What we do
Three primitives, exposed as plain HTTP:
- Sign. Generate a C2PA manifest for any image, video, audio file, or document. Hardware-backed signing on Scale; PQ-hybrid (ES256 + ML-DSA) on every tier.
- Resolve. Find a manifest by perceptual hash, even after re-encoding, cropping, or format conversion. Soft binding fills the gap when hard C2PA metadata is stripped.
- Verify. Validate cryptographic integrity, signer identity, and Merkle inclusion proofs. One call, one structured response.
SDKs for JavaScript and Python wrap the API. A CLI verifies any file in one line. A Chrome extension surfaces provenance on every page you visit.
Why this exists
Generative AI made it cheap to produce media that looks real. The question stopped being “is this image authentic” and became “what can I prove about how it was made.” C2PA answers that question with cryptographic claims attached to the file: who signed it, what tools touched it, and whether the bits you have match the bits the signer attested to.
The standard exists. The implementations are scattered. Most teams that want C2PA today have to assemble a signing pipeline from c2pa-rs, a key management story, a manifest store, and a verification flow. We built the API so they do not have to.
How we approach it
- Open standards over lock-in. Manifests we sign are valid C2PA. Verification works against any conformant validator, not just ours. Federation lets you query across registries without sending data to us.
- Cryptography you can audit. We use the algorithms specified by C2PA (Ed25519, ES256) and the NIST PQC selections (ML-DSA / Dilithium). The math is published. The choices are documented in Security.
- Verifiable infrastructure. Hourly Merkle anchors to Base L2 mean any signed manifest has a public, tamper-evident timestamp. You do not have to trust us to trust the proof.
- Documented over polished. We publish sub-processors, data flow, and incident history. We do not display certification badges we have not earned.
Where it is going
- Federation. Any organization should be able to run its own Hashproof registry and answer queries through a shared protocol. The spec lives on attestry.org.
- EU AI Act compliance. Article 50 takes effect in August 2026. AI-generated content has to be disclosed, and providers have to keep records that prove disclosure happened. Hashproof issues those records as signed manifests with retention windows that match the regulation.
- Soft binding at platform scale. Re-encoding, cropping, and re-uploading strip C2PA metadata. We are pushing perceptual-hash resolution further so manifests survive the transformations that real-world distribution applies.
Try the API
Free tier, no card. Sign your first manifest in under five minutes.