Demo 02PG[Σ] Transfer Simulator
Submit a transfer attempt. Watch the four predicates evaluate. See the deterministic accept-or-reject and the verifiable trace.
In production, this trace is signed under the PG[Σ] threshold scheme with the policy hash bound into Fiat–Shamir. See Cryptographic Spec §4.2.