Services

What Adworth Provides

Cryptographic consent infrastructure for digital advertising · Last updated: May 12, 2026

What Adworth is: the cryptographic settlement layer for digital advertising consent. Where Stripe processes financial transactions, Adworth processes consent transactions. Every time an advertiser pays to reach a user, Adworth verifies a cryptographically signed consent token (“The Seal”) before the ad serves. No seal, no serve. Adworth earns a flat 2% fee on every verified consent transaction — the same rate on every transaction, always visible on the ledger, no other revenue streams. This page describes the services we provide, who they’re for, and how they work technically.

Services

02 Ad Intelligence Pipeline

Real-time analysis of how a domain is targeted in digital advertising, with cryptographic anonymization of any personal names that appear in returned data. Powered by adworth-ads (v5.4.0).

For Enterprises & Investors

The Ad Intelligence Dashboard at adworth.app/dashboard demonstrates the consent-enforcement opportunity. Enter any domain — see what advertisers are targeting users associated with that domain, what data inferences are being made, and which regulations (GDPR, CCPA, DSA) those practices trigger. This is the “before Adworth” view. Without consent infrastructure, this is what every advertised user is exposed to. The dashboard is a live working product, not a mockup — useful for enterprise privacy teams evaluating their exposure and for journalists documenting ad transparency.

For Developers

Pipeline architecture:

  • Data source: DataForSEO SERP API (POST /v3/serp/google/organic/live/advanced). Called exclusively from adworth-ads Cloudflare Worker; no direct browser-to-DataForSEO requests. Cost: $0.002 per request. Results cached in ADWORTH_ADS_CACHE KV namespace for 6 hours under ads:{domain} keys.
  • PII Advertiser Name Classifier (v5.4.0): two-pass detection pipeline. Pass 1 is a regex pre-filter for Title-Case name bigrams, filtered against a denylist of brand names, place names, and common phrases. Pass 2 sends remaining candidates to Anthropic Claude Haiku as a named-entity-recognition classifier. Detected names are replaced in-place with the [PERSON] token before any downstream use. A non-reversible HMAC-SHA256 audit hash (salted with a server-side secret) is written to ADWORTH_ADS_CACHE under the audit:pii: key prefix with a 90-day TTL. Privacy-fail-safe: if NER is unavailable, all regex candidates are anonymized.
  • AI privacy analysis: Anthropic Claude Haiku generates risk scores, regulatory flags, findings, and an Adworth-value summary. Operates only on already-anonymized data — person names have been replaced before this call is made.
  • Public endpoint: POST /analyze on adworth-ads.adworthllc.workers.dev. Rate-limited to 10 requests per IP per hour via Cloudflare KV. Strict CORS origin allowlist. Constant-time HMAC-SHA256 API key authentication for authenticated callers.

Full technical disclosure is in Terms of Service Section 2 and Privacy Policy Section 3.

Availability: Live and publicly accessible. No account required for the rate-limited public endpoint. Authenticated access (which bypasses rate limits) is provisioned per enterprise contract.

03 Privacy Cockpit Browser Extension

End-user-facing consent issuance. A Chrome extension (Manifest V3) that lets users cryptographically sign their consent grants on-device and submit them to Adworth's Ingestion API. Currently distributed as a developer build pending Chrome Web Store submission.

For Enterprises & Investors

This is the user-side proof. A consent token isn't issued by a platform on behalf of a user; it's issued by the user, signed with a private key that never leaves their device. The advertiser receives only a verifiable signature, not the user's identity. Consent becomes user-sovereign, cryptographically enforceable, and revocable in real time. The Cockpit is the canonical implementation of how a user grants the Seal that Section 1 describes.

For Developers

Architecture:

  • On-device key generation: Ed25519 keypair (FIPS 186-5 approved) generated in the extension's background service worker via the browser's Web Crypto API (crypto.subtle). Private key stored exclusively in chrome.storage.local as a non-extractable CryptoKey object — never transmitted, never exported.
  • Public key registration: Public key uploaded to adworth-ingestion-api and stored in the ADWORTH_PUBLIC_KEYS KV namespace under user:{user_id}:pubkey:{device}. One keypair per device; multi-device by design. Revocation invalidates the device's signing ability but preserves previously verified records.
  • Data extraction: A MutationObserver detects ad-platform dashboard updates (Google Ads, Meta Ads) in the user's active browser tab. The extension extracts campaign-level metrics, strips all PII client-side, and signs the sanitized data with the device's private key before transmission. Adworth never receives raw dashboard content.
  • Ledger write: As of Ingestion API v1.3.0, upon successful Ed25519 signature verification, a CONSENT_ISSUED event is written to ADWORTH_LEDGER. This event becomes immediately evaluable by the Privacy Governance Engine during subsequent advertiser access requests.

Live Verification Flow

For investors, partners, journalists, and developers who want to verify the cryptographic chain end-to-end, Adworth provides a working demo at adworth.app/demo.html — a simulated advertising-platform dashboard built specifically as a Privacy Cockpit extraction target. The page is intentionally excluded from the sitemap and carries a noindex meta tag; it is reachable by direct URL but not surfaced in search.

