How It Works
The 1V Protocol is a sovereign proof engine. We do not store your files. We do not read your data. We simply witness the mathematical fingerprint of your document at a specific moment in time.
1. The Hash (Client-Side)
When you select a file, your browser calculates its SHA-256 hash locally. This is a unique digital fingerprint. Changing even a single pixel in the document would result in a completely different hash.
Note: Your actual file never leaves your device. Only the hash is sent to us.
2. The Witness (Sovereign Infrastructure)
Our infrastructure receives the hash and appends a precise timestamp. This combined data is then signed using our Ed25519 private key, which is stored on secure, sovereign hardware.
3. The Receipt (Portable Proof)
We generate a PDF receipt containing:
- The Document Hash
- The Timestamp
- The Cryptographic Signature
- A QR Code for instant verification
This PDF is a standalone artifact. You can email it, store it, or print it. It does not depend on our servers to be valid.
4. Verification (Public Truth)
Anyone with the receipt (or the QR code) can verify the proof. The verification process checks:
- Does the document hash match?
- Is the signature valid for that hash + timestamp?
- Was the signing key valid at that time?