Security practices
Token access
Signer links are represented as unique tokens with expired, voided, signed, and declined states.
Audit trail
Events capture actor, provider, IP, user agent, UTC source time, and NPT display time.
PKI context
Certificate verification is simulated; real CA trust, OCSP/CRL, and PAdES signing are future backend work.