Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.darkbloom.dev/llms.txt

Use this file to discover all available pages before exploring further.

The attestation endpoint returns cryptographic attestation data for every provider currently connected to the network. No authentication is required — this data is intentionally public so that any third party can independently verify the hardware and security posture of the providers that are serving inference requests. For hardware-attested providers, the response includes the full Apple Managed Device Attestation (MDA) certificate chain. You can verify this chain against Apple’s Enterprise Attestation Root CA to confirm that Apple has certified the device properties independently of Darkbloom.

Authentication

Not required. This endpoint is public.

Response

providers
object[]
Array of attestation records, one per connected provider.
apple_root_ca_url
string
URL to Apple’s Certificate Authority page where you can download the Enterprise Attestation Root CA.
apple_enterprise_root_ca
string
Name of the CA to verify against: "Apple Enterprise Attestation Root CA".
verification_instructions
string
Human-readable instructions for verifying the MDA certificate chain.

Independent verification

To verify a hardware-attested provider using the MDA certificate chain:
  1. Fetch the attestation data from GET /v1/providers/attestation.
  2. For each provider with mda_verified: true, take the mda_cert_chain_b64 array.
  3. Decode each element from base64 to its raw DER bytes.
  4. Download the Apple Enterprise Attestation Root CA from apple.com/certificateauthority.
  5. Verify the DER chain against the root CA using any standard X.509 library.
If verification passes, Apple has independently confirmed that the device is a genuine Apple device with the attested hardware properties.

Example

cURL
curl https://api.darkbloom.dev/v1/providers/attestation

Example response

{
  "providers": [
    {
      "provider_id": "prov_a1b2c3d4",
      "trust_level": "hardware",
      "status": "online",
      "chip_name": "Apple M3 Max",
      "hardware_model": "Mac14,6",
      "serial_number": "FVFXYZ123456",
      "memory_gb": 128,
      "gpu_cores": 40,
      "models": ["qwen3.5-27b-claude-opus-8bit"],
      "secure_enclave": true,
      "sip_enabled": true,
      "secure_boot_enabled": true,
      "authenticated_root_enabled": true,
      "se_public_key": "BHv9k2...base64...",
      "mdm_verified": true,
      "acme_verified": true,
      "mda_verified": true,
      "mda_cert_chain_b64": [
        "MIIBxTCCAW...base64...",
        "MIICSzCCAd...base64..."
      ],
      "mda_serial": "FVFXYZ123456",
      "mda_udid": "00001234-000A1234B1234567",
      "mda_os_version": "14.5",
      "mda_sepos_version": "20.100.5"
    },
    {
      "provider_id": "prov_e5f6g7h8",
      "trust_level": "self_signed",
      "status": "online",
      "chip_name": "Apple M2",
      "hardware_model": "Mac13,2",
      "serial_number": "C02XY1234567",
      "memory_gb": 32,
      "gpu_cores": 19,
      "models": ["mlx-community/gemma-4-26b-a4b-it-8bit"],
      "secure_enclave": true,
      "sip_enabled": true,
      "secure_boot_enabled": true,
      "authenticated_root_enabled": true,
      "se_public_key": "BKm3p7...base64...",
      "mdm_verified": false,
      "acme_verified": false,
      "mda_verified": false
    }
  ],
  "apple_root_ca_url": "https://www.apple.com/certificateauthority/",
  "apple_enterprise_root_ca": "Apple Enterprise Attestation Root CA",
  "verification_instructions": "Download each provider's mda_cert_chain_b64, decode from base64 to DER, then verify the certificate chain against Apple's Enterprise Attestation Root CA. If verification passes, Apple has confirmed this is a real Apple device with the attested properties."
}