
How the Trust Protocol Works
Every action follows a verified path. From submission to exposure, here's how truth flows through the system.
Trigger: A product, company, or ESG claim enters the field.
Mechanism:
- Scanned via app QR - UPC - API
- Marked in Chrome Extension
- Flagged by a Watcher
- Detected through public patterns or external datasets
Output:
- Signal is logged as a suspicious claim
- Pattern engine runs reputation delta
- Delta score is initialized
1. Submit: A product, ESG claim, or corporate disclosure enters the protocol via upload, scan, or external feed. This initiates its traceability through the system.
2. Signal: Users flag suspicious claims using the app, Chrome extension, or API. These signals activate the delta scoring engine and begin evidence collection.
3. Verify: The system launches an enforcement sequence: AI evidence tools, validator review, timestamping, and claim hashing. Each action builds a verifiable trust anchor.
4. Expose: A Delta Report is generated — labeling the claim as Verified, Misleading, or Unverifiable. It’s stored on-chain as part of the public record.
5. Watch: The entity’s TrueScore™ is updated in real time. Repeat offenses degrade trust. Accurate claims increase score. The system evolves as a live reputation graph.
“Lies leave residue. The Delta doesn't forget.”
— Nomi Halix