Every image is a lie until proven otherwise.

We built a camera module that proves a photo is real. Hardware-rooted. Mathematically verified. It attaches to the phone you already carry.

Photos used to be proof.

There was a time when seeing was believing. A photograph was evidence. A reflection of reality. An artifact of a moment that actually happened. Courts accepted them. Newspapers printed them. People trusted them.

AI changed that.

Generative AI now produces photorealistic images indistinguishable from photographs. Anyone with a laptop can fabricate a scene that never happened, a person who never existed, an event that never occurred. Every image on the internet is suspect.

The systems are breaking.

  • Journalism
  • Legal evidence
  • Insurance claims
  • Identity verification
  • Scientific publishing
  • Vehicle vision systems

It's time to prove what's real.

Not detect. Not guess. Not flag. Prove.

Verification that fits in your pocket.

A MagSafe-attachable camera module that produces cryptographically verifiable images. It establishes an unbroken chain of trust from the physical sensor through to the delivered image — combining hardware-rooted authentication, attested sensor data, and zero-knowledge proofs.

The camera doesn't lie. Now it can prove it.

How It Works

01

Capture

The module's sensor captures an image. Hardware-attested data unique to this specific device is bound to every frame at the silicon level.

02

Prove

A zero-knowledge proof is generated from the sensor data and image. Mathematical proof of authenticity, without exposing private device information.

03

Verify

Anyone can verify the image is real by checking the proof. No trust required. No intermediary. Only math.

Software verification has failed.

Metadata can be stripped.

Our proof is in the silicon.

Watermarks can be removed.

Our signature is mathematical.

AI detection lags behind generation.

Our verification is forward-proof.

Only hardware-rooted, physics-based proof is durable. And unlike standalone verifiable cameras, ours goes where you go.

Who needs proof?

Journalism & News

Prove that published imagery was captured by a real camera at a real location. End the era of fabricated evidence.

Legal Evidence

Tamper-proof visual evidence with a mathematical chain of custody. Admissible proof, not just pixels.

Insurance Claims

Verify that damage photos are authentic and unaltered. Eliminate visual fraud at the point of capture.

Identity Verification

Prove a photo was taken live by a real device. Stop synthetic identity fraud before it starts.

Scientific Publishing

Ensure research imagery is authentic and reproducible. Verifiable images for verifiable science.

Real Estate

Prove property photos are real and current. No more misleading listings built on generated imagery.

Under the hood

Silicon PUF

Every chip has unique electrical characteristics — like a fingerprint in silicon. Our Physical Unclonable Function extracts this identity at the hardware level. It cannot be cloned, extracted, or simulated.

Zero-Knowledge Proofs

ZK proofs allow us to mathematically prove that an image was captured by a specific device without revealing the device's private key or sensor signature. Proof without disclosure.

Attestation Chain

From power-on through capture, every component in the chain is verified. Secure boot, firmware attestation, sensor binding, and image signing form an unbroken sequence of trust.

Verification SDK

Any platform, app, or service can verify image authenticity with a single API call. Open protocol, open verification. Trust becomes infrastructure.

The era of provable images starts here.

Be among the first to verify.

We will never share your email.