v0.9.23

Comparison

How PEAC Protocol relates to other standards for AI content access, attribution, and provenance.

Key Insight

PEAC is complementary to existing standards, not a replacement. Use robots.txt for crawl control, RSL for AI usage tokens, C2PA for provenance - and PEAC for verifiable proof that policies were honored with cryptographic receipts.

FeaturePEACrobots.txtRSL 1.0C2PA
PurposeVerifiable receipts for policy, payment, attributionCrawl instructions for search enginesAI usage tokens and permissionsContent provenance and authenticity
Cryptographic VerificationYes (Ed25519 JWS)NoNoYes (X.509 certificates)
Payment IntegrationYes (HTTP 402, x402, Stripe, Razorpay)NoNoNo
Machine-Readable PolicyYes (/.well-known/peac-policy.yaml)Limited (allow/disallow)Yes (robots.txt extended syntax)Embedded in content
Audit TrailYes (receipt chains, telemetry)NoNoYes (manifest history)
Agent SupportYes (MCP, ACP, TAP)Limited (User-Agent matching)Yes (AI bot targeting)No (human-focused)
Real-time EnforcementYes (HTTP 402 flow)No (advisory only)No (advisory only)No (verification after the fact)
Offline VerificationYesN/AN/AYes
Attribution TrackingYes (in receipt claims)NoLimitedYes (creator metadata)
StandardizationOpen specification (v0.9.x)De facto standard (RFC 9309)RSL 1.0 (emerging)Industry coalition

Agent Protocol Integration

PEAC provides mappings for major agent and commerce protocols:

MCP@peac/mappings-mcp

Model Context Protocol

Budget utilities with bigint minor units

ACP@peac/mappings-acp

Agentic Commerce Protocol

Agent-to-agent transaction support

TAP@peac/mappings-tap

Trusted Agent Protocol

Visa RFC 9421 signature verification

RSL@peac/mappings-rsl

Robots Specification Language

Extended ControlPurpose tokens

When to Use What

Use robots.txt for

  • -Basic crawl control for search engines
  • -Path-based allow/disallow rules
  • -Crawl-delay directives

Use RSL for

  • -AI training opt-in/opt-out signals
  • -AI usage tokens (ai-all, ai-train, ai-input)
  • -Extended robots.txt semantics

Use C2PA for

  • -Image/video authenticity verification
  • -Creator attribution in media files
  • -Edit history and provenance chains

Use PEAC for

  • +Cryptographic proof of policy compliance
  • +Payment flows with verifiable receipts
  • +Agent-to-agent commerce and coordination
  • +Audit trails for regulatory compliance

Using Them Together

Combined policy stack
# robots.txt - crawl control
User-agent: *
Allow: /

# RSL tokens - AI usage permissions
User-agent: ai-all
Disallow: /private/

# PEAC policy - verifiable terms
# /.well-known/peac-policy.yaml
version: "peac-policy/0.1"
rules:
  - id: allow-licensed
    match:
      purpose: [train, inference]
      licensing_mode: licensed
    decision: allow
    receipts: required

# Result: Crawlers obey robots.txt, respect RSL tokens,
# and PEAC provides cryptographic proof of compliance

Payment Rail Comparison

PEAC works with multiple payment rails, each suited for different use cases:

RailBest ForSettlementPackage
x402Micropayments, crypto, agent-to-agentInstant (on-chain)@peac/rails-x402
StripeSaaS, subscriptions, cards globallyT+2 days@peac/rails-stripe
RazorpayUPI, India market, netbankingInstant (UPI)@peac/rails-razorpay
CardGeneric card billing, any processorT+2 days@peac/rails-card

Get Started with PEAC

Add verifiable receipts to your existing policy stack.