DRM3 Labs Corp
Provenance for AI.
Know what went in. Prove what came out.
Data with receipts.
Everything else is entropy.

Lava originates from pressure no surface system can see. It flows without permission, transforms everything it contacts, branches and recombines as terrain demands. And when it cools, it hardens into obsidian: dense, permanent, carrying the full chemical record of everything it passed through.
This is data. Not as metaphor. As behavior.
Every data system before DRM3 has this in common with a lava field: to understand what happened, you need a forensic archaeologist. You dig. You date. You reconstruct from fragments. You hope the stratigraphy is intact. You end up with a best guess.
DRM3 does not send you a forensic archaeologist. Every piece of obsidian already knows what happened.
The Problem
Every physical product on earth has a supply chain. Data does not.
Nobody can tell you where a piece of AI output came from, what went into it, or who touched it on the way. Agents are transacting, generating, transforming, and distributing content at machine speed. The infrastructure beneath them produces no record of what happened.
Every system logs. The problem is that logs live somewhere else. They can be rewritten, deleted, or fabricated after the fact. A log entry says what someone recorded. It does not prove what actually occurred. In DRM3, the data is packaged with its receipts. You only expose it at the points of egress you choose.
When AI generates analysis from government data, financial filings, and news feeds, who can prove what went in? When the output shapes policy, investment, or public understanding, who is accountable for the inputs? Today, nobody. The chain of evidence does not exist because data has no supply chain.
Data does not have a trust problem. It has a provenance problem. Trust is the symptom. Missing receipts are the cause.
The Primitive
Attested provenance. Every bit. Every call. Every row.
Not sampled. Not approximated. Not reconstructed after the fact. Every data interaction, every inference call, every row accessed, every transformation applied carries a cryptographically signed receipt from the moment it occurs. The receipt is not attached to the data. It is inseparable from it.
For AI-generated content, this produces something that has not existed before: full attested provenance of every input that produced every output. The model version. The data sources. The access grants. The timestamp. The signing key. All of it, immutable from the instant of generation, verifiable by any downstream party without trusting anyone in the chain.
TCP/IP moved bits reliably.
Ethereum moved value trustlessly.
DRM3 moves data with receipts.
How It Works
Web3-grade cryptographic security. Applied to every piece of data you already use.
Every data operation in DRM3 produces an attestation. The party that performed the work states what was done, what data went in, what came out, and why, and cryptographically signs it. The attestation is the claim and the proof in one act. Signed with Ed25519, the same elliptic curve cryptography that secures blockchain transactions, and chained to every attestation before and after it.
When an article is fetched for World News RAG, the fetch is attested. When AI analyzes that article, the analysis is attested, and its attestation points to the fetch attestation beneath it. When a batch completes, every attestation in the batch rolls into a Merkle tree and the root is signed. The chain is unbroken. Every link is independently verifiable. That is one product. The same protocol runs across every product.
Today, DRM3 Labs operates the signing infrastructure: 30 keys derived from a single root, attesting data from 23 government and public sources, 6,700+ curated news feeds processing millions of articles per year, and 8,881 scanned domains. The provenance protocol is designed to support third-party signers, and the library will be open for others to attest their own data with the same guarantees. Open Signals, the open data ingestor, has every source's license and terms of service publicly documented. The signing keys are published and verifiable. The attestation receipts travel with the data.
You know what you are getting. You know where it came from. You know what touched it on the way. And you can prove all of that to anyone else without trusting us or anyone in the chain. That is what attested provenance means. That is what DRM3 builds.
Selective granularity
Not everything needs the same level of proof. DRM3 provenance operates at three levels, and you choose the one that fits the context.
Row-level. A signed receipt on every individual data point. Maximum auditability. This is what internal audits, compliance checks, and forensic analysis require.
Session-level. Individual receipts roll into a Merkle tree. One root hash covers the entire batch. You get batch-level proof without per-row overhead. Good for pipeline runs, periodic ingests, bulk processing.
Service-level. A single receipt that covers all sessions for a product. External consumers get one verifiable root that proves the same chain without exposing internal detail.
Fine-grained internally. Coarser-grained at the boundary. The chain is the same. The granularity is the choice.
