Certus Ledger is designed so that the integrity of the signing ceremony does not depend on trusting a vendor database. The evidence chain is anchored on a distributed acyclic graph (DAG) to make tampering detectable and verification independent.
At each boundary, Certus Ledger commits cryptographic fingerprints (hashes / Merkle roots) of the ceremony state to the DAG.
Hashes for each revision boundary so any change is detectable.
Evidence that steps occurred in the required order with no hidden rewrites.
Metadata and proofs that bind the signature to the signer and the exact document state.
A fingerprint of the final output so the delivered contract can be verified later.
Incumbent risk: centralized logs can be altered, replaced, or reinterpreted internally — and buyers often have no independent way to verify.
Certus Ledger outcome: the ceremony’s integrity is evidenced and anchored externally, making tampering detectable and verification portable.