Atlas Timestamping
Timestamping provides cryptographic proof of when envelopes existed. Atlas supports two complementary mechanisms: peer witnessing within the network, and blockchain anchoring via the Bitcoin blockchain for externally verifiable, immutable timestamps.
Writing "I trust Alice" isn't enough. For a trust allocation to become recognized by the network, it must be witnessed — observed and timestamped by peers with the authority to do so. For critical envelopes, Bitcoin anchoring provides an additional trust-minimized guarantee.
Peer Witnessing
The witnessing process has three stages:
- Publish — A verified human publishes a trust allocation envelope to a registry.
- Observe — Peers with witnessing competence
observe the envelope and publish an
Observationenvelope referencing the original hash and recording the observation date. - Threshold — Once enough cumulative witness power has observed the envelope, the allocation becomes valid and independently verifiable by anyone on the network.
{
"@context": "https://schema.org",
"@type": "Observation",
"additionalType": "atlas:witness",
"about": {
"@type": "PropertyValue",
"propertyID": "atlas:envelopeHash",
"value": "<hash-of-trust-allocation-envelope>"
},
"observationDate": "2026-04-03T12:00:30.000Z"
} Witnessing Competence
Not everyone can witness. The authority to observe and timestamp envelopes
is earned through trust allocations on the
"witnessing" topic from the previous governance cycle. This
creates a self-governing loop: the community decides who can verify trust,
and that decision is itself subject to trust and governance cycles.
| Property | Description |
|---|---|
| Who can witness | Identities with recognized witnessing competence from the previous governance cycle. |
| Witness power | √(witnessing trust score) — same square-root scaling as all trust-derived power. |
| Threshold | An allocation becomes valid once cumulative witness power exceeds the network threshold. |
| Timing | Witnesses observe envelopes within the governance cycle. Late observations outside the lock window are ignored. |
Bitcoin Blockchain Anchoring
For envelopes that require externally verifiable, trust-minimized timestamps, Atlas supports anchoring to the Bitcoin blockchain via OpenTimestamps. A Bitcoin anchor provides proof that an envelope existed at or before a specific block — independently verifiable by anyone with access to the Bitcoin blockchain, without trusting any Atlas node.
{
"@context": "https://schema.org",
"@type": "Observation",
"additionalType": "atlas:btcTimestamp",
"about": {
"@type": "PropertyValue",
"propertyID": "atlas:envelopeHash",
"value": "<hash-of-envelope>"
},
"observationDate": "2026-04-03T12:00:30.000Z",
"instrument": {
"@type": "SoftwareApplication",
"name": "OpenTimestamps",
"url": "https://opentimestamps.org"
},
"result": {
"@type": "PropertyValue",
"propertyID": "ots:proof",
"value": "<base64-encoded-ots-proof>"
}
} | Mechanism | Trust Model | Latency | Best For |
|---|---|---|---|
| Peer Witnessing | Atlas network witnesses | Seconds | Trust allocations, governance cycle anchoring, routine envelopes. |
| Bitcoin Anchoring | Bitcoin PoW (trust-minimized) | ~1 hour (block confirmation) | Legislation documents, critical governance events, dispute resolution, long-term archival proof. |
The two mechanisms are complementary. Peer witnessing provides fast, in-network timestamps for everyday operations. Bitcoin anchoring provides an immutable external anchor for envelopes where the stakes justify the latency — governance documents, trust cycle boundaries, and any envelope where future disputes may require proof that no Atlas participant can revoke.
Liveness Challenges
Timestamping also underpins registry liveness verification. Registries
periodically send random challenge strings to peers and verify the
signatures, confirming the peer is live and owns its claimed identity. The
lastSeenAt field records the last successful challenge —
registries with stale timestamps are considered offline.
POST /identity/challenge HTTP/2.0
Content-Type: application/json
atlas-identity: <requester-public-key>
atlas-signature: t=1712150400; s=<falcon-signature>
atlas-proofs: [...]
{ "challenge": "<random-string>" }
// Response — registry signs the challenge with its own key
{
"publicKey": "<registry-public-key>",
"signature": "<falcon-signature-over-challenge>"
} Why It Matters
| Property | What it prevents |
|---|---|
| Proof of existence | Prevents backdating trust allocations — you can't claim trust was allocated before it actually was. |
| Governance cycle anchoring | Locks allocations to specific dates, preventing last-minute manipulation before a cycle recognition deadline. |
| Independent verification | Anyone can verify the entire trust lifecycle by checking witness observations and Bitcoin anchors against the governance timeline. |
| Decentralized authority | No single entity controls timestamping. Witness authority is distributed and refreshed every cycle. Bitcoin anchors require no trust in any Atlas participant. |