Evaluate PEAC
This page collects the information an evaluator, enterprise architect, or institutional reviewer needs to assess PEAC Protocol.
What PEAC proves
- +A specific issuer signed a specific set of claims at a specific time
- +The receipt has not been tampered with (Ed25519 signature verification)
- +Verification is offline: no network calls to the issuer required
- +Policy binding: optional cryptographic proof that a specific policy was in effect
What PEAC does not prove
- –That the claims in the receipt are true (PEAC records what the issuer attested, not what actually happened)
- –Payment finality, settlement, or custody (commerce evidence is observational, never transactional)
- –Identity of the agent or user beyond what the issuer attests
- –Compliance with any specific regulation (PEAC provides evidence; compliance is the operator's responsibility)
Wire stability
| Format | JWS typ | Status |
|---|---|---|
| Wire 0.1 | peac-receipt/0.1 | Frozen until v1.0. No new features. Maintained for backward compatibility. |
| Wire 0.2 | interaction-record+jwt | Stable. Current standard for new integrations. Structured kinds, typed extensions, policy binding. |
Verification model
Algorithm: Ed25519 (RFC 8032) only. No RSA, no ECDSA.
JOSE hardening: embedded keys rejected, crit rejected, b64:false rejected, zip rejected. JWS size cap 256 KB.
Offline: verifyLocal() requires only the compact JWS and the issuer's public key. No network calls.
Strictness: strict (default) enforces type-to-extension mapping. interop downgrades violations to warnings.
Discovery: /.well-known/peac-issuer.json with jwks_uri pointing to the issuer's public keys.
Current release
Governance
PEAC is an open-source protocol under Apache-2.0. Stewarded by Originary. No vendor lock-in: core packages have zero vendor names.
Normative decisions are tracked in a numbered log. The current release ships 193 normative decisions.
Wire format peac-receipt/0.1 is frozen until v1.0. Public API surface is locked with pack-install smoke tests.
Review materials
Wire format, conformance, normative references
Verification security model, threat analysis
Version history and changelogs
Decision-making and neutrality commitments
Wire formats, fields, verification, carriers
Grants, governments, NGOs, research