Five Networks.
One Verifiable Outcome.
Zero Drift.
Public verification surface for catastrophe measurement.
A Verifiable Measurement Authority is a protocol-governed system that produces cryptographically sealed, independently replayable measurements whose validity does not depend on institutional trust.
Multi-source corroboration eliminates single points of failure. Deterministic computation makes every result replayable. Cryptographic sealing reduces reliance on institutional trust by providing independently verifiable mathematical proof. This is an evidentiary layer for settlement logic — not a replacement for catastrophe models.
The Oracle Problem Isn't About
Data Availability. It's About
Evidentiary Admissibility.
When billions move on a single measurement, the question is not whether the data is available — it is whether the data is provably correct, reproducible, and non-manipulated. OSINT-grade data is being used in settlement-grade systems. That gap is structural, not ideological.
Single Point of Failure
Parametric triggers often rely on a single data source. If that source is wrong, manipulated, or delayed — the entire contract fails. Any system that moves money based on OSINT is structurally unsafe.
No Reproducibility
Can you replay the computation that determined a payout? Can you verify the data hasn't been modified since measurement? If the answer is no, you don't have evidence — you have narrative.
Trust Without Evidence
Traditional oracles rely on institutional trust. Settlement-grade systems require cryptographic proof — independently verifiable, deterministically replayable, and non-repudiable.
From OSINT to VOSINT
Evidentiary-grade, open-source intelligence whose integrity, provenance, timing, and completeness are cryptographically attested, independently corroborated, and deterministically reproducible — admissible for automated decisioning and settlement systems.
VOSINT classifies admissibility.
OSINT — Informational
- Publicly available, anyone can scrape
- Single source, unverified
- Manual reconciliation
- No tamper evidence
- Unreproducible analysis
- Verification is social or reputational
VOSINT — Attestation-Grade
- Multi-source corroborated
- Cryptographic provenance (hashes, signatures, Merkle roots)
- Deterministic consensus engine
- Bit-for-bit reproducible
- Fail-closed: unverifiable data does not pass
- Anyone can independently recompute
Why the "V" Earns Its Keep
Three properties. Non-overlapping. Each independently necessary.
Verified
The data passed explicit integrity checks at the time of ingestion. Not "seems right" — mechanically verified.
Verifiable
Any third party can independently recompute and confirm the same result. Verification is deterministic, not reputational.
Witnessed
The data's existence, state, and timing were independently attested — non-repudiable. Merkle seals and TSA timestamps are not version control. They are witnesses.
Open Sources, Verified
The Sovrient protocol ingests from the same public authorities available to all participants — USGS, EMSC, JMA, GFZ, IRIS. The distinction: every observation is hashed at fetch time, corroborated across sources, and sealed with cryptographic proof.
Open Standards, Auditable
Loss calculations use Oasis LMF (open source, industry standard). Vulnerability curves are published CSV files. Cryptography uses GPG, SHA-256, EdDSA. No proprietary component exists anywhere in the verification chain.
Quantified Agreement.
Sealed Before Calculation.
Before any loss calculation runs, independent seismological networks must agree within tolerance. The corroboration record — showing exactly how close sources agreed on location, magnitude, and timing — is sealed as a cryptographic artifact. This is not metadata. It is forensic-grade input verification, preserved as contemporaneous evidence.
Important distinction: The ±60s / ±50km / ±0.2M tolerances are post-event agreement thresholds between independent observation networks — not prediction intervals. This system verifies what already happened. It does not forecast what will happen. "Deterministic" refers to the computation (same inputs → same outputs → same hash), not to the seismology.
Event: ms_t5901126 | 2026-02-06
Myanmar–India Border Region · M5.2Event: ms_t5901840 | 2026-02-08
45 km SSW of Maisí, Cuba · M5.5How This Answers All Three Problems
SINGLE_SOURCE) are excluded from GUL. If only one network reports an event, it does not enter the financial calculation — regardless of magnitude. 10-year backfill identified $5,300,000.00 in false payouts that corroboration would have prevented.8f6894ab…9651 is identical across independent runs. 3,221 days. Zero drift.Three Problems.
