Meridian State Layer

One signed state. Two ways to verify it.

The signed public state behind Trust Center, Verify, and Witness Quorum.

Inspect the current bundle, verify it locally, or compare it to independent replay.

Signed public stateCanonical bundle

One bundle behind every route.

Inspect the current bundle, open the claim graph, and follow the authority path shared by Trust Center, Verify, and Witness Quorum.

Current postureHOLD
State idmvg.state.public.2026-03-09T00-00-00Z
Produced at2026-03-09T00:00:00Z
Fresh until2026-06-19T04:35:21Z
Authority rule

Pages explain. Signed state decides. Missing proofs stay HOLD.

StatusHOLD

The current public posture remains HOLD until required publication proofs become authoritative.

missing_or_unverifiable => HOLD; invalid_or_inconsistent => FAIL

Reason · RC.STATUS.HOLD.REQUIRED_PUBLICATION_PROOFBest route · trust-center
PointerHOLD

The canonical production pointer is published, but its authoritative state remains READY_TO_SIGN and therefore HOLD.

ready_to_sign_or_missing_signature => HOLD

Reason · RC.POINTER.HOLD.READY_TO_SIGNBest route · trust-center
ManifestHOLD

The frontdoor manifest is publicly discoverable and digest-pinned, but unsigned envelope state still keeps posture on HOLD.

unsigned_envelope => HOLD

Reason · RC.MANIFEST.HOLD.UNSIGNED_ENVELOPEBest route · trust-center
AnchorHOLD

External anchor discovery is present, but anchor publication remains READY_TO_ANCHOR and therefore HOLD.

