Don’t censor
We do not add hidden content filters or silent policy layers to inference requests. You choose the model behavior, prompts, and workflow constraints.
VaaS turns inference from logging into proof. Requests, hashes, signatures, chain linkage, and exportability combine into a verifiable inference system
The operating model behind our public product and private deployments.
We do not add hidden content filters or silent policy layers to inference requests. You choose the model behavior, prompts, and workflow constraints.
If we cannot verify a model fact, billing edge case, or infrastructure condition, we say so directly instead of fabricating certainty.
We separate BatchIn guarantees from upstream model behavior. Auditability, routing, and billing are ours. Model weights and vendor training choices are not.
Every supported audit record can be hashed, signed, and externally verified. The goal is operational trust, not marketing trust.
Hash only
Input and output content are reduced to hashes for audit records. Raw prompts do not need to live in the verifier layer.
Ed25519 signatures
Each record is signed with an Ed25519 keypair so external verifiers can reproduce the trust check in their own environment.
GPU-linked audit metadata
Model id, GPU id, timestamp, and record hashes are bound together in the signed payload.
Optional on-chain anchoring
When enabled, audit references can link outward for third-party timestamp verification without making chain storage mandatory.
| Feature | BatchIn VaaS | Standard Logging | Blockchain Verification |
|---|---|---|---|
| Overhead | < 10ms | ~0ms | 500ms-30s |
| Tamper evidence | Hash chain + Ed25519 | None | Immutable ledger |
| Client-side verify | Yes | No | Yes, expensive |
| Cost per record | $0 | $0 | $0.001-$0.01 |
| Privacy | Hash-only, no raw content in audit | Full content often logged | Hash on-chain |
We can walk through the audit model, security headers, cookie strategy, and deployment posture with your team.