The five-step demo flow:

  1. Navigate to adworth.app/demo.html in Chrome with the Privacy Cockpit extension installed
  2. Open the extension popup and click Sync Dashboard Data
  3. The extension extracts the campaign metrics on the page, strips any PII client-side, and signs the sanitized payload with the device’s Ed25519 private key
  4. The signed payload is submitted to adworth-ingestion-api, which verifies the signature using the device’s registered public key and writes a CONSENT_ISSUED event to ADWORTH_LEDGER
  5. Verify the token landed in the ledger at adworth.app/ledger.html, and optionally evaluate it through the Privacy Governance Engine via the Advertiser Sandbox at adworth.app/advertiser-sandbox.html

Source dashboard data on demo.html is simulated. The cryptographic chain, the Worker fleet, the signature verification, and the ledger write are live. This is the canonical proof-of-flow for any party seeking to verify Adworth’s claims independently — no account required.

Current status: The Privacy Cockpit extension and Ingestion API (v1.3.0) are confirmed working end-to-end on Cloudflare. Ed25519 signature verification, ingestion data storage, and CONSENT_ISSUED ledger write are all live. The extension is currently distributed as a developer build and has not been published to the Chrome Web Store.
For users: the Privacy Cockpit is and will remain free. The 2% fee is paid by advertisers, not users.

04 Removal Payload Engine

When consent is revoked or expires and a third party still retains the underlying data, the Removal Payload Engine (adworth-rpe v2.3.0) generates legally-cited, cryptographically signed deletion requests with deterministic legal grounding.

For Enterprises & Investors

This service closes the enforcement loop. Revocation isn't a UI state — it's an action that, when persistence is detected, produces a legally formatted deletion request with full regulatory citation, a tamper-evident HMAC signature, and a public verification endpoint. The notice is generated against a versioned regulation rules table (adworth-rules v1.0.0, effective March 5, 2026), so the legal basis of every notice is reproducible, auditable, and version-locked at the moment of generation.

For Developers

RPE architecture:

  • Runtime rule evaluation: adworth-rpe fetches legal citations, deadlines, and obligations at runtime from adworth-rules via a Cloudflare Service Binding (RULES_WORKER) — direct worker-to-worker communication, bypasses the public network. Currently supports GDPR-ART17, GDPR-ART7, CCPA-1798105, CCPA-1798120, DSA-ART26, and DSA-ART25. Planned extensions: LGPD, UK GDPR, Virginia VCDPA, Colorado CPA, Connecticut CTDPA.
  • Notice contents: Notice ID, target domain, right ID, regulation, rules_version, rules_effective_date, opaque data subject reference, data categories, legal citation text, compliance deadline, HMAC-SHA256 signature of the notice content, SHA-256 content hash for tamper detection. Stored in RPE_DATA KV namespace.
  • Public verification: Unauthenticated endpoints for third-party verification of any RPE-generated notice. Verification returns status, target, regulation, rules_version, jurisdiction, deadline, generation timestamp, content hash, HMAC signature, and integrity result. No PII disclosed.
Current status: RPE generates real legal citations and HMAC-SHA256 signatures, but notices are not yet transmitted to actual data brokers. No deletion requests have been sent to any third party. This service operates in simulated mode for demonstration purposes; Terms of Service will be updated before live broker delivery begins.

05 Compliance & Reporting Services

Adjacent services that operationalize the cryptographic consent infrastructure for the regulatory regimes that govern it: GDPR, CCPA/CPRA, DSA, COPPA, and applicable U.S. state laws.

For Enterprises & Investors

These services exist because regulatory compliance is a buyer requirement, not a marketing claim. Each one maps to a specific obligation in a specific regulation and is built to produce evidence on demand — the kind of evidence an enterprise privacy team can hand to outside counsel during a regulatory inquiry without further preparation.

For Developers

Components in this service area:

  • Data Subject Request processor (adworth-dsr): GDPR Art. 17 and CCPA § 1798.105 handler. Cross-namespace deletion authority across the consent infrastructure. Records DSR events in ADWORTH_DSR_LOG with verification token TTL of 3600 seconds.
  • Audit trail export (adworth-audit-export): Read-only export bundling audit data across ADWORTH_LEDGER, ADWORTH_DSR_LOG, and ADWORTH_CHANGELOG. Fulfills GDPR Art. 15 access requests. User-facing exports exclude synthetic chaff entries. No PII in exports.
  • Consent receipt delivery (adworth-consent-receipt): Generates and delivers cryptographically signed consent receipts to users upon token issuance. Receipts written to ADWORTH_RECEIPTS.
  • Age gate (adworth-age-gate): COPPA-relevant age certification enforcement at the platform front door, gating Minor Shield eligibility downstream.
  • Breach notification (adworth-breach): Logs security events in ADWORTH_BREACH_LOG. Triggers the South Carolina § 39-1-90 notification workflow when threshold conditions are met.
  • CCPA Enforcement Gap (adworth-ccpa-gap): Public reference data on enforcement disparities, sourced from reports companies are required to publish under California Civil Code § 1798.185(a)(7). Available at adworth.app/ccpa-gap.
  • Retention enforcement (adworth-retention): Daily cron at 03:00 UTC. Purges expired tokens, stale KV entries beyond retention windows, and stale monitor state.

