BitSeal
Effective April 19, 2026

Authority key ceremony.

A public attestation of the cryptographic key that signs BitSeal seal manifests. Includes generation facts, storage, access controls, and instructions for any third party to reproduce the fingerprint offline.

Plain-English summary

Every BitSeal web seal is signed with a single Ed25519 private key held by Orygn LLC. The matching public key is published below and at /.well-known/bitseal-authority-key.json. Anyone who holds the public key, a manifest, and the signature can verify a seal independently of BitSeal's hosted infrastructure using any standard Ed25519 verifier. This document records who generated the key, how it is stored, and who may access it.

1. Purpose

This Key Ceremony document exists so that any third party relying on a BitSeal seal, whether to audit a file, defend a legal position, or evaluate the credibility of BitSeal as a provenance service, can answer three questions without trusting Orygn's marketing copy.

  • Which exact public key is the canonical BitSeal Authority key today.
  • Under what conditions the matching private key was generated and is held.
  • What we can and cannot attest to about its history.

Where we do not have a formal attestation of a historical fact, this document says so plainly. A ceremony document that invents details is worth less than one that is honest about gaps.

2. Current Authority key

The values below are derived at page request time from the private key held in Orygn's production secrets store. They will update immediately on key rotation and always match the value served at the well-known endpoint.

Algorithm
Ed25519 over edwards25519
Fingerprint (SHA-256, colon-hex)
18:40:5A:9B:9A:5A:61:95:E5:E7:A4:32:B9:20:BB:24:C0:BC:00:04:1D:9D:25:EB:0A:24:0B:32:BE:0E:C7:C8
Fingerprint (SHA-256, base64)
GEBam5paYZXl56QyuSC7JMC8AAQdnSXrCiQLMr4Ox8g=
Raw public-key bytes (hex, 32 bytes)
6390fe4a2c6389a1121b149c3b62d785222320175445a130c87ba304b8df5887
Public key (PEM, SubjectPublicKeyInfo)
-----BEGIN PUBLIC KEY-----
MCowBQYDK2VwAyEAY5D+SixjiaESGxScO2LXhSIjIBdURaEwyHujBLjfWIc=
-----END PUBLIC KEY-----

3. Generation record

The current Authority key was generated under the ceremony procedure published in our Rotation Policy. The facts below are the contemporaneous record of that generation event. Any relying party can recompute the public-key fingerprint in Section 2 from the same PEM using the steps in Section 6, a mismatch between what this page claims and what the well-known endpoint serves is the strongest signal that something is wrong.

Generated at (UTC)
2026-04-19T18:21:33Z
Algorithm
Ed25519 (RFC 8032, curve edwards25519)
Generator
node:crypto generateKeyPairSync('ed25519')
Node.js version
v24.12.0
Platform
Windows 11 (build 10.0.26200)
Entropy source
Operating-system CSPRNG reached through Node's bundled OpenSSL (BCryptGenRandom on Windows).
Operator
Daniel Okwor, sole member of Orygn LLC.
Witness
None. Orygn is a sole-operator entity at the time of this ceremony, no third-party witness was present. This is disclosed rather than fabricated.
Post-generation handling
PKCS#8-PEM private key written to a file outside the Git working tree, then piped to vercel env add BITSEAL_PRIVATE_KEY for the Production, Preview, and Development environments of the bit-seal project under the daniels-projects-49baa4b0 Vercel team. The private key is never committed to source control and never transmitted outside the authenticated Vercel CLI channel.

Why a clean first-generation ceremony

Before the date recorded above, a pre-launch Ed25519 key had existed in Vercel environment variables since early development so that the signing code path could be exercised in staging. That key was never used to sign any externally-published seal and is not honored as a historical Authority key. Rather than publish a ceremony document with gaps around its generation, we rotated to the new key recorded here under the full procedure. The pre-launch key is discarded and does not appear in Section 5.

What this record does and does not prove

  • It establishes a self-consistent, timestamped statement of how the key was generated, under what procedure, on what platform.
  • It is signed by the Authority key itself via the Self-Attestation Signature in Section 7, which proves that whoever holds the matching private key is willing to bind themselves to this text.
  • It is not an independent, third-party-witnessed attestation. If your use case requires one, please contact us and we will coordinate a witnessed rotation under the Rotation Policy.

4. Storage and access controls

The Authority private key is held exclusively as a Vercel project environment variable named BITSEAL_PRIVATE_KEY, scoped to the Production, Preview, and Development environments of the bit-seal project under the daniels-projects-49baa4b0 Vercel team.

At rest
Encrypted in Vercel's secret store. The plaintext value is never displayed in the dashboard, it is available only by export through an authenticated CLI session.
In use
Decrypted at Vercel serverless function cold start and passed to Node.js as a process environment variable. Never persisted to disk inside the function container.
In transit
Used only inside the function process to produce Ed25519 signatures. Never transmitted to any party. Signatures are transmitted, the key is not.
Access
Restricted to Orygn personnel who hold ownership or member seats on the Vercel team. The current access list is documented in the Orygn internal runbook.

Known limitation: Vercel environment variables are not HSM-backed. A ceremony migration to a hardware-backed KMS (Google Cloud KMS with a hardware-protection level) is listed as a roadmap item under our Rotation Policy and the Security threat model.

5. Historical keys

When the current Authority key is rotated, its public key is moved into the historical list so that seals signed under the retired key remain independently verifiable forever. Historical keys are never deleted.

No historical keys are recorded. The current Authority key is the first key in BitSeal's operational history. When the first rotation occurs, the retired key will appear here with its effective dates and a rotation reason.

6. Independent verification

You can reproduce the fingerprint in Section 2 offline using any tool that computes SHA-256 over the DER-encoded SubjectPublicKeyInfo of an Ed25519 public key. Two common paths are documented below. Both must produce the same 64-hex-character digest as Section 2.

Using OpenSSL

curl -s https://bitseal.orygn.tech/.well-known/bitseal-authority-key.json \
  | jq -r .current_key.public_key_pem \
  | openssl pkey -pubin -pubout -outform der \
  | openssl dgst -sha256

Using the BitSeal SDK

pip install bitseal
python -m bitseal.verify --fingerprint

If the fingerprint you compute does not match Section 2, stop trusting the page you are reading and email [email protected]. Mismatch is the single strongest signal that the hosted ledger or CDN has been tampered with.

7. Self-attestation signature

A detached Ed25519 signature over the canonical text of this document, signed by the Authority key itself, is available at /api/legal/ceremony-attestation. The endpoint returns a JSON bundle containing the canonical text that was signed, the Ed25519 signature, the public-key fingerprint, and a server-side timestamp.

Signing a document about the Authority key with the Authority key is deliberately recursive and has one narrow property: it proves that whoever held the Authority key at the moment the endpoint was called was willing to bind themselves to the text of this document at that time. It does not prove that the signer is Orygn, that binding comes from the domain, TLS certificate, and corporate records.

A future revision will add a secondary, off-key signature from a personal signing identity held by the Orygn operator so that the self-reference is broken. Until that is in place, treat the self-attestation as a consistency check, not an independent identity check.

8. Changes and amendments

This document is versioned. Every substantive change bumps the effective date at the top of this page. Prior versions are available on request at [email protected].

Contact

Key-ceremony inquiries and fingerprint disputes
[email protected]
Orygn LLC, a Texas limited liability company.