How it works¶
- Build - Your application is compiled into a reproducible, deterministic artifact
- Deploy - The artifact is deployed to Caution's verifiable compute environment
- Prove - Cryptographic proofs attest to what code is running
- Verify - Anyone can verify the deployment matches the source