Each holds a sender_secret in HSM-equivalent storage. Pick one for the next compose.
Per-counterparty key derived: HMAC(sender_secret, recipient || content_hash || nonce). Signature attached as channel header.
Pick the attack scenario. Each demonstrates a different verification-failure mode the recipient client catches.
The signing key is unique per (sender, recipient, content) tuple. A leaked key for one message-recipient pair does not compromise other messages or recipients. The recipient's verification client independently re-derives the same key from registry-published sender material plus the received recipient-id, content-hash, and nonce — confirming both origin and content integrity.
Three verifiers from three independent operating organisations evaluate every authentication. Adversarial inputs optimised against any one verifier's training distribution still fail at the other two — the cooperative requirement is the protection. For the channel-provenance protocol, the verifiers cross-check signature validity, registry status of the claimed sender, and content-hash consistency.
The "Authenticated by ARIA — [sender name]" badge is rendered by the verification client in trusted browser/OS chrome, not in the message content area. An adversary who copies a visual badge into the message body cannot spoof the badge that appears outside the message body — recipients learn to trust the chrome-rendered badge and to ignore body-rendered images claiming the same.
This is the same protection model as TLS lock icons, OS-level OAuth consent screens, and platform-level biometric prompts. The trust UI lives in a place the page cannot draw to.
Email (signature in custom header) · web (HTTP response header or meta element) · SMS / RCS (appended payload or out-of-band reference) · voice (audio-band watermark or parallel signaling) · video (frame watermark or parallel channel) · IoT telemetry (payload field) · push notifications (metadata field). The protocol is channel-agnostic. Cross-cutting modifiers — Sequence-as-Key for streaming, Binôme for high-stakes verification — apply without modification.