Trust Center

Built on Open Standards

Originary operates with full transparency. Our policies, standards, and verification endpoints are publicly accessible and auditable.

Security

Responsible disclosure policy and security reporting guidelines.

Protocol

PEAC protocol specifications and AI preference frameworks.

Verification

Public endpoints for receipt validation and policy verification.

Legal

Terms, privacy policy, and compliance documentation.

Infrastructure

Service metadata and infrastructure information.

Company

Corporate information and brand guidelines.

Portability Pledge

Verify receipts offline using published JWKS. Export-first design with no vendor lock-in. Your data remains portable across any PEAC-conformant system.

Security Model

Ed25519 signatures ensure tamper-evident receipts. Public keys at standard JWKS endpoints. No proprietary verification required.

Conformance

Test vectors and conformance suite available for implementers. Multiple independent implementations expected before PEAC 1.0.

Governance

PEAC protocol stewardship is transparent and documented. Specification changes follow an open process with community input.

Open Source Commitment

The PEAC protocol is an open standard (Apache-2.0) designed for multiple independent implementations. Originary provides one commercial implementation with managed services and tooling built on these open foundations. All protocol specifications and verification endpoints remain publicly accessible.

No vendor lock-in. We are committed to having multiple conformant implementations before PEAC 1.0. Your policies and receipts work across any PEAC-conformant system.

Questions about security, compliance, or our trust practices?

contact@originary.xyz