logoalt Hacker News

ramozyesterday at 10:41 PM1 replyview on HN

I would like to know more. I’m with a startup in this space.

Our focus is “verifiable computing” via cryptographic assurances across governance and provenance.

That includes signed credentials for capability and intent warrants.


Replies

niyikizayesterday at 11:02 PM

Interesting. Are you focused on the delegation chain (how capabilities flow between agents) or the execution boundary (verifying at tool call time)? I've been mostly on the delegation side.

Working on this at github.com/tenuo-ai/tenuo. Would love to compare approaches. Email in profile?

show 1 reply