How Verification Works

Understanding cryptographic verification in Mountain Path protocols

Digital Signatures

Every approved protocol in Mountain Path is digitally signed using Ed25519 cryptography. This ensures the protocol content hasn't been tampered with and comes from a trusted source.

Manifest Hash

A unique fingerprint of the protocol content. Any change creates a different hash.

Key ID

Identifies the signing authority. Only authorized keys can sign protocols.

Verification Process

1

Protocol Creation

Clinical team creates protocol content

2

Review & Approval

Medical reviewers validate content for safety and accuracy

3

Digital Signing

Approved protocol gets cryptographically signed

4

Consumer Access

Verified protocols become available to healthcare providers

Verifying a Protocol

You can manually verify any protocol using our verification tool:

  1. Copy the manifest hash from the protocol header
  2. Copy the key ID from the verification badge
  3. Go to the Verify Signature page
  4. Enter both values and click "Verify"

Valid Signature

A valid signature confirms the protocol is authentic and hasn't been modified.

Security Benefits

Content Integrity

Ensures protocol content hasn't been altered since approval

Source Authentication

Confirms protocols come from authorized medical authorities

Non-repudiation

Signing authority cannot deny having approved the protocol

Offline Verification

Signatures can be verified even without internet connectivity