Three Answers.
Each problem identified above has a direct, operational answer — not a whitepaper promise, but a live system producing verifiable outputs daily. The Sovrient protocol reduces reliance on institutional trust by making verification computable.
Multi-Source Corroboration
Five independent seismological networks (USGS, EMSC, JMA, GFZ, IRIS) must agree within defined tolerance before an event is confirmed. Disagreements are surfaced, not suppressed. Single-source events are excluded — they never enter the financial calculation.
Deterministic Computation
Every calculation produces identical results across execution paths. Not approximately reproducible — identical, bit-for-bit, across substrates. Run the pipeline twice, compare the hash. Match or fail. No ambiguity.
Cryptographic Finality
Every attestation is timestamped, hashed with SHA-256, signed with Ed25519. Corroboration metrics are sealed as artifacts before loss calculation begins. The proof exists before anyone has a reason to dispute it.
What This System Does.
What It Does Not.
Settlement-grade systems require explicit boundaries. The following declarations define the scope and limits of the Sovrient verification protocol.
Within Scope
Explicitly Out of Scope
Independent Verification Procedure
BUNDLE HASHRANGE MERKLE ROOTFrom Corroboration
to Settlement
The verification pipeline does not terminate at measurement. Multi-source corroboration (P1) feeds deterministic loss calculation (P2), producing cryptographically sealed attestations (P3) — every step signed and replayable. The chain from raw seismological observation to financial attestation is unbroken.
Firm Simulation — 10Y Backfill Run
| Metric | Value | Notes |
|---|---|---|
| Total Ground-Up | $18,604,182,501.17 | Raw modeled loss (Oasis LMF) |
| Layer Loss | $1,260,894,998.98 | Parametric index triggers |
| Latest Day (Feb 8) | $11,486,996.56 | 11 M4+ events · 1,046 unique areaperils · 36 confirmed (>=2 sources) |
| Invalid Days | 0 | ✅ Zero invalid across full range |
Live Attestations
Corroboration results from the multi-source verification pipeline. Each row represents a cryptographically sealed daily attestation.
SIGNATURE: EdDSA 56FA491FF6EA4FE5E86D21A775867DAF1EE06FC4
2026-02-08_eod) so each canonical state has its own tx and replay reference. Latest sealed state (canonical close): eventsUnique=11, GUL=$11,486,996.56, tx 0xe65d...a36a. Historical intraday anchor: 0x0b79...ef5d.
Verification Pipeline
From raw seismological data to cryptographically sealed attestation. OSINT enters; VOSINT exits.
- USGSUSA
- EMSCEU
- JMAJP
- GFZDE
- IRISNET
- Time tolerance±60s
- Distance tolerance±50km
- Magnitude tolerance±0.2
- SHA-256Hash
- GPG / EdDSASign
- TSATime
- On-chain anchorSepolia
Fail-closed: unverifiable data does not pass. OSINT enters; VOSINT exits.
SOVOS_CANON_V1 · Schema v2.4
Witnessed: every attestation is independently attested, non-repudiable, and contemporaneous.
Current Treaty Language
Is Not Built for This Depth.
Catastrophe bond offering circulars typically specify a trigger in a few pages: one data source, one parameter, one institution's word. The treaty commonly does not address what happens when sources disagree, when magnitudes are revised post-publication, or when a moderate earthquake in a dense exposure zone produces more loss than a larger event in open ocean. The evidentiary standard has not kept pace with settlement automation.