ready_to_anchor_or_missing_anchor => HOLD

Reason · RC.ANCHOR.HOLD.READY_TO_ANCHORBest route · trust-center
Human-friendly JSON twin of the current public state.
Open raw JSON
{
  "state_id": "mvg.state.public.2026-03-09T00-00-00Z",
  "issuer": "meridian-verity-group",
  "produced_at": "2026-03-09T00:00:00Z",
  "canonical_production_pointer": "https://meridianverity.com/.well-known/mvg-prod.json",
  "current_posture": "HOLD",
  "observed_at": "2026-03-09T00:00:00Z",
  "fresh_until": "2026-06-19T04:35:21Z",
  "decision_rule": "missing_or_unverifiable => HOLD; invalid_or_inconsistent => FAIL",
  "bundle_digest": "sha256:1e8048972bd604113ae292840c7412921e9d0aab9da746c1e30d1c8a6bae5198",
  "manifest_ref": "sha256:125e7ab269941f7c6d11bf14c07241d65ff0fb84b98043aeb417f4fff6726795",
  "keys_ref": "sha256:2f1973507d35d0b6912b3e2e6b9374904bf61e74b4ac9c3edbfc82959a7d66fa",
  "reason_codes_ref": "sha256:1c832eefa10704a71fed4b74756dbdec3e14f475be52b72e31e4b0822dee639f",
  "source_artifacts": {
    "status_dsse": "/.well-known/mvg-status.prod.dsse.json",
    "frontdoor_manifest_dsse": "/.well-known/mvg-frontdoor.manifest.prod.dsse.json",
    "production_pointer": "/.well-known/mvg-prod.json",
    "anchor": "/.well-known/mvg-prod.anchor.json",
    "reviewer_index": "/.well-known/mvg-reviewer-index.json",
    "witness_index": "/.well-known/keys/witness/index.json",
    "scitt_export": "/.well-known/mvg-scitt-export.json"
  },
  "claims": [
    {
      "claim_id": "mvg.claim.public.posture",
      "statement": "The current public posture remains HOLD until required publication proofs become authoritative.",
      "kind": "status",
      "status": "HOLD",
      "scope": {
        "surface": "public",
        "route": "trust-center",
        "subject": "current-public-state"
      },
      "owner": {
        "team": "trust-systems",
        "contact_ref": "/.well-known/security.txt"
      },
      "observed_at": "2026-03-09T00:00:00Z",
      "fresh_until": "2026-06-19T04:35:21Z",
      "expires_at": "2026-06-19T04:35:21Z",
      "evidence_dependencies": [
        "mvg.evidence.status.aggregate",
        "mvg.evidence.production.pointer",
        "mvg.evidence.frontdoor.manifest",
        "mvg.evidence.anchor",
        "mvg.evidence.witness.index",
        "mvg.evidence.reviewer.index"
      ],
      "decision_rule": "missing_or_unverifiable => HOLD; invalid_or_inconsistent => FAIL",
      "verify": {
        "command": "python3 public_verify_site_release_v50_4.py --evidence-bundle MVG_SiteRelease_Evidence_Bundle_MVG-SITE-PROD-20260227.3.zip --trust-mode prod",
        "expected_reason_codes": [
          "RC.STATUS.HOLD.REQUIRED_PUBLICATION_PROOF"
        ]
      },
      "reason_code": "RC.STATUS.HOLD.REQUIRED_PUBLICATION_PROOF",
      "tier": "public",
      "supersedes": "mvg.claim.public.posture@2026-03-06T00-00-00Z",
      "changed_since": "2026-03-06T00:00:00Z"
    },
    {
      "claim_id": "mvg.claim.production.pointer",
      "statement": "The canonical production pointer is published, but its authoritative state remains READY_TO_SIGN and therefore HOLD.",
      "kind": "pointer",
      "status": "HOLD",
      "scope": {
        "surface": "public",
        "route": "trust-center",
        "subject": "canonical-production-pointer"
      },
      "owner": {
        "team": "release-integrity",
        "contact_ref": "/.well-known/security.txt"
      },
      "observed_at": "2026-02-23T00:00:00Z",
      "fresh_until": "2026-06-19T04:35:21Z",
      "expires_at": "2026-06-19T04:35:21Z",
      "evidence_dependencies": [
        "mvg.evidence.production.pointer",
        "mvg.evidence.anchor"
      ],
      "decision_rule": "ready_to_sign_or_missing_signature => HOLD",
