Evidence that
can be checked

AIVERIE does two things for every photo: proves where, when, and how it was captured—and proves nothing changed after capture. Cryptographic hashing, tamper-evident logs, and public verification.

How verification works

Four layers of evidence and integrity checking

File Hashing (SHA-256)

When you upload a file, we compute a SHA-256 hash of the exact bytes. That hash is like a fingerprint—if one bit changes, the hash changes.

sha256: 9f28a4c1e7...
Capture Provenance (EXIF)

If camera EXIF is present, we read the original timestamp, GPS, device, and orientation. If EXIF is missing, our app can record a signed attestation.

Timestamp: 2025-10-03 14:22:31
Location: 40.7128° N, 74.0060° W
Device: iPhone 15 Pro
Evidence Score

Green/Amber/Red scoring based on provenance strength, integrity checks, and consistency validation.

Green Amber Red
Signed Envelope + QR

Before finalization, we create a compact evidence envelope, canonicalize it, hash it, and sign it. Anyone can verify via QR scan.

Evidence Score explained

A quick indicator of provenance strength.

Green — Verified

EXIF/attestation present, geofence/time checks passed, no edit signals detected.

Amber — Limited Evidence

Screenshots or images from apps that strip EXIF. Minor inconsistencies.

Red — Failed

Signature mismatch or report has been revoked.

How to get Green
  • Upload original camera files (not screenshots)
  • Enable location when capturing in-app
  • Avoid heavy editing before upload
  • Take multiple angles with good lighting
Full Capture Guide

Verify QR - How it works

Each report carries a QR code for instant verification.

1
Scan QR code

Use any QR reader or camera app

2
Server checks signature

We re-compute the envelope hash and verify the cryptographic signature

3
Get instant verdict

Valid / Warning / Invalid with minimal facts shown

4
No account required

Public verification. Anyone can check authenticity.

Scan to verify authenticity

Cryptographic foundation

Built on proven cryptographic primitives

SHA-256 Hashing

File integrity verification. Industry-standard cryptographic hash function.

Digital Signatures

Ed25519 / P-256 signing. Envelope integrity and authenticity verification.

Hash Chaining

Append-only audit log with previous/next hash links. Tamper-evident by design.

See verification in action

Upload a photo and watch the Evidence Score, file hash, and Verify QR get generated in real-time.