SALT-sealed archives are delivered to the user. The user is the custodian. Sealed Ledger's role ends at delivery — by design.
Sealed Ledger uses a non-custodial delivery model. At the conclusion of a SALT capture, the sealed archive is delivered to the user. The user becomes the sole long-term custodian. Sealed Ledger does not retain copies, does not provide recovery, and does not maintain an archive of past captures.
This is a deliberate design choice. It removes Sealed Ledger from a long list of risks the user does not benefit from us bearing: data breaches against our storage, subpoenas seeking client records we no longer hold, retention obligations across jurisdictions, recovery requests we cannot honor, and service-continuity concerns that would otherwise impact the user's records.
From an audit perspective, the non-custodial model also matches how auditors expect evidence custody to work. When an auditor requests a record, they request it from the audited entity, not from the entity's tooling vendor. The archive lives where the auditor expects to find it.
_integrity_checks._seal table.During an active engagement, Sealed Ledger holds the archive in working storage for the purpose of analysis, plan generation, and review. This temporary working copy is:
After the engagement concludes, Sealed Ledger:
At the moment of delivery, the user takes on the following responsibilities:
The user is responsible for storing the bundle in a manner appropriate to its sensitivity and the user's retention requirements. Recommended practice:
verify.sh scriptThe user determines who has access to the archive. The bundle contains complete accounting records; treat it as you would any source-of-truth financial dataset.
The user determines the retention period. Common considerations:
When the user determines an archive is no longer needed, secure disposal is the user's responsibility. Cryptographic erasure (deleting the encryption key on encrypted storage) is acceptable; physical destruction of the storage medium is acceptable. Casual deletion may leave forensically recoverable copies.
For records that may face evidentiary challenge, the user should maintain a custody log: who received the archive, who has accessed it, when it was moved between systems, and any transformations applied. SALT's seal proves the bundle is unchanged; the custody log proves who handled it.
To be unambiguous about scope:
The list above is a feature, not a limitation. It is what allows Sealed Ledger to make narrow, defensible claims about what the seal proves.
SALT bundles are delivered under a dual-layer encryption model. The model is designed to give the user confidentiality without giving Sealed Ledger any key material.
The standard SALT seal on the unencrypted snapshot.db file. This is the seal documented throughout the rest of the SALT documentation: SHA-256 of the database, signed by an external Time Stamp Authority via RFC 3161, recorded inside the database's _seal table. This layer attests to the integrity of the data itself, and survives any number of encryption/decryption cycles.
After the bundle is encrypted, Sealed Ledger computes the SHA-256 of the encrypted file and obtains a separate TSA timestamp over that hash. This is delivered alongside the encrypted bundle as outer-manifest.json. The outer seal lets a recipient confirm the encrypted blob is the one Sealed Ledger delivered, without needing to decrypt.
Together, the two layers cover both "this is the encrypted file you were given" and "this is the data inside it" — verifiable at different stages of handling.
openssl or age. Both produce standards-based ciphertext that any recipient can decrypt with the passphrase and standard tools.The absence of a recovery mechanism is deliberate. A backdoor would convert Sealed Ledger from a non-custodial vendor into a custodian of every client's accounting records, with significant legal exposure (subpoena response, breach notification, regulatory expansion) and a degraded trust posture. The non-custodial model is preserved by the strict discipline of holding no keys.
Because no recovery is possible:
For engagements where the user prefers to manage encryption themselves (or where the bundle is being delivered into an already-encrypted environment), Sealed Ledger can skip the outer encryption layer. In that case the user receives the bundle with only the inner seal, identical to the SALT bundles documented elsewhere. The choice is recorded in the engagement record.
For engagements where the standard non-custodial model is not appropriate, alternative arrangements can be made on a case-by-case basis:
For litigation holds, M&A escrows, or audit-firm custody requirements, the bundle can be delivered directly to a designated third-party recipient (an attorney, escrow agent, or audit firm). The user authorizes the alternate recipient in writing prior to capture.
Bundles can be delivered to multiple recipients simultaneously (e.g., the company and its outside CPA). Each recipient receives an identical copy; bundles are byte-for-byte identical and verifiable against each other.
If the user requires Sealed Ledger to retain a working copy beyond the standard engagement period, this is contracted explicitly with documented retention term, access controls, and a deletion date. Default retention beyond engagement close is not provided.
Auditors and forensic accountants evaluating an archive will ask a custody question: "Where did this archive come from, who has handled it, and how do I know it hasn't been swapped or modified along the way?"
The non-custodial model gives a clean answer. The bundle was delivered by Sealed Ledger to the user at a specific time. The seal proves the bundle has not been modified since that delivery. The user's custody log (if maintained) describes what happened in between. There is no third party in the middle whose practices need to be evaluated.
From the auditor's perspective: fewer hands on the data, fewer questions to investigate.