Public Cryptographic Registry
This cryptographic transparency registry publishes events generated by the ITYLOS infrastructure.
Each entry corresponds to a mathematically verifiable operation: capsule creation, access, or destruction.
The log is designed to be an independently auditable integrity registry.
Transparency model
The ITYLOS registry is inspired by transparency registries used in modern security infrastructure.
This model is comparable to systems such as:
- Certificate Transparency (CT)
- Cryptographic transparency logs
- Audited append-only logs
Independent registry audit
The registry can be analyzed independently from the ITYLOS infrastructure.
The cryptographic fingerprints allow reconstructing the integrity chain from the Genesis block and mathematically verifying that no event has been deleted or modified.
Absolute confidentiality
The registry contains no sensitive data.
Only anonymized cryptographic fingerprints (SHA-256 hashes) and technical identifiers are published. This Zero-Knowledge system preserves the anonymity of the sender and recipient.
Real-time event stream
Published events: 1 771 | Last updated: 2026-04-06 14:21 UTC
Frequently Asked Questions
Understanding the purpose of the append-only audit log
Does the registry prove the destruction of capsules?
The registry publishes cryptographic events associated with capsules. Destructions appear as timestamped events (DESTROYED status) permanently recorded in the integrity chain.
What is a transparency registry?
It allows mathematically verifying that a system’s operations actually took place at a specific point in time and have never been modified or erased after the fact.
Do secrets appear in this registry?
The registry contains only cryptographic fingerprints (hashes) and anonymized technical identifiers. No sensitive data is published.
Can the registry be audited?
Anyone can analyze the fingerprints, export the registry in JSON format, and verify the consistency of the event chain in a completely independent manner.
Can the registry be modified?
The log is designed as append-only. Each entry is cryptographically linked to the previous one via its
previous_hash. Any modification or deletion of a past event would immediately break the entire mathematical chain.