Built on Open Standards
Originary operates with full transparency. Our policies, standards, and verification endpoints are publicly accessible and auditable.
Security
Responsible disclosure policy and security reporting guidelines.
Protocol
PEAC protocol specifications and AI preference frameworks.
Verification
Public endpoints for receipt validation and policy verification.
Legal
Terms, privacy policy, and compliance documentation.
Infrastructure
Service metadata and infrastructure information.
Company
Corporate information and brand guidelines.
Portability Pledge
Verify receipts offline using published JWKS. Export-first design with no vendor lock-in. Your data remains portable across any PEAC-conformant system.
Security Model
Ed25519 signatures ensure tamper-evident receipts. Public keys at standard JWKS endpoints. No proprietary verification required.
Conformance
Test vectors and conformance suite available for implementers. Multiple independent implementations expected before PEAC 1.0.
Governance
PEAC protocol stewardship is transparent and documented. Specification changes follow an open process with community input.
Open Source Commitment
The PEAC protocol is an open standard (Apache-2.0) designed for multiple independent implementations. Originary provides one commercial implementation with managed services and tooling built on these open foundations. All protocol specifications and verification endpoints remain publicly accessible.
No vendor lock-in. We are committed to having multiple conformant implementations before PEAC 1.0. Your policies and receipts work across any PEAC-conformant system.
Questions about security, compliance, or our trust practices?
contact@originary.xyz