Dev Release #7Three portals, one tradeRead the notes
Protocol · Proof of Verification · 01 of 3

Proof of Verification — How EDMA Binds Chain State to Real-World Events

Proof of Verification (PoV) is EDMA's consensus mechanism. Unlike PoW (which secures by computational expense) or PoS (which secures by economic commitment), PoV secures by binding chain state to verifiable real-world events. Four-stage flow: Source captures evidence at origin, Verify collects attestor signatures, Gate validates quorum and One-Claim exclusivity, Mint creates tokens only on PASS. Four accountability mechanisms hold attestors to truthful signing: on-chain registry, economic slashing, dispute panels, revocation.

4-stage flowSource → Verify → Gate → Mint
No PASS, no mintStructural invariant
4 accountability layersRegistry, slashing, disputes, revocation

What this page covers

Proof of Verification (PoV) is the consensus mechanism that distinguishes EDMA from generic Layer 2 rollups. Where most blockchains secure transactions through computational work (PoW) or economic stake (PoS), PoV adds a third axis: verification of real-world events. Only events that have passed PoV's evidence-quality checks enter settled state; nothing else can mint tokens or move value through the protocol.

This page covers the four-stage PoV flow that runs on every protocol event, and the four accountability mechanisms that hold attestors to truthful signing. Together these make the verification machinery self-funding and self-correcting at the protocol level — the integrity check is built into consensus rather than bolted on as an audit step.

The PoV flow runs four stages on every event before any token mints. P1 captures evidence at the source with cryptographic signing. P2 collects attestor signatures from registered, role-classified verifiers. P3 validates quorum, equality, and One-Claim exclusivity. P4 mints only on Gate PASS. No exceptions, no workarounds — failed Gate means no value moves.

Why PoV differs from PoW and PoS

Proof of Work secures transactions by making them computationally expensive to forge — an attacker would need to outspend the honest network on hash power. The security model assumes hash power is hard to acquire.

Proof of Stake secures transactions by making forgery economically expensive — an attacker would need to stake more than the honest network's stake and accept slashing when caught. The security model assumes capital is hard to misuse.

Proof of Verification secures real-world claims by making mis-attestation economically and reputationally expensive. An attestor who signs false evidence faces slashing of staked $EDM, reputation degradation in the on-chain registry, exposure to dispute panel review, and revocation of downstream claims. The security model assumes accountable identity is hard to abuse — and that the cost of being caught lying outweighs the value of any single false attestation.

The three are complementary, not alternative. PoV does not replace PoS at the L2 transaction-ordering level; the rollup still uses Ethereum-anchored consensus for transaction sequencing. What PoV adds is a layer on top: a check that the events being settled are verifiable real-world events with attestor backing. The combination produces a chain that is both cryptographically secure (PoS-anchored) and evidentially admissible (PoV-gated).

Four mechanisms compose to hold attestors accountable. A1 on-chain registry with public reputation. A2 economic slashing on a severity scale, routed to the insurance pool. A3 dispute panels with veEDM-weighted review. A4 revocation with append-only lineage preserving the audit trail. Each mechanism is checked at a different point in the lifecycle.

The end-to-end integrity properties

Uniqueness. One-Claim Ledger ensures the same evidenceHash cannot mint twice across the protocol — even if the evidence is also registered on an external registry like Verra or Gold Standard. Registry mirrors bind external serials to the on-chain claim, preventing cross-registry double monetization.

Admissibility. Only registered, role-classified attestors can sign. Quorum and role diversity requirements prevent any single attestor from gating evidence into the protocol alone. The signature requirements make protocol entry a multi-party authorization rather than a single-counterparty trust decision.

Replayability. Every event from source through mint produces a receipt that auditors can replay from L1: the evidenceHash, the attestor signatures, the Gate result, the per-bucket fee distribution, the burn hash. Audit time collapses because the audit trail is the protocol's natural artifact rather than a downstream compilation.

Reversibility. When essential evidence is later proven false, revocation flags dependent assets without erasing history. The receipt continues to exist; an amendment records the revocation event. This handles real-world corrections (an attestor finds a fault, a registry pulls a serial) without breaking the audit trail.

Continue exploring

For the structural comparison of consensus mechanisms see PoW → PoS → PoV. For how PoV-gated settlement flows feed downstream economics see Split and Fee Schedule. For the settlement architecture built on top of PoV see Settlement Overview and ESG Flows. For the energy platform that produces verified events at scale see Energy Platform.

Audited by
Current presale

Verify first. Then mint.

$EDM is the fee, burn, and governance token of the only Ethereum L2 designed to verify real-world events before they settle.

Community Chat

Five channels, one community. Pick where you live online; we'll meet you there.