      "verify": {
        "command": "gpg --verify /.well-known/mvg-prod.json.asc /.well-known/mvg-prod.json",
        "expected_reason_codes": [
          "RC.POINTER.HOLD.READY_TO_SIGN"
        ]
      },
      "reason_code": "RC.POINTER.HOLD.READY_TO_SIGN",
      "tier": "public",
      "supersedes": "mvg.claim.production.pointer@2026-02-23T00-00-00Z",
      "changed_since": "2026-02-23T00:00:00Z"
    },
    {
      "claim_id": "mvg.claim.frontdoor.manifest",
      "statement": "The frontdoor manifest is publicly discoverable and digest-pinned, but unsigned envelope state still keeps posture on HOLD.",
      "kind": "manifest",
      "status": "HOLD",
      "scope": {
        "surface": "public",
        "route": "trust-center",
        "subject": "frontdoor-manifest"
      },
      "owner": {
        "team": "trust-systems",
        "contact_ref": "/.well-known/security.txt"
      },
      "observed_at": "2026-03-09T00:00:00Z",
      "fresh_until": "2026-06-19T04:35:21Z",
      "expires_at": "2026-06-19T04:35:21Z",
      "evidence_dependencies": [
        "mvg.evidence.frontdoor.manifest"
      ],
      "decision_rule": "unsigned_envelope => HOLD",
      "verify": {
        "command": "jq . /.well-known/mvg-frontdoor.manifest.prod.dsse.json",
        "expected_reason_codes": [
          "RC.MANIFEST.HOLD.UNSIGNED_ENVELOPE"
        ]
      },
      "reason_code": "RC.MANIFEST.HOLD.UNSIGNED_ENVELOPE",
      "tier": "public",
      "supersedes": "mvg.claim.frontdoor.manifest@2026-03-06T00-00-00Z",
      "changed_since": "2026-03-06T00:00:00Z"
    },
    {
      "claim_id": "mvg.claim.anchor.receipt",
      "statement": "External anchor discovery is present, but anchor publication remains READY_TO_ANCHOR and therefore HOLD.",
      "kind": "anchor",
      "status": "HOLD",
      "scope": {
        "surface": "public",
        "route": "trust-center",
        "subject": "external-anchor"
      },
      "owner": {
        "team": "release-integrity",
        "contact_ref": "/.well-known/security.txt"
      },
      "observed_at": "2026-02-23T23:26:11Z",
      "fresh_until": "2026-06-19T04:35:21Z",
      "expires_at": "2026-06-19T04:35:21Z",
      "evidence_dependencies": [
        "mvg.evidence.anchor"
      ],
      "decision_rule": "ready_to_anchor_or_missing_anchor => HOLD",
      "verify": {
        "command": "openssl ts -verify -in ./.well-known/mvg-prod.receipt.sha256.tsr -data ./.well-known/mvg-prod.receipt.sha256 -CAfile <tsa_chain.pem>",
        "expected_reason_codes": [
          "RC.ANCHOR.HOLD.READY_TO_ANCHOR"
        ]
      },
      "reason_code": "RC.ANCHOR.HOLD.READY_TO_ANCHOR",
      "tier": "public",
      "supersedes": "mvg.claim.anchor.receipt@2026-02-23T23-26-11Z",
      "changed_since": "2026-02-23T23:26:11Z"
    },
    {
      "claim_id": "mvg.claim.witness.index",
      "statement": "The public witness index is present and machine-readable.",
      "kind": "key_index",
      "status": "PASS",
      "scope": {
        "surface": "public",
        "route": "trust-center",
        "subject": "witness-index"
      },
      "owner": {
        "team": "trust-systems",
        "contact_ref": "/.well-known/security.txt"
      },
      "observed_at": "2026-03-06T00:00:00Z",
      "fresh_until": "2026-06-06T00:00:00Z",
      "expires_at": "2026-06-06T00:00:00Z",
      "evidence_dependencies": [
        "mvg.evidence.witness.index"
      ],
      "decision_rule": "index_present => PASS",
      "verify": {
        "command": "jq . /.well-known/keys/witness/index.json",
        "expected_reason_codes": [
          "RC.WITNESS.PASS.PUBLIC_INDEX_PRESENT"
        ]
      },
      "reason_code": "RC.WITNESS.PASS.PUBLIC_INDEX_PRESENT",
