What this page covers
Proof of Verification (PoV) is the consensus mechanism that distinguishes EDMA from generic Layer 2 rollups. Where most blockchains secure transactions through computational work (PoW) or economic stake (PoS), PoV adds a third axis: verification of real-world events. Only events that have passed PoV's evidence-quality checks enter settled state; nothing else can mint tokens or move value through the protocol.
This page covers the four-stage PoV flow that runs on every protocol event, and the four accountability mechanisms that hold attestors to truthful signing. Together these make the verification machinery self-funding and self-correcting at the protocol level — the integrity check is built into consensus rather than bolted on as an audit step.
A real-world event generates evidence at its source — a smart meter recording kilowatt-hours of renewable generation, an IoT sensor logging emissions data, a customs system releasing a shipment, a lab analyzing soil carbon. The evidence is signed cryptographically at the source using a canonical schema (MeterReadingBatch.v1, EmissionsBatch.v1, ShipmentEvent.v1) so downstream systems can verify origin authenticity.
Registered attestors — certified auditors, utility operators, satellite operators, accredited labs — review the evidence and co-sign with their cryptographic identity. Attestors are in the on-chain registry with role classification (AUDITOR, METER_OP, REGISTRAR, etc.) and reputation history. Multiple attestor signatures with required role diversity are common for higher-trust applications.
The PoV Gate runs three checks on every event: (1) attestation quorum — minimum number of valid signatures with required role diversity, (2) equality of evidence — every signature references the same canonical evidenceHash, (3) One-Claim exclusivity — the evidenceHash has not been finalized elsewhere on the protocol, preventing double-counting across registries or platforms.
On Gate PASS, the appropriate token mints to the producer's wallet: $ETT for energy generation (1 per 10 kWh), $CLE for retail-tier energy (1 per 1 MWh), Carbon NFTs for verified removals or avoidance, EMTs for trade milestones. On Gate FAIL, nothing mints; the event is logged for review but does not enter settled state. This is the structural invariant: no PASS, no value moves.
Why PoV differs from PoW and PoS
Proof of Work secures transactions by making them computationally expensive to forge — an attacker would need to outspend the honest network on hash power. The security model assumes hash power is hard to acquire.
Proof of Stake secures transactions by making forgery economically expensive — an attacker would need to stake more than the honest network's stake and accept slashing when caught. The security model assumes capital is hard to misuse.
Proof of Verification secures real-world claims by making mis-attestation economically and reputationally expensive. An attestor who signs false evidence faces slashing of staked $EDM, reputation degradation in the on-chain registry, exposure to dispute panel review, and revocation of downstream claims. The security model assumes accountable identity is hard to abuse — and that the cost of being caught lying outweighs the value of any single false attestation.
The three are complementary, not alternative. PoV does not replace PoS at the L2 transaction-ordering level; the rollup still uses Ethereum-anchored consensus for transaction sequencing. What PoV adds is a layer on top: a check that the events being settled are verifiable real-world events with attestor backing. The combination produces a chain that is both cryptographically secure (PoS-anchored) and evidentially admissible (PoV-gated).
The end-to-end integrity properties
Uniqueness. One-Claim Ledger ensures the same evidenceHash cannot mint twice across the protocol — even if the evidence is also registered on an external registry like Verra or Gold Standard. Registry mirrors bind external serials to the on-chain claim, preventing cross-registry double monetization.
Admissibility. Only registered, role-classified attestors can sign. Quorum and role diversity requirements prevent any single attestor from gating evidence into the protocol alone. The signature requirements make protocol entry a multi-party authorization rather than a single-counterparty trust decision.
Replayability. Every event from source through mint produces a receipt that auditors can replay from L1: the evidenceHash, the attestor signatures, the Gate result, the per-bucket fee distribution, the burn hash. Audit time collapses because the audit trail is the protocol's natural artifact rather than a downstream compilation.
Reversibility. When essential evidence is later proven false, revocation flags dependent assets without erasing history. The receipt continues to exist; an amendment records the revocation event. This handles real-world corrections (an attestor finds a fault, a registry pulls a serial) without breaking the audit trail.
Continue exploring
For the structural comparison of consensus mechanisms see PoW → PoS → PoV. For how PoV-gated settlement flows feed downstream economics see Split and Fee Schedule. For the settlement architecture built on top of PoV see Settlement Overview and ESG Flows. For the energy platform that produces verified events at scale see Energy Platform.




