Sign C2PA manifests, resolve them across re-encodes and crops, and verify cryptographic integrity — through one HTTP API. Below: the three core pillars, six secondary capabilities, and the 4-step pipeline they assemble.
Core pillars
MANAGED SIGNING & STORAGE
Sign C2PA manifests at any volume.
Hashproof issues signed C2PA manifests with managed keys, Merkle-anchored proofs, and pHash indexing. Every signed asset is stored with its content-address CID and a verifiable inclusion proof.
·COSE / Ed25519 + ML-DSA-65 hybrid
·Merkle-anchored to Base L2
·IPFS CIDv1 storage
·Per-tenant key isolation
SOFT-BINDING LOOKUP
Find the manifest after re-encodes and crops.
pHash-based resolution keeps provenance anchored through platform transformations. Hamming-distance thresholds are configurable; the API returns ranked candidates with similarity scores.
·2D-DCT perceptual hashing
·10-bit Hamming threshold default
·Multi-candidate response shape
·Chromaprint audio fingerprinting
CRYPTOGRAPHIC PROOF
Confirm authenticity in one call.
Upload a binary to the verify endpoint. Hashproof returns C2PA chain validation, signature check, trust-list matching, and manifest lineage — including a structured trust-status field ready to render.
·Signature + chain check
·Trust-list match
·Lineage DAG response
·Forensic view with confidence scores
Secondary capabilities
Six capabilities that don't appear on the landing page. Available on Scale and Enterprise; noted per row.
Compliance reporting
EU AI Act · Aug 2026
Structured EU AI Act Article 50 disclosures generated from signed manifests. One endpoint returns an auditor-ready PDF + JSON package.