Current Treaty Practice
Deterministic Multi-Source Settlement Standard (DMSS)
Worked Example: February 6, 2026 — Why Magnitude Alone Misprices Risk
| Event | Location | Mag | Cells | Modeled GUL | Mag-Only Trigger | Δ Mispricing |
|---|---|---|---|---|---|---|
| event_4 | Kamchatka, Russia | M5.1 | 243 | $2,531,000.00 | Tier 1 ($500,000.00) | −$2,031,000.00 |
| event_9 | Banda Sea, Indonesia | M5.9 | 89 | $1,939,299.00 | Tier 2 ($2,000,000.00) | +$60,701.00 |
| event_1 | Myanmar–India Border | M5.2 | 626 | $1,716,000.00 | Tier 1 ($500,000.00) | −$1,216,000 |
| event_3 | NW Argentina | M4.9 | 567 | $1,355,000.00 | Tier 1 ($500,000.00) | −$855,000.00 |
| event_8 | Off Honshu, Japan | M4.5 | 230 | $730,000.00 | Tier 1 ($500,000.00) | −$230,000.00 |
| event_2 | N Chile | M4.4 | 161 | $605,000.00 | Tier 1 ($500,000.00) | −$105,000.00 |
| event_5 | NW Argentina | M4.2 | 185 | $531,000.00 | Below threshold | −$531,000.00 |
| event_6 | Eastern Turkey | M4.8 | 109 | $487,000.00 | Tier 1 ($500,000.00) | +$13,000.00 |
| event_7 | Off Fukushima, Japan | M4.1 | 136 | $402,500.00 | Below threshold | −$402,500.00 |
day_corroboration_2026-02-06.json, GUL computation via Oasis LMF (eve | getmodel | gulcalc -S 10 -s 12345), input hash footprint.bin: 4a373319…, and Ed25519 signed attestation 23f4e565e265…. The computation is independently replayable; the evidence exists before the dispute.§9 — Why Event Closure Matters
Adoption Path
Institutional Interfaces
The Sovrient protocol delivers VOSINT-grade, evidence-bound loss proxies for daily oversight — complementary to, not a substitute for, traditional claims and actuarial accounting. The system provides LPs and risk committees a deterministic, auditable signal between event and official loss release, without altering how final settlements are calculated. Attestation-grade intelligence for systems that require admissibility, not availability.
Attestation Delivery: From Hash Chain to Human-Readable Instrument
📊 For Cat Bond Managers
- Independent settlement verification — Cuba M5.5 on Feb 8 processed from notification to sealed attestation in 40 minutes, with multi-source corroborated inputs from USGS, EMSC, and GFZ
- Quantified corroboration metrics (km, sec, Δmag) sealed before loss calculation — contemporaneous evidence, not retroactive reconstruction
- Replayable computation — identical replay hash across independent runs, 3,221 days verified
- Three consecutive daily attestations: Feb 6 ($10,296,797.06, 9 events), Feb 7 ($4,113,998.79, 5 events), Feb 8 ($11,486,996.56, 11 M4+ events, 36 confirmed)
- Fail-closed: GFZ connection failure on Feb 8 recorded in manifest — system refused partial output until --allow-partial explicitly enabled
⛓️ For DeFi Protocols
- Attestation hashes compatible with on-chain verification
- Merkle inclusion proofs for settlement logic
- Witnessed timestamps + EdDSA signatures
- Dispute-resistant evidence packs
- Fail-closed gating for execution safety
📈 For Cat-Bond ETF Sponsors
- Publishable verification packs for public markets
- Daily receipts and signed manifests
- Evidence lane without exposure to private IP
- Hash handles for transparent disclosures
- Independent verification procedure included
🧠 For Cat Modelers
- Audit overlay: input/output hash chain
- Replayable run certificates without IP leakage
- Deterministic receipts for compliance
- Proof that stated inputs produced stated outputs
- Optional on-chain anchor compatibility
🌦️ For Parametric Insurers
- Multi-source trigger corroboration
- Witnessed event evidence for disputes
- Deterministic loss proxies
- Signed bundles suitable for adjudication
- Fail-closed verification procedure
🔗 For On-Chain Re Protocols
- Attestation roots compatible with smart contracts
- Merkle inclusion proofs for settlement
- Non-repudiable signatures and timestamps
- Chain-agnostic anchor policy (testnet → mainnet)
- Fail-closed semantics for execution safety
🗃️ For Data Markets & Oracles
- Signed range packs with provenance
- Deterministic transforms for auditability
- Chain-of-custody verification steps
- Hash handles for downstream distribution
- Independent reproducibility without coordination