      "tier": "public",
      "supersedes": "mvg.claim.witness.index@2026-02-24T00-00-00Z",
      "changed_since": "2026-03-06T00:00:00Z"
    },
    {
      "claim_id": "mvg.claim.reviewer.routing",
      "statement": "The reviewer index is published and routes leadership, security, procurement, and licensing to the correct next step.",
      "kind": "routing",
      "status": "PASS",
      "scope": {
        "surface": "public",
        "route": "trust-center",
        "subject": "reviewer-routing"
      },
      "owner": {
        "team": "trust-systems",
        "contact_ref": "/.well-known/security.txt"
      },
      "observed_at": "2026-02-24T00:00:00Z",
      "fresh_until": "2026-06-24T00:00:00Z",
      "expires_at": "2026-06-24T00:00:00Z",
      "evidence_dependencies": [
        "mvg.evidence.reviewer.index"
      ],
      "decision_rule": "index_present => PASS",
      "verify": {
        "command": "jq . /.well-known/mvg-reviewer-index.json",
        "expected_reason_codes": [
          "RC.ROUTING.PASS.REVIEWER_INDEX_PRESENT"
        ]
      },
      "reason_code": "RC.ROUTING.PASS.REVIEWER_INDEX_PRESENT",
      "tier": "public",
      "supersedes": "mvg.claim.reviewer.routing@2026-02-23T00-00-00Z",
      "changed_since": "2026-02-24T00:00:00Z"
    }
  ],
  "edges": [
    {
      "from": "mvg.evidence.status.aggregate",
      "to": "mvg.claim.public.posture",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.production.pointer",
      "to": "mvg.claim.public.posture",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.frontdoor.manifest",
      "to": "mvg.claim.public.posture",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.anchor",
      "to": "mvg.claim.public.posture",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.witness.index",
      "to": "mvg.claim.public.posture",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.reviewer.index",
      "to": "mvg.claim.public.posture",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.production.pointer",
      "to": "mvg.claim.production.pointer",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.anchor",
      "to": "mvg.claim.production.pointer",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.frontdoor.manifest",
      "to": "mvg.claim.frontdoor.manifest",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.anchor",
      "to": "mvg.claim.anchor.receipt",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.witness.index",
      "to": "mvg.claim.witness.index",
      "kind": "supports"
    },
    {
      "from": "mvg.evidence.reviewer.index",
      "to": "mvg.claim.reviewer.routing",
      "kind": "supports"
    },
    {
      "from": "mvg.claim.production.pointer",
      "to": "mvg.claim.public.posture",
      "kind": "resolves"
    },
    {
      "from": "mvg.claim.frontdoor.manifest",
      "to": "mvg.claim.public.posture",
      "kind": "resolves"
    },
    {
      "from": "mvg.claim.anchor.receipt",
      "to": "mvg.claim.public.posture",
      "kind": "resolves"
    },
    {
      "from": "mvg.claim.witness.index",
      "to": "mvg.claim.public.posture",
      "kind": "resolves"
    },
    {
      "from": "mvg.claim.reviewer.routing",
      "to": "mvg.claim.public.posture",
      "kind": "resolves"
    }
  ]
}
Current DSSE envelope. Signature state is visible in the object and remains fail-closed.
Open DSSE envelope
{
  "payloadType": "application/vnd.meridian.state+json",
