Military-grade document protection made simple. Understand the technology that makes leak detection and authenticity verification possible.
What happens behind the scenes when you protect a document
Upload any document type (PDF, images, videos, audio) to Veriflo. We immediately create a unique cryptographic fingerprint and register it on multiple blockchains.
Processing time: Under 30 seconds for most documents
We apply 5 invisible layers of forensic fingerprints to each recipient's copy. These markers are unremovable and survive any manipulation.
Each copy is unique and traceable, even after screenshots or edits
Our AI continuously scans 500+ platforms for leaked documents. When found, we extract the fingerprints and identify the source with 98.5% accuracy.
Average detection time: 4 hours from leak to identification
Why our fingerprints are impossible to remove
Optional semi-transparent text overlay that deters casual sharing. Can include recipient name, date, or custom message.
Survivability: Low (can be cropped)
Purpose: Psychological deterrent
Recipient ID encrypted and stored in file metadata (EXIF, XMP, PDF info). Hidden from normal view but readable by forensic tools.
Survivability: Medium (metadata stripping)
Purpose: Quick identification
Invisible data embedded in image pixels using Least Significant Bit (LSB) encoding. Imperceptible to human eye, survives compression.
Survivability: High (survives screenshots)
Purpose: Core attribution
Unique patterns in whitespace, font kerning, invisible characters, and paragraph spacing. Survives printing and rescanning.
Survivability: Very High (analog attacks)
Purpose: Physical document tracking
Encrypted hash of recipient ID registered on-chain. Immutable proof linking document to specific person with timestamp.
Survivability: Perfect (immutable)
Purpose: Legal evidence
Redundancy is key. Even if 2-3 layers are removed, the remaining layers still identify the leaker with high confidence.
Every document gets registered on multiple blockchains, creating permanent, tamper-proof evidence that holds up in court.
Once registered, the document's hash and timestamp cannot be altered or backdated. Proof of existence at a specific moment in time.
Registered on Ethereum (security), Polygon (speed), and Arweave (permanent storage) for maximum reliability.
Blockchain evidence is increasingly accepted in courts worldwide. We provide formatted certificates ready for legal submission.
Anyone can verify a document's authenticity in under 1 second by scanning a QR code or entering the document hash.
Scan to verify
This document is authentic and unaltered
How Veriflo protects against common leak attempts
Attack: Recipient takes a screenshot to remove watermarks and metadata.
Veriflo Response: Steganographic Layer 3 embeds data in the actual pixels. Screenshots preserve these invisible markers. Structural Layer 4 patterns remain intact. Attribution confidence: 98%+
Result: Leaker still identified despite screenshot
Attack: Print document, then scan/photograph it to remove digital markers.
Veriflo Response: Structural Layer 4 uses whitespace patterns, font kerning, and micro-spacing that survive printing. Blockchain Layer 5 provides immutable registry. Attribution confidence: 95%+
Result: Physical document still traceable
Attack: Crop, resize, color-adjust, compress, or otherwise modify the document.
Veriflo Response: Steganographic encoding includes error-correction algorithms. Multiple redundant markers placed throughout document. Even with 40% of markers destroyed, remaining markers still identify source. Attribution confidence: 92%+
Result: Editing doesn't prevent attribution
Attack: Use tools like ExifTool to remove all file metadata before sharing.
Veriflo Response: Layer 2 metadata is just one of five layers. Layers 3, 4, and 5 completely independent of metadata. Detection continues with remaining layers. Attribution confidence: 96%+
Result: Metadata removal has minimal impact
Our multi-layer approach means that even sophisticated attackers using multiple techniques cannot remove enough markers to prevent attribution. The redundancy ensures that leakers are always identified.