White Paper
The technical foundation behind verified presence.
This white paper explains how Lodestone® uses secure NFC hardware and cryptography to create a tamper-resistant proof that a real person interacted with a real tag at a real place and time.
It is written for partners, builders, and anyone who wants to understand the technical model and security assumptions.
Download the PDF: /white-paper/lodestone-white-paper.pdf
What you’ll find inside
- The problem Lodestone solves and why common approaches fail
- How secure NFC tags prevent cloning and replay
- How identity, place, and time are bound into a verifiable proof
- Why the system is designed for offline use and real-world conditions
- Where Lodestone can be applied, from outdoor play to operational verification
Recommended reading order
- Executive summary
- How verification works (high level)
- Threat model and security properties
- Market applications and platform vision
Want the quick version?
If you want the concept without the cryptography, start with: