White Paper

The technical foundation behind verified presence.

This white paper explains how Lodestone® uses secure NFC hardware and cryptography to create a tamper-resistant proof that a real person interacted with a real tag at a real place and time.

It is written for partners, builders, and anyone who wants to understand the technical model and security assumptions.

Download the PDF: /white-paper/lodestone-white-paper.pdf


What you’ll find inside

  • The problem Lodestone solves and why common approaches fail
  • How secure NFC tags prevent cloning and replay
  • How identity, place, and time are bound into a verifiable proof
  • Why the system is designed for offline use and real-world conditions
  • Where Lodestone can be applied, from outdoor play to operational verification

Recommended reading order

  1. Executive summary
  2. How verification works (high level)
  3. Threat model and security properties
  4. Market applications and platform vision

Want the quick version?

If you want the concept without the cryptography, start with:

Prefer the overview?

Start with the simple explanation, then dive technical when you want.