Protocol Requirements
Sovereignty
Full transparency over every piece of data you touch. Where it came from, what its terms are, what you can do with it. No ambiguity. You build with peace of mind, and the people who consume what you produce get receipts proving what went in.
Privacy
Protection of data cannot be contractual. It must be architectural. Cryptographically enforced access control means sharing occurs on the owner's terms, provably, without trusting an intermediary.
Equitability
All participants operate on equal footing relative to the value they create and consume. Enforced through transparent, attested records of who contributed what and how it was used.
Transparency
Visibility into data origin, transformation, and utilization is not a reporting feature. It is attested provenance: a continuous, cryptographically verifiable record from origin to consumption.
Sovereignty without transparency is an unverifiable claim. Equitability without transparency is impossible to assess. Privacy without sovereignty is borrowed protection. The protocol enforces all four simultaneously or it enforces none of them.
Running Now
This is not a whitepaper. It is already running.
Open Data Ingest
23 government and public data sources: SEC filings, FRED economic indicators, Congress.gov legislation, FDIC bank data, Census, USGS, Federal Register. Fetched continuously. Every row signed at ingest.
Article Intelligence
6,700+ curated RSS feeds across 12 active pipelines. Millions of articles per year. Scraped, deduplicated, AI-analyzed for 60+ structured fields. Every article carries a receipt from fetch through analysis.
DNS & Infrastructure Scanning
8,881 domains under continuous scan across 40+ categories. DNS records, TLS certificates, WHOIS, HTTP probes, DNSSEC validation. Full sweep every 42 hours. Every scan signed.
Provenance
Every fetch, every analysis, every transformation signed with Ed25519. Thirty active signing keys. One root. Every key independently verifiable. Twenty-nine anchored on Base.
Because DRM3 works with decentralized AI and open data, we can show what we are doing while we are doing it. The protocol is hardened by the products running on it. This is the start, not the finish.
Real-time health across the entire network. Signers, scanners, pipelines.
status.drm3.networkThe obsidian. Certified data and the products built with it.
See the productsWalk the chain from any output back to the raw source.
The Evolving Protocol Manifest
Open data examples of the protocol in motion.
Open Signals fetches from 23 government and public sources. Connor scans 8,881 domains. World News RAG processes 6,700+ feeds. These are not standalone products. They are substrate APIs. Their outputs aggregate into composite data layers, get harmonized across sources, then synthesized by AI into structured intelligence.
That intelligence feeds content generation: daily digests, market reports, agent outputs, analytical summaries. Each layer consumes the one below it. Each layer signs what it produces. The provenance chain runs from the raw API call through aggregation, harmonization, synthesis, and generation to the final output.
This is what the protocol looks like when it runs on open data. The same architecture works on private data, proprietary feeds, and enterprise sources. The open examples exist because they can be shown. The protocol does not require openness. It requires signing.
Raw APIs. Government data, news feeds, DNS records. Each row signed at the moment of collection.
Composite APIs. Multiple sources combined into unified data layers. Deduplicated, normalized, receipted.
Cross-source reconciliation. Entities resolved, conflicts surfaced, timelines aligned. Signed.
AI analysis. 60+ structured fields. Sentiment, entities, political positioning, financial signals. Every analysis attested.
Content, reports, digests, agent outputs. Built from synthesized intelligence. The provenance of every input travels with the output.
The Moment
The EU AI Act enforcement deadline is August 2026. Articles 12, 14, and 17 require transparency, human oversight, and documented governance for AI systems. Most deployed AI infrastructure does not qualify.
But this is not just a European regulatory question. Data governance in the AI age is a structural problem. When AI shapes policy analysis, financial forecasting, and public understanding, the question of what data went in, and whether anyone can prove it, becomes a question of democratic accountability.
Open data without provenance is a promise. Open data with cryptographic attestation is evidence. The difference is whether transparency can survive the speed and scale of AI.
Provenance as an architectural property, not a reporting burden.
Looking for…
Pistachio?
DRM3 uses inference from everywhere: Venice, Morpheus, Cloudflare, Anthropic, OpenAI, Grok. Pistachio is a Morpheus consumer node we built to go direct to providers. True peer-to-peer AI with no middleman broker. One less hop, no broker tax. Run it locally, or become your own gateway and serve others.
Pistachio