Chain of custody is a process. CanonProof strengthens it, but it does not magically replace it.
What CanonProof covers
- SHA-256 fingerprint proves the exact bytes verified
- ES256-signed certificate proves the result was issued by CanonProof
- Repeatable forensic extraction and scoring
What you still need
- How the file was captured and transferred
- Who had access, and when
- Secure storage and audit logs for custody
In practice: treat CanonProof as the verification layer inside your custody workflow.