Six encyclopedic explainers. No hand-waving. Each covers the full technical pipeline from first principles through production architecture, with real performance numbers from measured systems.
Each explainer is self-contained. Read them in any order. They cross-reference each other where architectural dependencies exist.
The attestation pipeline from state change detection through hash computation, PQ signature, chain extension, and on-chain anchor. Why periodic audits leave gaps that continuous attestation eliminates.
Agents act faster than humans audit. Every agent action becomes a node in a cryptographic execution DAG. Scope enforcement, negative authority proofs, and deterministic replay at any timestamp.
Compute on ciphertext without decrypting. Prove the computation was correct without revealing inputs. BFV, CKKS, TFHE unified under a single 74-byte attestation model with STARK integrity proofs.
Six dimensions. Weighted composite scoring. Degradation detection. Recovery tracking. A continuous numerical signal that tells you whether your governance infrastructure is actually functioning.
Deterministic reconstruction from cryptographic evidence. DAG traversal, state reconstruction, frame hashing. Replay any timestamp. Detect any tampering. Fork to explore counterfactuals.
Harvest now, decrypt later applies to governance evidence, not just encrypted data. Three independent hardness assumptions. NIST FIPS 203/204/205. No performance tradeoff.
These explainers describe what H33 does. The research section explains why the alternatives fail.