Skip to content

Cryptographic Provenance

How UCCA proves where data came from and that it hasn't been tampered with.

Content pending

Document the provenance model, hash chains, and trust anchors.