Include steps, error messages, expected outcome, and any relevant IDs so we can reproduce the issue.
Start here. These pages explain results, integration patterns, and policies used in evidence workflows.
What AUTHENTIC / LIKELY_AUTHENTIC / INDETERMINATE / MANIPULATED means, and how confidence is derived.
Read methodologyWhere to find keys, how to rotate them, and recommended integration patterns.
Manage keysHow we protect your data, how certificates are signed, and how public verification works.
Security pageHow long certificates are kept, what is retained, and plan-based storage caps.
Read policyRecommended “upload → verify → certificate” flow, with audit-ready storage recommendations.
API overview