
Start small. Pay only when you need more proofs, more evidence exports, and automated workflows. Verification stays simple: proof record → link/QR → match or mismatch.
Start free Verify a file Contact
Note: Limits apply to the current billing period. Need custom limits or API volume? Contact us.
One cryptographic fingerprint (hash) + timestamp anchored in the registry, with a shareable verification page (link/QR).
Verification stays available, but public details (for example: timestamp display and owner pointer) are shown only during the retention window. After that, the verification experience switches to Stealth.
In Stealth mode, the public page confirms that a record exists and supports match/mismatch verification, but it hides public pointer details. This keeps verification usable while reducing public exposure after the retention window or plan expiry.
C2PA export means generating Content Credentials output tied to a proof record (for provenance and publishing workflows).
Not on blockchain: we operate in hash/metadata-only mode by default, and store only the minimal proof data needed for verification. Temporary processing artifacts may be stored on our web infrastructure to generate outputs (e.g., previews, evidence PDFs, C2PA exports), and are removed based on our retention policies after a limited time. If you need long-term artifact storage, extended retention, or compliance-grade handling, please use the Enterprise tier and contact us.
Your account moves to the default retention policy immediately. Your proof records are not “broken”, but the public verification experience switches to Stealth, and evidence/C2PA exports are no longer available unless you are on an active plan.
Similarity is currently offered as a beta workflow and may include techniques such as perceptual hashing (pHash), histogram comparison, ORB/SIFT-based matching, and clustering-based grouping. If you need this for duplicates or forgery checks, contact us and we’ll point you to the recommended method and usage pattern.