What Sovrient Is
Sovrient ingests measurements from calibrated sensor networks and applies a deterministic admissibility framework to produce sealed, replayable evidence. Name note: Sovrient is independent from and unaffiliated with Sovrin.
Sovrient turns independently observable signals into replayable evidence artifacts so teams can review machine-supported decisions without rebuilding the record from scratch.
Start here if you need to know what Sovrient does, who it is for, and what can be independently checked before legal, technical, safety, or financial diligence goes deep.
Sovrient is not autonomy, a black-box score, or a settlement authority. It is the evidence-governance layer between raw machine output and accountable review, with replayable artifacts and declared scope boundaries.
Seismic is the live lane. Maritime AIS is published as a bounded governance seed over authoritative open U.S. coastal data; additional lanes, including cyber and public-record observatories, are introduced only when their verification surfaces are stable enough to publish. See the governance reconstruction surface for the current cross-lane posture.
Sovrient publishes sealed, replayable event measurements. Independent networks must agree. Computation is deterministic. Evidence is cryptographically witnessed.
What you get: a bundle any counterparty can independently verify. What it is not: settlement authority, underwriting advice, or legal adjudication.
Sovrient ingests measurements from calibrated sensor networks and applies a deterministic admissibility framework to produce sealed, replayable evidence. Name note: Sovrient is independent from and unaffiliated with Sovrin.
When billions move on a single measurement, the question is not whether the data is available — it is whether the data is provably consistent, replayable, and non-manipulated under declared scope. OSINT-grade data is being used in settlement-grade systems. That gap is structural, not ideological.
Historical precedent matters: FONDEN-era trigger disputes showed how post-publication source revisions can move capital when evidentiary controls are weak.
Correctness is defined relative to declared inputs and tolerances.
Parametric triggers often rely on a single data source. If that source is wrong, manipulated, or delayed — the entire contract fails. Any system that moves money based on OSINT is structurally unsafe.
Can you replay the computation that determined a payout? Can you verify the data hasn't been modified since measurement? If the answer is no, you don't have evidence — you have narrative.
Traditional oracles rely on institutional trust. Settlement-grade systems require cryptographic proof — independently verifiable, deterministically replayable, and non-repudiable.
Evidentiary-grade, open-source intelligence whose integrity, provenance, timing, and completeness are cryptographically attested, independently corroborated, and deterministically reproducible — designed to support verification and governance workflows under contract-defined authority.
Three properties. Non-overlapping. Each independently necessary.
The data passed explicit integrity checks at the time of ingestion. Not "seems right" — mechanically verified.
Any third party can independently recompute and confirm the same result under declared scope, command, and model/version. Verification is deterministic, not reputational.
The data's existence, state, and timing were independently attested — non-repudiable. Merkle seals and TSA timestamps are not version control. They are witnesses.
The Sovrient protocol ingests from the same public authorities available to all participants — USGS, EMSC, JMA, GFZ, IRIS. The distinction: every observation is hashed at fetch time, corroborated across sources, and sealed with cryptographic proof.
Loss calculations use Oasis LMF (open source, industry standard). Vulnerability curves are published CSV files. Cryptography uses Ed25519 (detached, GPG-format), SHA-256, and timestamp witnessing. No proprietary component is required for the published verification path.
Before any loss calculation runs, independent seismological networks must agree within tolerance. The corroboration record — showing exactly how close sources agreed on location, magnitude, and timing — is sealed as a cryptographic artifact. This is not metadata. It is forensic-grade input verification, preserved as contemporaneous evidence.
Important distinction: The ±60s / ±50km / ±0.2M tolerances are post-event agreement thresholds between independent observation networks — not prediction intervals. This system verifies what already happened. It does not forecast what will happen. "Deterministic" refers to the computation (same inputs → same outputs → same hash), not to the seismology.
SINGLE_SOURCE) are excluded from GUL. If only one network reports an event, it does not enter the financial calculation — regardless of magnitude. 10-year backfill identified $5,300,000.00 in false payouts that corroboration would likely have prevented under these declared rules.sync pending is identical across independent runs. -- days. Zero computational variance (DT0) under declared scope.Each problem identified above has a direct, operational answer — not a whitepaper promise, but a live system producing verifiable outputs daily. The Sovrient protocol reduces reliance on institutional trust by making verification computable.
