@SignOfficial $SIGN #SignDigitalSovereignInfra
I keep seeing the same dumb thing on Sign.
Old record. Current mess.
The attestation is still fine. Better than fine, actually. Signed, anchored, still sitting on SignScan nice and clean like nobody spent the last month quietly backing away from what it meant.
Because on Sign the object stays put. Issuer there. Schema there. Signature there. Evidence pointer still there. A relying check later can pull it, resolve it, and keep moving because the attestation is still valid for the question the schema was built to answer. Payment. Access. Eligibility. Whatever boring workflow was supposed to stay boring.
Still resolves. Still gets used.
Meanwhile the institution already moved.
New team. New policy. Different risk mood. Same org on paper maybe, sure. Not the same appetite for owning that old claim once it hits current review posture and somebody has to clear it under today’s policy instead of last month’s. And nobody ever says that cleanly. They just stop trusting it out loud in little pieces.
So review wants fresh confirmation. Ops points at the record. Partner says they were told not to rely on that issuer anymore. Somebody adds a note offchain. Then another. Then a side approval because apparently the permanent record was not enough for the present-tense workflow after all.
Temporary. Sure. That’s what they call it while the override path settles in.
Now the old attestation is still live on Sign while the real trust has already crawled somewhere else.
Not broken cryptography.
Not bad evidence.
Just history that never learned when to sit down.
And the side process is already doing the real job. The verified path is still in the room, mostly for appearances.