Every image is a lie until proven otherwise.
We built a camera module that proves a photo is real. Hardware-rooted. Mathematically verified. It attaches to the phone you already carry.
Photos used to be proof.
There was a time when seeing was believing. A photograph was evidence. A reflection of reality. An artifact of a moment that actually happened. Courts accepted them. Newspapers printed them. People trusted them.
AI changed that.
Generative AI now produces photorealistic images indistinguishable from photographs. Anyone with a laptop can fabricate a scene that never happened, a person who never existed, an event that never occurred. Every image on the internet is suspect.
The systems are breaking.
- Journalism
- Legal evidence
- Insurance claims
- Identity verification
- Scientific publishing
- Vehicle vision systems
It's time to prove what's real.
Not detect. Not guess. Not flag. Prove.
Verification that fits in your pocket.
A MagSafe-attachable camera module that produces cryptographically verifiable images. It establishes an unbroken chain of trust from the physical sensor through to the delivered image — combining hardware-rooted authentication, attested sensor data, and zero-knowledge proofs.
The camera doesn't lie. Now it can prove it.
How It Works
Capture
The module's sensor captures an image. Hardware-attested data unique to this specific device is bound to every frame at the silicon level.
Prove
A zero-knowledge proof is generated from the sensor data and image. Mathematical proof of authenticity, without exposing private device information.
Verify
Anyone can verify the image is real by checking the proof. No trust required. No intermediary. Only math.
Software verification has failed.
Metadata can be stripped.
Our proof is in the silicon.
Watermarks can be removed.
Our signature is mathematical.
AI detection lags behind generation.
Our verification is forward-proof.
Only hardware-rooted, physics-based proof is durable. And unlike standalone verifiable cameras, ours goes where you go.
Who needs proof?
Journalism & News
Prove that published imagery was captured by a real camera at a real location. End the era of fabricated evidence.
Legal Evidence
Tamper-proof visual evidence with a mathematical chain of custody. Admissible proof, not just pixels.
Insurance Claims
Verify that damage photos are authentic and unaltered. Eliminate visual fraud at the point of capture.
Identity Verification
Prove a photo was taken live by a real device. Stop synthetic identity fraud before it starts.
Scientific Publishing
Ensure research imagery is authentic and reproducible. Verifiable images for verifiable science.
Real Estate
Prove property photos are real and current. No more misleading listings built on generated imagery.
Under the hood
Silicon PUF
Every chip has unique electrical characteristics — like a fingerprint in silicon. Our Physical Unclonable Function extracts this identity at the hardware level. It cannot be cloned, extracted, or simulated.
Zero-Knowledge Proofs
ZK proofs allow us to mathematically prove that an image was captured by a specific device without revealing the device's private key or sensor signature. Proof without disclosure.
Attestation Chain
From power-on through capture, every component in the chain is verified. Secure boot, firmware attestation, sensor binding, and image signing form an unbroken sequence of trust.
Verification SDK
Any platform, app, or service can verify image authenticity with a single API call. Open protocol, open verification. Trust becomes infrastructure.
The era of provable images starts here.
Be among the first to verify.
We will never share your email.