
1. Capture-time sealing, deterministic segmentation, chain continuity, signed manifest.
2. Model identity, runtime identity, input binding, provenance graph, deterministic output encoding.
You only win legally if replay and audit are independently verifiable.
Acceptance tests