We fingerprint each of your files using a patent pending method using secure one-way hashes and some metadata of your choice to find the fingerprint (such as the file name by default).
Fingerprints are the heart of the system, they:
- allow us to state with 100% certainty that two files with the same fingerprint are the same file
- aren't copies, they don't tell us anything about the contents of the file
The system is open, while we aspire to provide a client for every platform, you're able and encouraged to create your own through the client API.
Our system uses cryptographic one-way hashes technology developed for the NSA to uniquely identify files in such a way that can't be spoofed, yet divulges no information about the file.
There are 2 steps: fingerprinting your documents, and verifying them.
Fingerprinting your documents
There are 3 stages to generating a fingerprint:
Generating a fingerprint of your files is done by a client securely on your own network.
The source is available to all of the clients we provide so you can be sure that only the fingerprint is ever sent outside of your network.
We record the fingerprint and the time received.
Since we never see any of your files, no extra copies are made to keep track of.
If and when your records are questioned, we can verify them for you. Or you can let a third party generate the fingerprints to verify them for you, without us seeing the files.
We'll testify in court that the files you have are the ones you fingerprinted earlier.
You can periodically self-audit your records.
If your files are altered without your knowledge, their fingerprints remain secure with us.