The fairness engine is the company story.

Flux is positioned around poker-specific verification: sealed deck windows, signed releases, folded-card privacy, and proof artifacts that help users audit a completed hand without exposing private strategy.

Proof EngineShuffle sealed
CommitDeck sealed
ReleaseStreet scoped
PrivacyFolded cards protected
Verifier checksLive
19 + 5

The app explains 19 standard checks plus five redacted-mode privacy checks for private hands.

Entropy sourceLive
Polygon block

The fairness flow mixes in an external Polygon block hash so one party cannot preselect the final deck alone.

Proof systemLive
Noir UltraHonk

Hidden-card consistency references Noir and Barretenberg UltraHonk proof artifacts.

Identity bundleDiligence
serviceIdentity

Completed payloads expose signer metadata and attestation references for diligence review.

Trust is a product experience.

Flux should make fairness visible, beautiful, and understandable without turning private cards into public data.

For investors, fairness is the wedge and the moat. It gives the product a reason to exist beyond prettier poker software.

For players, the same system becomes a trust experience: not a whitepaper, but a completed hand they can inspect.

The marketing site should keep translating the system from table motion to proof architecture and back to user confidence.

The trust flow is specific to poker.

Shuffle

A deterministic, auditable shuffle is derived from protocol-bound inputs and committed before betting-relevant action.

Sign

Release artifacts are signed so completed-hand evidence has a verifiable chain of custody.

Privacy

Folded-card privacy avoids leaking mucked strategy while still supporting hand verification.

Prove and verify

Proof packages and self-verify flows let the right audience check the right information.

A hand becomes evidence

The fairness story moves from live secrecy into completed-hand transparency without exposing folded strategy.

CommitEntropyReleaseVerify
05Fairness diligence questions
01Protocol sequence
02Threat model
03Folded-card redaction
04Attestation posture
05Verification UX