Loading...

Who we are?

We build practical tools for proving what a file was and when it existed, without forcing you to share the original content.

What we believe


- A digital handoff should be verifiable by the recipient.
- Any post handoff edit should be detectable.
- Proof should be repeatable: same input → same verification result.


What we deliver


- Proof records: a cryptographic fingerprint (hash) + timestamp anchored in an immutable registry.
- Verification pages / QR: share a link, not the content.
- Evidence exports: logs and reports for audits, reviews, and disputes.

Privacy approach


By default, we can operate in hash-only mode. That is enough to verify integrity later.
If you attach metadata, keep it minimal and non-sensitive.

Contact us