Runtime verifies, Factory and Packager sign.
NOXA trust posture is built on explicit role separation, signed artifacts, and offline runtime verification. This is the production target model documented across repositories.
Runtime is verify-only: no private signing key, no license generation, no bundle signing.
Noxa-License-Factory issues signed license artifacts (license.json + license.sig).
Noxa-Packager generates signed product-manifest and bundle-manifest artifacts.
Noxa-Website is a communication mirror and not a parallel product source of truth.
Support eligibility is conditioned by official signed artifacts and coherence checks.
Simplified product trust chain
license.json and license.sig are generated outside runtime.
Bundle archive plus product/bundle manifests are signed with product keys; checksums are emitted for integrity verification.
NOXA verifies signatures and coherence offline before enforcement.
Eligibility stays true only when official artifacts are valid and runtime conformity checks pass.