{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/e14f5fdc79bf4e36a706fbbe68ab9958\" frameborder=\"0\" width=\"1660\" height=\"1245\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1245,"width":1660,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1245,"thumbnail_width":1660,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/e14f5fdc79bf4e36a706fbbe68ab9958-1a04dda31e77e71e.gif","duration":458.283,"title":"Counsel — Decision Integrity Layer for Institutional AI Agents ","description":"I built Council at AZA Consensus 2026 to close three gaps in AI institutional decisions, pay for compliance data at query time, prove a tamper evident evidence trail, and cryptographically bind the human approver to the approved data. Council Plane pays about five cents in USDC via X402, Counsel pays, compliance providers run in parallel, and I use a Merkle route anchored on both Base mainnet and Solana mainnet every call. An officer signs EIP 712 or Phantom ED25519 data, and forging requires breaking SHA 256 and key control, plus avoiding auth mismatch. Status 200 returns base anchor and solana anchor, rogue customer triggers 401 before payment, rogue officer triggers 403. No action was explicitly requested from viewers."}