Skip to main content

From PDF to Proof: Replacing Compliance Documents with On-Chain Attestations

· 4 min read
Frederico Santana
Founder & Technical Writer, DPO2U

Every compliance audit I've seen ends the same way: a consultant produces a 47-page PDF, emails it to someone who saves it in a shared drive, and both parties agree to pretend this constitutes "verification." The PDF is not tamper-proof. The shared drive is not immutable. The agreement is not enforceable. DPO2U replaces this entire ritual with a five-step cryptographic pipeline.

The compliance theater problem

Traditional compliance operates on trust: "trust that I reviewed the documents," "trust that the policy is current," "trust that the DPO actually exists." Each layer of trust is a point of failure. The PDF can be edited after issuance. The review date can be falsified. The DPO email can bounce. Nobody checks because checking is expensive and manual.

The cost isn't just financial — it's structural. When compliance depends on human verification of static documents, the system degrades proportionally to the number of participants. More companies, more documents, more consultants, more PDFs, more shared drives, more trust assumptions, more failure points.

The protocol lifecycle

DPO2U replaces trust-based verification with proof-based verification. The entire flow — from initial request to on-chain attestation — runs through five layers:

Step 1: Schema generation

A client AI — any MCP-compatible language model — calls generate_lgpd_kit with a company profile. The Expert Agent creates two outputs: human-readable reports (privacy notice, DPIA) and a machine-readable policy.json conforming to the dpo2u/lgpd/v1 schema.

The schema maps directly to LGPD's 11 principles. Four fields are mandatory: retention_days (Art. 15), consent_mechanism (Art. 7), dpo_contact (Art. 41), and last_review (Art. 6-V). Missing any of them blocks the pipeline before scoring begins.

Step 2: Immutability via IPFS

The reports and schema are uploaded to IPFS via the Lighthouse SDK. Each artifact receives a CID — a content-addressed hash that serves as a permanent, tamper-proof reference. The CID is then injected back into the schema's documents[].cid fields.

At this point, the documents are immutable. Modifying a single byte would change the CID, invalidating any downstream reference. This is "data integrity" not as a policy, but as a mathematical property.

Step 3: Zero-trust edge analysis

The Auditor Agent retrieves the schema and CIDs, validates all mandatory fields, and scores compliance on a 0-100 scale. The validation runs in a sandbox — the Auditor has no network access beyond IPFS retrieval and the Midnight RPC endpoint.

Validation ruleCheckFailure behavior
Schema versionMust be dpo2u/lgpd/v1Rejected
Mandatory fieldsAll 4 present and non-nullRejected
Retention period> 0 and ≤ 3650 daysWarning
DPO contactValid email formatRejected
Last reviewWithin 365 daysWarning

Step 4: On-chain settlement

The Auditor's score and the CID are wrapped in a zk-SNARK proof by the local Proof Server (midnightntwrk/proof-server:7.0.0). The proof attests that the validation was performed correctly without revealing the underlying data. The proof is submitted to ComplianceRegistry.compact on the Midnight blockchain.

Step 5: Verification

Any party can now call check_compliance_status(company_id) via the MCP Server and receive:

{
"compliant": true,
"score": 92,
"last_validated": "2026-03-13T14:30:00Z",
"proof_url": "midnight://attestation/0x7a3f..."
}

No PDF. No shared drive. No trust required. The proof is on-chain, the documents are on IPFS, and the verification is a single API call.

What changes for the company

The shift is not incremental — it's categorical:

DimensionPDF modelProof model
EvidenceEditable documentsImmutable CIDs on IPFS
VerificationManual audit (weeks)Programmatic check (milliseconds)
PrivacyPII crosses boundariesZero-knowledge — nothing sensitive leaves the edge
FrequencyAnnual or ad-hocContinuous — every schema change triggers re-evaluation
Trust"The auditor said so""The math proves it"

The deeper point

The regulation-ready-midnight post explored the theoretical compatibility between GDPR/LGPD and Midnight's architecture. This post shows the mechanics. The theory says "privacy-preserving compliance is possible." The pipeline proves it by executing it — from MCP request to on-chain attestation, with no human in the verification loop and no sensitive data ever leaving the local realm.

Compliance isn't a document. It's a property — something a system either has or doesn't, verified continuously, proven cryptographically, and recorded immutably.

For the schema specification, see LGPD Kit Schema. For the MCP tools that power verification, see MCP Server.