  "payload": "{"state_id":"mvg.state.public.2026-03-09T00-00-00Z","issuer":"meridian-verity-group","produced_at":"2026-03-09T00:00:00Z","canonical_production_pointer":"https://meridianverity.com/.well-known/mvg-prod.json","current_posture":"HOLD","observed_at":"2026-03-09T00:00:00Z","fresh_until":"2026-06-19T04:35:21Z","decision_rule":"missing_or_unverifiable => HOLD; invalid_or_inconsistent => FAIL","bundle_digest":"sha256:1e8048972bd604113ae292840c7412921e9d0aab9da746c1e30d1c8a6bae5198","manifest_ref":"sha256:125e7ab269941f7c6d11bf14c07241d65ff0fb84b98043aeb417f4fff6726795","keys_ref":"sha256:2f1973507d35d0b6912b3e2e6b9374904bf61e74b4ac9c3edbfc82959a7d66fa","reason_codes_ref":"sha256:1c832eefa10704a71fed4b74756dbdec3e14f475be52b72e31e4b0822dee639f","source_artifacts":{"status_dsse":"/.well-known/mvg-status.prod.dsse.json","frontdoor_manifest_dsse":"/.well-known/mvg-frontdoor.manifest.prod.dsse.json","production_pointer":"/.well-known/mvg-prod.json","anchor":"/.well-known/mvg-prod.anchor.json","reviewer_index":"/.well-known/mvg-reviewer-index.json","witness_index":"/.well-known/keys/witness/index.json","scitt_export":"/.well-known/mvg-scitt-export.json"},"claims":[{"claim_id":"mvg.claim.public.posture","statement":"The current public posture remains HOLD until required publication proofs become authoritative.","kind":"status","status":"HOLD","scope":{"surface":"public","route":"trust-center","subject":"current-public-state"},"owner":{"team":"trust-systems","contact_ref":"/.well-known/security.txt"},"observed_at":"2026-03-09T00:00:00Z","fresh_until":"2026-06-19T04:35:21Z","expires_at":"2026-06-19T04:35:21Z","evidence_dependencies":["mvg.evidence.status.aggregate","mvg.evidence.production.pointer","mvg.evidence.frontdoor.manifest","mvg.evidence.anchor","mvg.evidence.witness.index","mvg.evidence.reviewer.index"],"decision_rule":"missing_or_unverifiable => HOLD; invalid_or_inconsistent => FAIL","verify":{"command":"python3 public_verify_site_release_v50_4.py --evidence-bundle MVG_SiteRelease_Evidence_Bundle_MVG-SITE-PROD-20260227.3.zip --trust-mode prod","expected_reason_codes":["RC.STATUS.HOLD.REQUIRED_PUBLICATION_PROOF"]},"reason_code":"RC.STATUS.HOLD.REQUIRED_PUBLICATION_PROOF","tier":"public","supersedes":"mvg.claim.public.posture@2026-03-06T00-00-00Z","changed_since":"2026-03-06T00:00:00Z"},{"claim_id":"mvg.claim.production.pointer","statement":"The canonical production pointer is published, but its authoritative state remains READY_TO_SIGN and therefore HOLD.","kind":"pointer","status":"HOLD","scope":{"surface":"public","route":"trust-center","subject":"canonical-production-pointer"},"owner":{"team":"release-integrity","contact_ref":"/.well-known/security.txt"},"observed_at":"2026-02-23T00:00:00Z","fresh_until":"2026-06-19T04:35:21Z","expires_at":"2026-06-19T04:35:21Z","evidence_dependencies":["mvg.evidence.production.pointer","mvg.evidence.anchor"],"decision_rule":"ready_to_sign_or_missing_signature => HOLD","verify":{"command":"gpg --verify /.well-known/mvg-prod.json.asc /.well-known/mvg-prod.json","expected_reason_codes":["RC.POINTER.HOLD.READY_TO_SIGN"]},"reason_code":"RC.POINTER.HOLD.READY_TO_SIGN","tier":"public","supersedes":"mvg.claim.production.pointer@2026-02-23T00-00-00Z","changed_since":"2026-02-23T00:00:00Z"},{"claim_id":"mvg.claim.frontdoor.manifest","statement":"The frontdoor manifest is publicly discoverable and digest-pinned, but unsigned envelope state still keeps posture on HOLD.","kind":"manifest","status":"HOLD","scope":{"surface":"public","route":"trust-center","subject":"frontdoor-manifest"},"owner":{"team":"trust-systems","contact_ref":"/.well-known/security.txt"},"observed_at":"2026-03-09T00:00:00Z","fresh_until":"2026-06-19T04:35:21Z","expires_at":"2026-06-19T04:35:21Z","evidence_dependencies":["mvg.evidence.frontdoor.manifest"],"decision_rule":"unsigned_envelope => HOLD","verify":{"command":"jq . /.well-known/mvg-frontdoor.manifest.prod.dsse.json","expected_reason_codes":["RC.MANIFEST.HOLD.UNSIGNED_ENVELOPE"]},"reason_code":"RC.MANIFEST.HOLD.UNSIGNED_ENVELOPE","tier":"public","supersedes":"mvg.claim.frontdoor.manifest@2026-03-06T00-00-00Z","changed_since":"2026-03-06T00:00:00Z"},{"claim_id":"mvg.claim.anchor.receipt","statement":"External anchor discovery is present, but anchor publication remains READY_TO_ANCHOR and therefore HOLD.","kind":"anchor","status":"HOLD","scope":{"surface":"public","route":"trust-center","subject":"external-anchor"},"owner":{"team":"release-integrity","contact_ref":"/.well-known/security.txt"},"observed_at":"2026-02-23T23:26:11Z","fresh_until":"2026-06-19T04:35:21Z","expires_at":"2026-06-19T04:35:21Z","evidence_dependencies":["mvg.evidence.anchor"],"decision_rule":"ready_to_anchor_or_missing_anchor => HOLD","verify":{"command":"openssl ts -verify -in ./.well-known/mvg-prod.receipt.sha256.tsr -data ./.well-known/mvg-prod.receipt.sha256 -CAfile <tsa_chain.pem>","expected_reason_codes":["RC.ANCHOR.HOLD.READY_TO_ANCHOR"]},"reason_code":"RC.ANCHOR.HOLD.READY_TO_ANCHOR","tier":"public","supersedes":"mvg.claim.anchor.receipt@2026-02-23T23-26-11Z","changed_since":"2026-02-23T23:26:11Z"},{"claim_id":"mvg.claim.witness.index","statement":"The public witness index is present and machine-readable.","kind":"key_index","status":"PASS","scope":{"surface":"public","route":"trust-center","subject":"witness-index"},"owner":{"team":"trust-systems","contact_ref":"/.well-known/security.txt"},"observed_at":"2026-03-06T00:00:00Z","fresh_until":"2026-06-06T00:00:00Z","expires_at":"2026-06-06T00:00:00Z","evidence_dependencies":["mvg.evidence.witness.index"],"decision_rule":"index_present => PASS","verify":{"command":"jq . /.well-known/keys/witness/index.json","expected_reason_codes":["RC.WITNESS.PASS.PUBLIC_INDEX_PRESENT"]},"reason_code":"RC.WITNESS.PASS.PUBLIC_INDEX_PRESENT","tier":"public","supersedes":"mvg.claim.witness.index@2026-02-24T00-00-00Z","changed_since":"2026-03-06T00:00:00Z"},{"claim_id":"mvg.claim.reviewer.routing","statement":"The reviewer index is published and routes leadership, security, procurement, and licensing to the correct next step.","kind":"routing","status":"PASS","scope":{"surface":"public","route":"trust-center","subject":"reviewer-routing"},"owner":{"team":"trust-systems","contact_ref":"/.well-known/security.txt"},"observed_at":"2026-02-24T00:00:00Z","fresh_until":"2026-06-24T00:00:00Z","expires_at":"2026-06-24T00:00:00Z","evidence_dependencies":["mvg.evidence.reviewer.index"],"decision_rule":"index_present => PASS","verify":{"command":"jq . /.well-known/mvg-reviewer-index.json","expected_reason_codes":["RC.ROUTING.PASS.REVIEWER_INDEX_PRESENT"]},"reason_code":"RC.ROUTING.PASS.REVIEWER_INDEX_PRESENT","tier":"public","supersedes":"mvg.claim.reviewer.routing@2026-02-23T00-00-00Z","changed_since":"2026-02-24T00:00:00Z"}],"edges":[{"from":"mvg.evidence.status.aggregate","to":"mvg.claim.public.posture","kind":"supports"},{"from":"mvg.evidence.production.pointer","to":"mvg.claim.public.posture","kind":"supports"},{"from":"mvg.evidence.frontdoor.manifest","to":"mvg.claim.public.posture","kind":"supports"},{"from":"mvg.evidence.anchor","to":"mvg.claim.public.posture","kind":"supports"},{"from":"mvg.evidence.witness.index","to":"mvg.claim.public.posture","kind":"supports"},{"from":"mvg.evidence.reviewer.index","to":"mvg.claim.public.posture","kind":"supports"},{"from":"mvg.evidence.production.pointer","to":"mvg.claim.production.pointer","kind":"supports"},{"from":"mvg.evidence.anchor","to":"mvg.claim.production.pointer","kind":"supports"},{"from":"mvg.evidence.frontdoor.manifest","to":"mvg.claim.frontdoor.manifest","kind":"supports"},{"from":"mvg.