# Usher Labs' Verity Documentation ## Docs - [Proof](https://docs.verity.usher.so/api-reference/endpoint/proof.md): Opens a Server-Sent Events (SSE) connection to receive proofs for a specific request - [ANY /proxy](https://docs.verity.usher.so/api-reference/endpoint/proxy-get.md): Technically, any HTTP method can be used, but the most common use cases are GET and POST. Forwards a GET request to a target URL and generates proofs - [Proxy](https://docs.verity.usher.so/api-reference/endpoint/proxy-post.md): Forwards any HTTP request to a target URL and generates TLS proofs - [Introduction](https://docs.verity.usher.so/api-reference/introduction.md) - [Rust](https://docs.verity.usher.so/build/clients/rust.md): A Rust client SDK for interacting with Verity Prover - [Usher Labs' Managed Verity Services](https://docs.verity.usher.so/build/managed-services.md): This topic covers operating the Verity Network Nodes via the CLI, and additional tools for verifying TLS proofs. - [Network Nodes & CLI](https://docs.verity.usher.so/build/network.md): This topic covers operating the Verity Network Nodes via the CLI, and additional tools for verifying TLS proofs. - [Oracle Integrations](https://docs.verity.usher.so/build/oracles.md): Discover how Verity alleviates developer overhead when integrating with real-world data. - [Getting Started](https://docs.verity.usher.so/build/start.md): Let's dive into development with Verity - [Thread Pool Management](https://docs.verity.usher.so/build/thread-pools.md): Verity's Prover includes a mechanism to optimise proving times. - [Environment](https://docs.verity.usher.so/build/vdp/environment.md): Understanding which Verifiable Data Processing Environment (VDPE) is right for you depends on your use case. - [Framework](https://docs.verity.usher.so/build/vdp/framework.md): Now that we've generated TLS proofs, we can process the data with the Verity Data Processor (VDP) Framework. - [IC-ADC Implementation](https://docs.verity.usher.so/build/vdp/implementations/ic-adc.md): This documentation provides an overview of how the Verity DP framework is integrated within the `processor` and `orchestrator` folders of the project. It highlights the usage of Verity modules and the inter-canister communication with the Verity Verifier. - [zkTLS Implementation](https://docs.verity.usher.so/build/vdp/implementations/zktls.md): This document provides an overview of the Verity DP modules utilised in the zkTLS implementation, explaining where and why they are used. - [Verifier](https://docs.verity.usher.so/build/verifier.md): The Verifier is a specialised Internet Computer (IC) Smart Contract (Canister) designed to verify TLS session proofs and full TLS proofs. It provides both asynchronous and direct verification methods, with the latter including tECDSA signatures for cross-chain or off-chain verification. - [Glossary](https://docs.verity.usher.so/glossary.md): A full glossary of terms used in Verity documentation - [Why Verity?](https://docs.verity.usher.so/purpose.md): Bringing sensitive or gated data on-chain demands robust security guarantees. - [Architecture](https://docs.verity.usher.so/tech/architecture.md): Verity is a network of nodes, that collectively collobrate over a protocol to verify data authenticity, integrity, and transformation. - [Cryptography](https://docs.verity.usher.so/tech/cryptography.md): Verity employs a variety of cryptographic primitives to deliver on the core value proposition - verifiable data pipelines. - [Verifiable Data Processing Environment (VDPE)](https://docs.verity.usher.so/tech/data-processing.md): Data processing is an imperative for any data pipeline. Verity ensures the entire pipeline and lineage can be verified to authenticate data on destination chains. - [Example TLS Proofs](https://docs.verity.usher.so/tech/example-tls-proofs.md): This page aims to provide examples of TLS proofs generated by Verity to help developers understand the format and structure of the proofs. - [Implementations](https://docs.verity.usher.so/tech/implementations.md): Verity offers the framework and platform for creating pipelines, and guides developers to implement using standards. However, developers retain full control over their own implementation. - [Introduction](https://docs.verity.usher.so/tech/introduction.md): Dive into the technical details of Verity - [Proof of Data Flow](https://docs.verity.usher.so/tech/proof-of-data-flow.md): To grasp the scope of Verity, it's important to understand each of stage of a provable data flow. - [Protocol](https://docs.verity.usher.so/tech/protocol.md): Verity's protocol is a sequence of specific steps between the network of nodes, resulting in proof of data flows. - [Use Cases](https://docs.verity.usher.so/use-cases.md): Verity powers innovative applications through partnerships with leading networks and platforms. - [Welcome](https://docs.verity.usher.so/welcome.md): The home for developers and cryptographic experts exploring secure data integration with blockchains. ## OpenAPI Specs - [openapi](https://docs.verity.usher.so/api-reference/openapi.yaml) ## Optional - [Back to Website](https://www.usher.so) - [Community](https://go.usher.so/discord) - [Research & Blog](https://www.usher.so/blog)