Evidence that
can be checked
AIVERIE does two things for every photo: proves where, when, and how it was captured—and proves nothing changed after capture. Cryptographic hashing, tamper-evident logs, and public verification.
How verification works
Four layers of evidence and integrity checking
File Hashing (SHA-256)
When you upload a file, we compute a SHA-256 hash of the exact bytes. That hash is like a fingerprint—if one bit changes, the hash changes.
sha256: 9f28a4c1e7...
Capture Provenance (EXIF)
If camera EXIF is present, we read the original timestamp, GPS, device, and orientation. If EXIF is missing, our app can record a signed attestation.
Evidence Score
Green/Amber/Red scoring based on provenance strength, integrity checks, and consistency validation.
Signed Envelope + QR
Before finalization, we create a compact evidence envelope, canonicalize it, hash it, and sign it. Anyone can verify via QR scan.
Evidence Score explained
A quick indicator of provenance strength.
Green — Verified
EXIF/attestation present, geofence/time checks passed, no edit signals detected.
Amber — Limited Evidence
Screenshots or images from apps that strip EXIF. Minor inconsistencies.
Red — Failed
Signature mismatch or report has been revoked.
How to get Green
- Upload original camera files (not screenshots)
- Enable location when capturing in-app
- Avoid heavy editing before upload
- Take multiple angles with good lighting
Verify QR - How it works
Each report carries a QR code for instant verification.
Scan QR code
Use any QR reader or camera app
Server checks signature
We re-compute the envelope hash and verify the cryptographic signature
Get instant verdict
Valid / Warning / Invalid with minimal facts shown
No account required
Public verification. Anyone can check authenticity.
Scan to verify authenticity
Cryptographic foundation
Built on proven cryptographic primitives
SHA-256 Hashing
File integrity verification. Industry-standard cryptographic hash function.
Digital Signatures
Ed25519 / P-256 signing. Envelope integrity and authenticity verification.
Hash Chaining
Append-only audit log with previous/next hash links. Tamper-evident by design.
See verification in action
Upload a photo and watch the Evidence Score, file hash, and Verify QR get generated in real-time.