Cryptographic receipts for anything that matters

Proof that this happened, at this time, and nobody has altered the record since.

VeritaCrypt produces tamper-evident receipts for files, events, and records. Every receipt is signed, timestamped, and independently verifiable — including by people who don't trust us.

receipt.sha256 = 9f2b…a174-c0e8…8f3d  |  checkpoint #00042  |  ts 2026-04-21T12:00:00Z
How it works

Three steps. No black boxes.

Modern cryptography has been solving this problem for decades. VeritaCrypt packages it so non-cryptographers can use it — and defend it — in a courtroom, an audit, or a disagreement.

01 · NOTARIZE

hash & sign

Your file or event is hashed locally. VeritaCrypt signs the digest with its key, adds a timestamp, and returns a receipt you can store forever.

02 · ANCHOR

append-only log

The receipt is included in a Merkle transparency log. Periodic checkpoints are published to independent channels so the log cannot be silently rewritten.

03 · VERIFY

prove, anywhere

Hand anyone the receipt. They can check the signature, the inclusion proof, and a published checkpoint — offline, with open tools, without asking our permission.

On the command line

Quick look.

# Notarize a file — local hash, signed receipt, Merkle inclusion.
$ veritacrypt notarize ./contract-final.pdf
  digest     sha256:9f2b54…c8f3d
  signed-at  2026-04-21T12:00:00Z
  receipt    contract-final.pdf.vc-receipt.json
  OK included in log checkpoint #00042

# Verify later — no network required, no trust in us required.
$ veritacrypt verify ./contract-final.pdf \
    --receipt ./contract-final.pdf.vc-receipt.json \
    --checkpoint ./checkpoint-00042.txt
   digest matches
   signature valid
   receipt included at leaf 18,204
   checkpoint countersigned by 3 independent witnesses
  RESULT: intact, notarized 2026-04-21T12:00:00Z
What it does — and doesn't

We'd rather be honest than magical.

VeritaCrypt can prove…

  • a file existed in this exact form at a specific moment
  • an event was logged in sequence and hasn't been reordered
  • a record has not been altered since it was notarized
  • our log hasn't been silently rewritten (public checkpoints)
  • any of the above, offline, with open-source tooling

It can't…

  • · vouch for the truth of the content inside a file
  • · tell you who authored something — only who signed the receipt
  • · recover a document whose absence we never witnessed
  • · replace a lawyer, an auditor, or a notary public by itself
Who it's for

Built for anyone who's ever needed to prove something.

Legal & forensics

Chain-of-custody for evidence, discovery-proof archives, signed document sets that survive a deposition.

Compliance & audit

Tamper-evident audit logs that satisfy SOX, HIPAA, GDPR-style accountability, and internal controls attestations.

Journalism & research

Timestamped source material and drafts so provenance is answerable years later, in any jurisdiction.

Alpha access, no marketing noise.

One email when the CLI and hosted log are ready. Unsubscribe in one click.