06 Developer Platform & API

The runtime, authentication model, and operational guarantees that all the services above run on.

For Enterprises & Investors

Adworth runs entirely on Cloudflare Workers at the network edge — 29 Workers across 41 KV namespaces, no traditional servers, no databases, no separate ops layer. This architecture matters for two reasons: latency (every consent check resolves at the edge, in single-digit milliseconds globally) and cost (a single $5/month Cloudflare Workers Paid plan handles current load with significant headroom). The 29-Worker fleet is deployed exclusively via the Cloudflare Dashboard, never via the Wrangler CLI; every deploy is logged to adworth-deploy-integrity with a tamper-evident record.

For Developers

Authentication

All protected endpoints across the 29-Worker fleet require an X-API-Key header or Bearer token in the HTTP Authorization header. All API key comparisons use constant-time HMAC-SHA256 verification via crypto.subtle to prevent timing-based side-channel attacks. API keys are stored as encrypted Cloudflare environment secrets, never in source code or version control.

Rate limits

Rate-limit policy varies by endpoint surface. Public endpoints (e.g. adworth-ads /analyze: 10 requests per IP per hour) are KV-counter-based. Authenticated endpoints have higher limits per partner contract. Brute-force protection on authentication endpoints is centralized in adworth-auth-guard.

CORS

Strict origin allowlist on every Worker. No wildcard origins, no localhost or 127.0.0.1 origins in production. Unknown origins return null Access-Control headers (no fallback origin disclosure).

Error contract

JSON error responses across the fleet: {success: false, error: "..."} with appropriate HTTP status codes. Unauthenticated requests receive 401 Unauthorized with no data disclosure. Rate-limited requests receive 429. Internal errors return 500 with a generic message; internal details are logged but never leaked in the response body.

Fleet structure

The 29-Worker fleet falls into five architectural patterns: data-handling Workers (own data namespace + _RL partner + ADWORTH_CHANGELOG), stateless verification Workers (_RL namespace only + ADWORTH_CHANGELOG), single-namespace Workers, cross-system reader Workers, and pure stateless Workers (e.g. adworth-well-known with zero KV bindings). One Worker uses a Service Binding (adworth-rpeadworth-rules). One Worker has a cron trigger (adworth-healthcheck running daily at 06:00 UTC).

Complete Worker-by-Worker disclosure including KV bindings is in Privacy Policy Section 3.

07 Service Tiers & Pricing

Revenue model

Adworth earns a flat 2% fee on every verified consent transaction. Same rate on every transaction, regardless of volume, advertiser size, or industry vertical. The fee is paid by advertisers, not by users. Every fee is recorded on the Invisibility Ledger and is part of the user-facing audit trail.

This is the only revenue stream. Adworth does not sell user data, does not collect referral commissions, does not run advertising of its own, and does not sell access to anonymized or aggregated user behavior. The 2% transaction fee is the entire business.

Public tier

The Ad Intelligence Dashboard (adworth.app/dashboard), the CCPA Enforcement Gap page, the Invisibility Ledger viewer (real entries only), and RPE public verification endpoints are accessible without an account, subject to IP rate limits.

Waitlist / Founding Member tier

Users who join the Adworth waitlist prior to the public marketplace launch may be designated as Founding Members. Founding Member status confers priority onboarding access when the consent marketplace launches. It is not an equity instrument and does not constitute a binding commitment of any payment or service level. See Terms of Service Section 7 for the Founding Member terms.

Enterprise tier

Enterprise contracts cover authenticated API access (bypasses public rate limits), Data Processing Agreements under GDPR Art. 28, Business Associate Agreements where applicable, custom regulation rule additions to adworth-rules, and direct integration support. Pricing is indicative until the consent marketplace launches and is set per contract. Contact with subject line “Enterprise Inquiry.”

Pricing transparency: Any pricing figures referenced on adworth.app are indicative projections only and do not constitute binding price commitments. They will become contractually binding only upon execution of an enterprise agreement or public marketplace launch.

08 Service Status & Roadmap

Currently live

On the roadmap

Roadmap items are development intentions, not guaranteed deliverables. Terms of Service Section 13 describes the limits of forward-looking statements.

09 Service Level & Operational Guarantees

Adworth is an early-stage platform. We do not currently offer a contractual uptime SLA. The operational guarantees we do make:

Enterprise contracts may include negotiated SLA terms; contact with subject line “Enterprise Inquiry” for current SLA availability.

10 Contact & Service Inquiries

Adworth℠ LLC
Charleston, SC, United States

Common inquiry routing

For the legal framework governing all the services described on this page, see our Terms of Service. For how data is handled across these services, see our Privacy Policy.