
14 Customer Proof & Pilot Deployments
Version 1.0
Owner Product / Sales
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification Pending (pilot needed)
Classification Public

Structured POC framework, sandbox evaluation environment, documented reference use cases, and case study scenarios across institutional settlement operations.

DocumentMaturityClassificationLink
POC Request FrameworkL1PublicView
Case Studies (12 scenarios)L1PublicView
Use Cases (4 verticals)L1PublicView
Sandbox Access (TestNet)L4PartnerAccess
Institutional Readiness AssessmentL1PublicView
Institutional Pilot DeploymentPending--
15 External Validation Roadmap
Version 1.0
Owner Executive / Security
Last Updated 2026-03-06
Evidence Type Internal (roadmap)
Independent Verification N/A (roadmap)
Classification Public

Independent validation is required to move artifacts from L1/L2 to L3 maturity. This section tracks the external audit and verification roadmap. Completing any single item materially increases institutional trust.

Validation ItemCategoryStatusExpected Providers
Protocol security auditSecurityPendingTrail of Bits, NCC Group, Halborn
Smart contract audit (ERC-20, Treasury, Sale, Bridge)SecurityPendingOpenZeppelin, Halborn, Kudelski
Wallet security audit (MPC architecture)SecurityPendingNCC Group, Trail of Bits
Bridge formal verificationSecurityPendingCertora, Runtime Verification
Penetration testing (infrastructure)InfrastructurePendingNCC Group, Bishop Fox
SOC 2 Type I readiness assessmentOperationsPendingDeloitte, Ernst & Young, Coalfire
Independent tokenomics reviewEconomicsPendingGauntlet, Delphi Digital
Institutional pilot deploymentCustomerPendingQualified institutional counterparty

Audit Deliverables (per engagement)

  • Final audit report (public or partner-restricted)
  • Findings classification (critical, high, medium, low, informational)
  • Remediation plan with timelines
  • Remediation verification (re-test after fixes)
16 Risks, Gaps & Open Issues
Version 1.0
Owner Executive Team
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification Self-assessed
Classification Public

Transparent disclosure of evidence gaps, known risks, and items that have not been independently verified. This section exists because institutional counterparties require honest assessment, not selective presentation.

Gap / RiskImpactCurrent MitigationResolution Path
No third-party security auditHighInternal threat model, SentinelAI monitoringAudit engagement Q2 2026
No SOC 2 certificationHighInternal operational controls documentedReadiness assessment initiated
Bridge not formally verifiedHigh14-of-20 threshold (70% BFT), internal test coverage, emergency pauseFormal verification engagement planned
No independent tokenomics reviewMediumAll contracts Sourcify verified, code available for reviewIndependent review engagement planned
Protection not underwritten by third partyMediumSelf-funded protection poolInsurance broker engagement in progress
Limited production settlement volumeMediumSandbox and testnet available for evaluationInstitutional pilot deployment planned
Multi-jurisdiction regulatory uncertaintyMediumZone-based compliance architecture, per-jurisdiction policyOngoing regulatory monitoring
Deployer retains bridge pause authorityLowBootstrap period only, planned transition to validator quorumGovernance upgrade to remove deployer authority
A Appendices & Reference Material
Version 1.0
Owner Engineering
Last Updated 2026-03-06
Evidence Type Internal
Independent Verification N/A
Classification Public

Supporting reference material. Port mappings, canonical parameters, validator geography, operational specifications, and protocol glossary.

DocumentMaturityLink
Port Mappings (153 services)L1View
Canonical ParametersL1View
Validator Geography (10 zones)L4View
GlossaryL1View
BPoH Operational SpecificationL1View
SHSC Operational SpecificationL1View
SDV Operational SpecificationL1View
LaunchPad & Token FactoryL1View
Video Library (11 explainers)L1View

Evaluate the infrastructure

2 to 4 week POC engagements with sandbox environment, API documentation, and compliance review packet.