Reference Implementation: Trust Systems v1.25.0

Trust Systems is a desktop utility for the creation and verification of persistent digital provenance. It serves as the reference implementation for the charm.farm protocols, enabling creators and archivists to embed immutable metadata directly into media files using open standards.

Software distribution

This release includes a signed macOS disk image for Apple Silicon and a source archive for building on Linux and other platforms. SHA-256 checksums are provided for verification.

macOS Apple Silicon · aarch64

Signed .dmg installer. Requires macOS 12 or later on M-series Macs.

Download disk image

18.4 MB

SHA-256 257bbd48664a46ecaa8da964c0e1064879a4054d7e7027a95bdbb9405bf8003a
Source Linux & other platforms

Full source tree as .zip. Build from source on Linux or adapt the toolchain for your environment.

Download source archive

10.6 MB

SHA-256 7ef3519c37a404d1c036b9f2ea142eb12721c63382dff8195a434208a4b2adc4

Intel Mac and Windows installers are not included in this release. Use the source archive or contact systems@charm.farm for deployment options.

Technical Specifications

This release implements the following technical requirements for archival integrity:

Provenance Standard
Fully compliant with the C2PA (Coalition for Content Provenance and Authenticity) specification. It utilizes ES256 (ECDSA P-256) for all cryptographic signatures and X.509 certificate chains in PEM format.
Identification
Generates IPFS CIDv1 identifiers for all processed assets. These are computed locally using a 256KB fixed-size chunker and a balanced DAG layout to ensure deterministic reproducibility across archival systems.
Physical Linking
Supports the ISO/IEC 7816-4 file system and NTAG 424 DNA Secure Dynamic Messaging (SDM) protocol. This allows for the cryptographic binding of digital manifests to physical hardware anchors via PC/SC compliant interfaces (e.g., ACS ACR1252U).

Archival Environment

Trust Systems is designed to operate within air-gapped or high-security environments.

Zero-Telemetry
The application does not require network access and performs no remote tracking. All cryptographic operations, including key generation and manifest signing, occur strictly within a local, encrypted SQLCipher vault.
Data Sovereignty
No asset data or private keys are transmitted or stored outside the user's local file system.

Documentation & Standards

Detailed implementation profiles for Protocol CF-001 (NFC Provisioning) and CF-002 (C2PA Schema) are available.

For technical inquiries or protocol documentation: systems@charm.farm