DEMO ENVIRONMENT - This is a security simulation. Ledger data is periodically reset at administrative discretion.
BitSeal is built on a foundation of verifiable cryptography. We don't ask you to trust us; we provide the proofs so you can verify us.
The content is filtered at the boundary.
We verify the math, never the meaning.
We use Edwards-curve Digital Signature Algorithm (EdDSA) for high-performance, high-security signing. Every seal is cryptographically signed by the Authority Key, providing non-repudiation.
Dual-hashing architecture. BLAKE3 for blindingly fast local client-side verification, and SHA3-512 for NSA-grade 'Deep Scan' archival integrity.
All seal manifests are stored in a append-only Merkle Log structure. Once written, a seal cannot be altered without invalidating the entire cryptographic chain.
Your actual files never leave your device during the Web Sealing process. We only receive the cryptographic fingerprint (hash), ensuring total privacy.
Even if our servers are breached, the attacker cannot forge past seals. The Authority Key is held in a hardware security module (HSM) with strict access controls.
Client-side hashing ensures that the file signature is generated locally. A MITM attacker can only see the hash, not the sensitive document itself.
We use 512-bit hashes provided by SHA3, rendering collision attacks mathematically impossible with current and foreseeable computing power.