T3RRA
Demo 02

PG[Σ] Transfer Simulator

Submit a transfer attempt. Watch the four predicates evaluate. See the deterministic accept-or-reject and the verifiable trace.

In production, this trace is signed under the PG[Σ] threshold scheme with the policy hash bound into Fiat–Shamir. See Cryptographic Spec §4.2.