evidence.anchor","to":"mvg.claim.anchor.receipt","kind":"supports"},{"from":"mvg.evidence.witness.index","to":"mvg.claim.witness.index","kind":"supports"},{"from":"mvg.evidence.reviewer.index","to":"mvg.claim.reviewer.routing","kind":"supports"},{"from":"mvg.claim.production.pointer","to":"mvg.claim.public.posture","kind":"resolves"},{"from":"mvg.claim.frontdoor.manifest","to":"mvg.claim.public.posture","kind":"resolves"},{"from":"mvg.claim.anchor.receipt","to":"mvg.claim.public.posture","kind":"resolves"},{"from":"mvg.claim.witness.index","to":"mvg.claim.public.posture","kind":"resolves"},{"from":"mvg.claim.reviewer.routing","to":"mvg.claim.public.posture","kind":"resolves"}]}",
  "signatures": []
}
Repeat reviewers should only reread the deltas that matter.
Open changes view
{"type": "state_bundle_published", "state_id": "mvg.state.public.2026-03-09T00-00-00Z", "route": "/trust-center/state/", "changed_at": "2026-03-09T00:00:00Z", "summary": "Normalized public state bundle published for import, diff, and lineage."}
{"type": "status_change", "claim_id": "mvg.claim.public.posture", "from": "HOLD", "to": "HOLD", "reason_code": "RC.STATUS.HOLD.REQUIRED_PUBLICATION_PROOF", "changed_at": "2026-03-09T00:00:00Z", "summary": "Current public posture remains HOLD because required publication proofs are still not authoritative."}
{"type": "pointer_phase", "claim_id": "mvg.claim.production.pointer", "from": "READY_TO_SIGN", "to": "READY_TO_SIGN", "reason_code": "RC.POINTER.HOLD.READY_TO_SIGN", "changed_at": "2026-02-23T00:00:00Z", "summary": "Canonical production pointer remains in READY_TO_SIGN phase."}
{"type": "freshness_change", "claim_id": "mvg.claim.witness.index", "old_fresh_until": "2026-05-24T00:00:00Z", "new_fresh_until": "2026-06-06T00:00:00Z", "changed_at": "2026-03-06T00:00:00Z", "summary": "Witness index refreshed and freshness window extended."}
{"type": "routing_refresh", "claim_id": "mvg.claim.reviewer.routing", "from": "2026-02-24T00:00:00Z", "to": "2026-03-09T00:00:00Z", "reason_code": "RC.ROUTING.PASS.REVIEWER_INDEX_PRESENT", "changed_at": "2026-03-09T00:00:00Z", "summary": "Reviewer routes normalized into the state layer and surfaced for repeat review."}
{"type": "anchor_phase", "claim_id": "mvg.claim.anchor.receipt", "from": "READY_TO_SIGN", "to": "READY_TO_SIGN", "reason_code": "RC.ANCHOR.HOLD.READY_TO_ANCHOR", "changed_at": "2026-02-23T23:26:11Z", "summary": "External anchor discovery remains READY_TO_ANCHOR."}
Same trust anchors referenced by the current public state bundle and verifier.
Open keys view
{
  "root_keys": [
    {
      "key_id": "mvg-openpgp-2026",
      "algorithm": "openpgp",
      "status": "active",
      "fingerprint": "12D9E2941E95C485C3D908BA4A70FE198AEC7BEB",
      "public_key_ref": "/pgp.asc",
      "source": "/.well-known/security.txt"
    }
  ],
  "witness_keys": [
    {
      "key_id": "w1",
      "algorithm": "openpgp",
      "status": "active",
      "fingerprint": "5C766E32E1B5C6A4E233B5FD74778298BFF446C5",
      "public_key_ref": "/.well-known/keys/witness/w1.asc",
      "source": "/trust/witnesses/independent-witness-1/pgp.asc"
    },
    {
      "key_id": "w2",
      "algorithm": "openpgp",
      "status": "active",
      "fingerprint": "A774FB5F68F9CBD6EB359730D28C87506334BDCC",
      "public_key_ref": "/.well-known/keys/witness/w2.asc",
      "source": "/trust/witnesses/independent-witness-2/pgp.asc"
    },
    {
      "key_id": "w3",
      "algorithm": "openpgp",
      "status": "active",
      "fingerprint": "D7E4275ABF9DE493CF2277BFBA9A68227DB41E25",
      "public_key_ref": "/.well-known/keys/witness/w3.asc",
      "source": "/trust/witnesses/independent-witness-3/pgp.asc"
    }
  ]
}