Skip to content
CCCrisisCore Systems
Proof

Release evidence, trust case materials, and verification receipts.

Start here if you want to verify the work. This page shows what can be inspected, what order to inspect it in, and where the public source record lives.

What this page is not: not a claim of perfect security, universal protection, or guaranteed outcomes. It is an inspection surface.

What this page is

Release evidence, trust case materials, verification receipts, and links into the public proof-of-work behind the commercial claims.

Verification path

Review one case, inspect one artifact, then inspect the public repo and supporting records.

What is out of scope

No claim here should be read as perfect security, universal protection, or a substitute for your own review.

GitHub org role

Public proof-of-work, public docs, and inspectable artifacts that anchor the commercial trust path.

Deeper inspection
The proof path has three layers
1. Working product case

PainTracker shows minimization-first health logging with local default storage, no account requirement for core use, and explicit export.

2. Release-bound trust case

ProofVault shows how claims were narrowed to what the release process could actually prove through pinned specimens, verifier paths, CI, and drift checks.

3. Public method

Protective Computing and the Overton Framework provide the doctrine, DOI-backed records, and audit vocabulary behind the work.

How to inspect CrisisCore in 5 minutes
  1. Read the PainTracker case.
  2. Inspect the redacted threat model excerpt.
  3. Review the ProofVault trust case.
  4. Check public source records.
  5. Send your product URL if the failure pattern looks familiar.
Quick fit check (60 seconds)

If the proof surface feels close to your situation, send the URL and the failure you're worried about.

I'll tell you which proof path is most relevant, what I would inspect first, and whether the service fit is real.

  • Send URL + stage + one concern.
  • Start from contact and send only the basics.
  • Skip decks and long docs.

Usually answered within 1-3 business days with fit, first checks, and suggested package.

Want this inspection applied to your product?

Start with a 48-hour teardown if you need the first risks fast. Use a full review if you need a deeper buyer-ready risk map.

PainTracker

Reduced default centralization of sensitive health-adjacent data and kept core use local by default.

  • • Reduced default collection of dangerous data
  • • Kept critical flows usable under partial connectivity
  • • Replaced silent failure with explicit recovery paths
  • • Made sharing explicit instead of background-assumed
ProofVault

Turned trust claims into release-bound evidence with a narrower, more defensible guarantee surface.

  • • Tied public claims to hosted-green release evidence
  • • Reduced unearned claim surface
  • • Made drift a visible failure condition
  • • Left a clearer inspection path for skeptical buyers
Why this matters to a buyer

You are not buying theory. You are buying a clearer risk picture, fewer bad assumptions, and a faster path to practical fixes.

  • • Less risky default collection
  • • Fewer hidden trust failures near launch
  • • Clearer boundaries for product and engineering teams
  • • Proof a buyer can inspect without a long sales call
Flagship case

PainTracker: minimization-first redesign for a trust-sensitive workflow

Minimization-first pain documentation built to reduce dangerous collection, keep core use on-device, and stay usable under degraded conditions.

Before

Most pain tracking products assume accounts, stable connectivity, and default centralization of intimate health data.

After

Core logging stays local by default, primary use does not require sign-up, and sharing happens through explicit exports instead of background sync.

Minimization delta
  • • Removed default collection paths that centralize sensitive symptom history
  • • Moved day-to-day ownership to on-device storage by default
  • • Replaced ambient sharing assumptions with explicit user-initiated export
Proof you can inspect

Boundary statements, data inventory, retention posture, and export behavior are all visible.

0 account requirement for core use: users can log entries without sign-up or default account capture.
0 background sharing by default: exports are user-initiated and explicit.
A clear minimization boundary: sensitive day-to-day records stay local unless the user deliberately exports them.
Core logging flow remains available offline under partial connectivity.
Check the evidence path

Suggested inspection order for a buyer evaluating fit.

1. Inspect the live system

See whether the product behavior matches the public claims.

2. Inspect the repository

Review implementation history, issue shape, and whether the build is real.

3. Inspect the dossier and artifacts

Problem, constraints, decisions, and outputs are shown as evidence.

4. Inspect the canon

Use the DOI-backed framework if you want the deeper method behind the work.

Release-bound trust case

ProofVault: bounded trust evidence tied to the hosted-green release

A deliberately bounded trust case that reduces unearned claim surface through a pinned specimen, drift enforcement, and hosted-CI provenance.

What changed

A trust dossier, pinned specimen, verifier path, regeneration flow, and drift checks now live in the repo. The guarantee surface is narrowed to what those artifacts can prove.

Why it matters

Hosted CI became the release gate, so the public trust case is tied to the exact final non-debug commit, not a locally-green approximation.

ProofVault trust case excerpt proof card
Trust case excerpt
ProofVault release-bound artifact hash proof card
Release-bound provenance
Inspect the path

Short case first, then dossier, then long-form walkthrough.

Claim surface is deliberately narrowed: the public guarantee is limited to what the specimen, verifier path, and hosted release can prove.
Pinned specimen is reproducible across local and hosted CI execution paths.
Verifier path demonstrates both valid and tampered behavior against the same specimen.
Artifact index

Start with the bounded materials that directly support commercial trust review.

Method and sources

If you want the deeper method behind the service work, the canon shows the operating model behind the artifacts.

Optional for buyers. Start at Layer 1 if you want the theory behind the practice.
Public source surface

Public repositories, commit history, public docs, and published artifacts.

The GitHub org exists in this trust path as public proof-of-work: a place to inspect code, docs, and artifact history rather than accept marketing claims on faith.

Flagship system in the open

PainTracker.ca — minimization-first pain tracking PWA, local-first by default.

Redacted audit surface

Audit and security work is shown through bounded outputs, remediation structure, and a redacted artifact sample.

  • A bounded risk register prioritized to top findings (typically 10) with triage order.
  • A threat model with explicit assumptions and hard boundaries (what must not fail).
  • Actionable findings: reproduction steps, impact, and recommended fixes.
  • A remediation plan ordered by risk reduction per unit effort.
  • Verification steps: tests or procedures that prove the issue is closed.
If you are comparing options

Fastest path: review the flagship case, inspect one redacted artifact, then send your product details.

Defensibility Packet preview artifact
Defensibility Packet preview
Local authority versus cloud dependence diagram
Trust boundary reference
Threat boundary map diagram
Audit boundary reference
Verification path
1. Case

Start with the commercial case-study route, then confirm the matching PainTracker case surface.

2. Artifacts

Inspect the defensibility packet, threat model excerpt, and release-bound trust materials.

3. Public records

Use the GitHub org, live systems, and fetchability diagnostics to confirm the inspection path is real.

Integrity stance

The work is designed for adversarial environments: low trust, coercion risk, degraded infrastructure. Verification beats narrative.

Rule
Proof over promises.

Every claim should have a source of record: DOI, repo, deployment, or artifact.

Fetchability diagnostics

Quick verifier for non-browser clients. Primary checks are HTML-first; mirror checks cover XML, RSS, and raw mirrors that should also be verified from a second network.

Primary checks
Mirror checks
Command check (GET, primary): curl -sS -D - -o NUL -A "python-requests/2.31.0" https://crisiscore-systems.ca/site-map