Five independent seismological networks (USGS, EMSC, JMA, GFZ, IRIS) must agree within defined tolerance before an event is confirmed. Disagreements are surfaced, not suppressed. Single-source events are excluded — they never enter the financial calculation.
Every calculation produces identical results across execution paths. Not approximately reproducible — identical, bit-for-bit, across substrates. Run the pipeline twice, compare the hash. Match or fail. No ambiguity.
Every attestation is timestamped, hashed with SHA-256, signed with Ed25519. Corroboration metrics are sealed as artifacts before loss calculation begins. The proof exists before anyone has a reason to dispute it.
Settlement-grade systems require explicit boundaries. The following declarations define the scope and limits of the Sovrient verification protocol.
BUNDLE HASHRANGE MERKLE ROOTThe verification pipeline does not terminate at measurement. Multi-source corroboration (P1) feeds deterministic loss calculation (P2), producing cryptographically sealed attestations (P3) — every step signed and replayable. The chain from raw seismological observation to financial attestation is unbroken.
| Metric | Value | Notes |
|---|---|---|
| Total Ground-Up | $18,604,182,501.17 | Raw modeled loss (Oasis LMF) |
| Layer Loss | $1,260,894,998.98 | Parametric index triggers |
| Latest Day (sync pending) | -- | sync pending |
| Invalid Days | 0 | ✅ Invalid Days: 0 (no fail-closed publication events across the audited interval) |
Corroboration results from the incentive-orthogonal corroboration (IOC) pipeline. Each row represents a cryptographically sealed daily attestation.
data/ms_zones_latest.json, data/dsd_latest.json, data/dsd_release_state.json, data/rinex_witness_latest.json, and sovrient-live-metrics.js. Sealed artifacts are authoritative when values differ.Latest status is visible in the hero metrics and ticker. Full attestation tables, Merkle traces, and deployment anchors are available in Technical mode.
Compact operator summary for the KEV observation lane. Full trend and term detail live on the status surface.
sync pending · -- days · Trigger days --. Backfill day count is the number of sealed daily attestation records in the audited set (not raw calendar-day delta).sync pending · Replay hash sync pending.sync pending. Anchor publication can lag computation; use the “Latest Daily Tx” row as the authoritative on-chain reference for the latest anchored state. Historical intraday anchor: 0x0b79...ef5d.
From raw seismological data to cryptographically sealed attestation. OSINT enters; VOSINT exits.
Catastrophe bond offering circulars typically specify a trigger in a few pages: one data source, one parameter, one institution's word. The treaty commonly does not address what happens when sources disagree, when magnitudes are revised post-publication, or when a moderate earthquake in a dense exposure zone produces more loss than a larger event in open ocean. The evidentiary standard has not kept pace with settlement automation.
t5903010) was sealed with cross-source agreement before daily loss computation. Day totals were: 30 confirmed events, 12 GUL events, and $19,799,793.76 total GUL. The row below shows the primary corroboration and footprint evidence for this event from the sealed daily bundle.| Event | Location | Mag | Cells | Sources | Spatial Δ | Temporal Δ |
|---|---|---|---|---|---|---|
| ms_t5903010 | Chile (Coquimbo Offshore) | M6.2 | 557 | EMSC + USGS | 0.000 km | 0.384 sec |
day_corroboration_2026-02-12.json, receipt day_receipt.json, deterministic GUL output gul_total.json (total_loss_usd 19799793.76), input hash input/footprint.bin: 3dbe9bf61160…, and Ed25519-signed attestation hash 95fda2ddd77d…. The computation is independently replayable; evidence is preserved before downstream dispute processes begin.The Sovrient protocol delivers VOSINT-grade, evidence-bound loss proxies for daily oversight — complementary to, not a substitute for, traditional claims and actuarial accounting. The system provides LPs and risk committees a deterministic, auditable signal between event and official loss release, without altering how final settlements are calculated. Attestation-grade intelligence for systems that require admissibility, not availability.
t5903010) was corroborated and sealed before loss computation, then replayable for downstream model governance.Use this intake for diligence screens, verifier access, API mirror onboarding, intermediary conversations, maritime governance, cyber observability, government/prime teaming, or general institutional outreach.
Route yourself clearly. If you are coming from deal diligence, infrastructure, maritime/autonomy, cyber, real estate, public sector, contracting, prime integration, or data/oracle workflows, choose the closest audience and use case so the inquiry lands with the right lane owner.