Per-tenant Ed25519 keypairs. Each tenant's receipts sign with their own key. Their public key is published at a well-known endpoint. Any regulator, auditor, or counterparty can verify the chain without trusting WHL, without trusting any other tenant, and without any WHL infrastructure. This is true cryptographic multi-tenancy.
Each row in this table was structurally impossible with a shared signing key. All of them are now live or technically enabled.
| Capability | Status |
|---|---|
| Tenant A can prove to a regulator they ran Cascade under HIPAA policy — without WHL seeing the proof | ✅ LIVE |
Tenant B can verify Tenant A's signed receipts without trusting WHL — using A's public key from /.well-known |
✅ LIVE |
| Each tenant gets an independent regulatory audit posture — their chain is cryptographically isolated from every other tenant | ✅ LIVE |
| Customers own their cryptographic identity — Cascade as SaaS where the signing authority belongs to the customer | ✅ LIVE |
| Insurance products can bond per-tenant attestation chains — per-tenant signature provides the attribution anchor | ✅ TECHNICALLY POSSIBLE |
| Federation pool contribution attribution by signature — each tenant's pattern contributions are cryptographically attributed | ✅ TECHNICALLY POSSIBLE |
Three components, all live: key storage, public key endpoint, and signing isolation. Back-compat preserved for the global default key.
with_tenant() context continue using the global signing key — no migration required for existing deployments. The per-tenant key activates only when a tenant context is explicitly established.Each scenario was structurally impossible before tonight. Each is now live.
A healthcare company running Cascade exports their receipt chain and public key. They send both to their HIPAA auditor. The auditor verifies the chain cryptographically using the public key. WHL is not in the loop. WHL cannot see the chain. WHL cannot modify the chain retroactively — the Ed25519 signature prevents it. The proof is the customer's to give.
Tenant A runs a governed workflow. Tenant B needs to verify that Tenant A executed under SOC2 policy. Tenant B fetches Tenant A's public key from the well-known endpoint. Tenant B verifies the receipt chain locally. The verification depends only on Tenant A's key and the receipt data — not on WHL's infrastructure, WHL's honesty, or any shared trust anchor between the two tenants.
In traditional SaaS compliance infrastructure, the vendor holds the signing key and the customer trusts the vendor. In Cascade, the tenant holds the signing key. The vendor (WHL) cannot forge receipts on behalf of a tenant, cannot alter a completed chain, and cannot revoke a tenant's historical proof. The cryptographic authority belongs to the customer.
No WHL infrastructure required. No shared trust assumption. Public key + receipt chain = self-contained proof.
"The customer's chain. The customer's key. The customer's proof. WHL cannot see it. WHL cannot fake it. The regulator doesn't need to trust anyone but the math."
Per-tenant Ed25519 keys are the cryptographic primitive that turns Cascade from "a tool that records governed execution" into "infrastructure that makes governed execution independently attestable." That is a different product category — and it is the one that enterprise compliance buyers actually purchase.
Scientific Discipline Provable Execution