CanonProof transforms digital evidence into cryptographically signed authenticity certificates. Every verification explains why a file is authentic or manipulated — in a format built for journalists, investigators, and the courts.
This is the type of JSON you receive via the API or UI after a verification.
{
"label": "AUTHENTIC",
"score": 98,
"confidence": 0.97,
"sha256": "e5c1…a4bd",
"mediaType": "image/jpeg",
"certificateId": "CP1-9QF2-7K2M-1A0X",
"verifyUrl": "/certificates/CP1-9QF2-7K2M-1A0X"
}
Verify a File Now
No credit card required to start verifying.
In a world where deepfakes, AI-generated media, and digital manipulation are accelerating, trust in evidence has collapsed. Screenshots can be faked, images edited, and documents forged — often indistinguishably.
CanonProof was created to restore that trust. We act as a neutral, cryptographic authority that certifies digital authenticity with transparency, ensuring that truth can still be proven in the digital age.
AI-generated content is rising exponentially. Yet the majority of digital evidence in disputes, journalism, and claims is still submitted without any integrity checks.
Every verification follows a rigorous, auditable, and repeatable workflow.
Under the hood, CanonProof combines forensic analysis, AI-based detection, and modern cryptography to deliver results you can stand behind in court, in print, or in front of a regulator.
CanonProof runs a battery of low-level checks on each file, including:
Our models look for signatures of synthetic generation and heavy editing — from GAN-like patterns to speech synthesis artefacts and frame-level inconsistencies.
The result is an AI-likelihood score you can use to challenge or corroborate claims around deepfakes, voice clones, and synthetic imagery.
Every verification produces a signed JSON Web Signature (JWS) object, using ES256 and CanonProof’s root keys.
Every certificate includes a public verification URL (for example: /certificates/CP1-9QF2-7K2M-1A0X)
where anyone can confirm the authenticity and see the signed result.
GET /certificates/CP1-9QF2-7K2M-1A0X → status: AUTHENTIC → signedJws: <compact JWS> → indicators: [...]
CanonProof provides the missing trust layer for the world’s digital evidence.
Each certificate is cryptographically signed and timestamped, providing verifiable authenticity for courts, regulators, and internal investigations.
Anyone can independently confirm the integrity of a CanonProof certificate via its unique verification URL and signature — no black box, no trust-me claims.
CanonProof’s authenticity score can serve as a trust signal for AI moderation systems, provenance tagging, and content governance pipelines.
Whether you upload one file or one million, each verification includes:
A clear classification (e.g. AUTHENTIC or MANIPULATED) with a numeric score and confidence level.
Human-readable indicators showing which forensic checks passed, failed, or raised suspicion — ready to paste into a report.
A SHA-256 hash that uniquely identifies the file so you can prove the exact bytes that were verified.
An optional public verification page you can share in filings, reports, or articles for independent confirmation.
CanonProof adapts to the way you work — not the other way around.
Use CanonProof as a standard step in your evidence intake.
Automatically verify photos, documents, and uploads at the point of claim.
Build CanonProof into your publishing or moderation workflow.
Traditionally, verifying authenticity required specialist tools, training, and hours of manual work. CanonProof brings that capability to every investigator, journalist, and analyst — in seconds.
You don’t need to be a forensic expert to get forensic-grade answers.
CanonProof is trusted wherever authenticity, compliance, and truth are critical.
| Sector | Need | Example Use | CanonProof Value |
|---|---|---|---|
| Law Enforcement & Forensics | Digital evidence chain of custody | Verify mobile uploads or CCTV footage | Tamper detection + court-admissible certificate |
| Insurance & Claims | Fraud prevention | Verify accident or damage photos | Authenticity scoring prevents staged claims |
| Media & Journalism | Deepfake & misinformation defense | Verify source footage before publishing | Fast authenticity check for edited or AI-generated media |
| Legal & Compliance | Regulatory integrity | Certify attachments in filings | Immutable audit record & signed proof bundle |
| Finance & KYC | Digital identity verification | Verify selfies & ID documents | Prove originality of uploaded documents |
| AI Detection & Governance | Synthetic media classification | Detect AI-generated content | CanonProof score = trust input for AI pipelines |
| Healthcare & Science | Clinical data integrity | Verify authenticity of lab images or scans | Tamper-proof archival certification |
| Education & Research | Academic integrity | Validate research photos & datasets | CanonProof citation integration |
| Intellectual Property / NFTs | Originality certification | Verify digital art provenance | CanonProof = authenticity attestation |
| General Public | Fact-checking & transparency | Verify viral videos or claims | Free public verification portal |
CanonProof is built for high-stakes evidence workflows. These are the questions most teams ask before adopting it.
CanonProof certifies a file’s integrity and authenticity signals. It hashes the file (SHA-256), evaluates format-specific forensic indicators, and issues a signed certificate with a clear outcome and confidence. It does not determine “truth”, intent, or context — it provides a defensible verification record.
Certificates are cryptographically signed (ES256/JWS) and bound to the file’s SHA-256 fingerprint. If the file changes, the fingerprint changes. If the certificate is altered, the signature validation fails. Third parties can verify the signature via the public verification page (and public keys where applicable).
Outcomes are deliberately limited to four clear states so teams can standardise decisions:
AUTHENTIC / LIKELY_AUTHENTIC indicate no material manipulation signals were detected (with differing confidence).
MANIPULATED indicates indicators consistent with alteration are present.
INDETERMINATE means the file cannot be assessed confidently (e.g., insufficient signal, format limits, or conflicting indicators).
Every outcome includes explainable reasons so it’s clear what drove the result.
AI analysis may be included as an advisory signal when available, but it is never the sole deciding factor. CanonProof’s outcome is driven by explainable forensic indicators and a transparent scoring approach. AI signals are presented separately and treated as supporting context, not proof.
No. Each certificate includes a public verification link so third parties can validate the signed result without logging in. This is designed for disclosure — clients, auditors, legal teams, and other stakeholders can view the same outcome and verify the signature independently.
CanonProof is built for professional evidence workflows where retention and auditability matter. Certificates store verification outputs (fingerprints, outcome, confidence, indicators, and reasoning). Retention depends on your plan and settings. For sensitive workflows, you can control what is shared publicly (public verify exposes the verification record needed for validation, not your case notes).
Issue your first CanonProof certificate in minutes.
Start Free Verify a File