How It Works

The 1V Protocol is a sovereign proof engine. We do not store your files. We do not read your data. We simply witness the mathematical fingerprint of your document at a specific moment in time.

1. The Hash (Client-Side)

When you select a file, your browser calculates its SHA-256 hash locally. This is a unique digital fingerprint. Changing even a single pixel in the document would result in a completely different hash.

Document: "contract.pdf" ↓ SHA-256 Algorithm ↓ Hash: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Note: Your actual file never leaves your device. Only the hash is sent to us.

2. The Witness (Sovereign Infrastructure)

Our infrastructure receives the hash and appends a precise timestamp. This combined data is then signed using our Ed25519 private key, which is stored on secure, sovereign hardware.

Input: [Hash] + [Timestamp] ↓ Ed25519 Private Key (Ring 1) ↓ Signature: 8f434346648f6b96df89dda901c5176b10a6d83961dd3c1ac88b59b2dc327aa4...

3. The Receipt (Portable Proof)

We generate a PDF receipt containing:

This PDF is a standalone artifact. You can email it, store it, or print it. It does not depend on our servers to be valid.

4. Verification (Public Truth)

Anyone with the receipt (or the QR code) can verify the proof. The verification process checks:

  1. Does the document hash match?
  2. Is the signature valid for that hash + timestamp?
  3. Was the signing key valid at that time?
Generate Your First Proof ($3)