The attestation endpoint returns cryptographic attestation data for every provider currently connected to the network. No authentication is required — this data is intentionally public so that any third party can independently verify the hardware and security posture of the providers that are serving inference requests. For hardware-attested providers, the response includes the full Apple Managed Device Attestation (MDA) certificate chain. You can verify this chain against Apple’s Enterprise Attestation Root CA to confirm that Apple has certified the device properties independently of Darkbloom.Documentation Index
Fetch the complete documentation index at: https://docs.darkbloom.dev/llms.txt
Use this file to discover all available pages before exploring further.
Authentication
Not required. This endpoint is public.Response
Array of attestation records, one per connected provider.
URL to Apple’s Certificate Authority page where you can download the Enterprise Attestation Root CA.
Name of the CA to verify against:
"Apple Enterprise Attestation Root CA".Human-readable instructions for verifying the MDA certificate chain.
Independent verification
To verify a hardware-attested provider using the MDA certificate chain:- Fetch the attestation data from
GET /v1/providers/attestation. - For each provider with
mda_verified: true, take themda_cert_chain_b64array. - Decode each element from base64 to its raw DER bytes.
- Download the Apple Enterprise Attestation Root CA from apple.com/certificateauthority.
- Verify the DER chain against the root CA using any standard X.509 library.
Example
cURL