Version: 1.0.0 Status: Approved Scope: Gankpo Suite, Gankpo Reader, Gankpo Reader Mobile, Gankpo Field.
The core verification of all Gankpo products now relies on a centralized module: TrustEngineCore
This engine guarantees a perfectly consistent trust ecosystem across all runtimes.
It handles:
The primary interface is verify_container() which returns the TrustEngineResult payload.
Mandatory Signature Statuses:
ValidNot VerifiableInvalidScope: Lightweight verifier.
Scope: Rapid verification and active capture.
Field operations allow the generation of hardware-anchored Gankpo containers directly on offline devices. Process: capture evidence -> compute BLAKE3 hash -> sign evidence -> create custody event -> attach metadata -> sync with Suite.
A customized trust view adapted for low-visibility, high-pace environments. Emphasis on:
The internal Gankpo Suite verification processes must utilize verify_container().
Pages updated: VerifyPage, ExpertVerifyView, DocumentActionPanel.
Suite and Desktop Reader expose the UniversalProofInspector with all tools unlocked:
A single truth. An identical container must output the exact same verification result whether evaluated on Suite, Reader, Reader Mobile, or Field.
The gkp_trust_engine Rust module serves as the exclusive and absolute source of truth for cryptographic validation.
All validations (integrity, signatures, anchors, custody chains, policies, scores) are strictly computed by Rust.
The frontend TrustEngineCore is uniquely a transparent wrapper that invokes the backend (trust_engine_verify_container), devoid of any independent deduction capability.
The exact resolution of a signer's identity lies securely within the SignerResolutionEngine inside the Rust backend.
This ensures an absolute, unguessable display of identities across all systems.
SignerInfo object carries a definitive resolution_status.unknown_authority or missing_identity_binding are never fallback UI guesses; they are strict cryptographic statuses returned explicitly by Rust when applicable.To combat forged implementations, a software verification stamp is now required.
The application indicates: Verified by Gankpo Reader along with:
If a GKP is processed strictly but the engine does not pass authenticity checks, the following alert is displayed:
Verification engine not recognized.
Every verification report explicitly embeds:
engine_version (e.g., v1.0.0)container_version (e.g., v4)engine_signature (e.g., "GANKPO_OFFICIAL_SIG")is_official_engine (e.g., true)Comprehensive validation via Vitest integration and mock simulation logic testing the bridging pipeline between Swift/Tauri into to TrustEngineCore:
test_signer_resolution_in_rust, test_frontend_wrapper_only, test_unknown_signer_only_when_resolution_fails, test_cross_runtime_same_signer_resolution, test_trusted_signer_never_displayed_as_unknown, test_engine_signature_protection.