Captilo —Private Picture.Public Proof.

Transforms any smartphone into a tamper-proof evidence device.

Privacy-first photo authentication for the masses. Every capture is cryptographically sealed, blockchain-anchored, and screened by intelligent fraud detection — at a cost of pennies per proof. Your photos never leave your device. Only the proof goes public.

< 10s
Capture to blockchain proof
SHA-256
Cryptographic fingerprint
eIDAS
EU-qualified timestamp
C2PA
Content Credentials ready
PRIVATE BETA
SHA256:a3f8b2c1d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0 ── SONIC TX:0x7a8b9c ── BLOCK:48291037 ── eIDAS:2026-02-09T14:23:07Z ── VERIFIED ──── SHA256:a3f8b2c1d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0 ── SONIC TX:0x7a8b9c ── BLOCK:48291037 ── eIDAS:2026-02-09T14:23:07Z ── VERIFIED ────
Blockchain Anchored
EU eIDAS Timestamps
C2PA Content Credentials
Biometric Proofs
4-Layer Fraud Detection

In the age of AI, photos prove nothing

Any image can be AI-generated, its metadata stripped, its timestamps forged, or its origin fabricated. Insurance fraud costs $80B annually. Construction disputes hinge on easily backdated photos. Legal evidence is challenged because EXIF data takes seconds to modify. The world needs photos that can mathematically prove their own authenticity.

AI Generation

Photorealistic images of accidents, damage, and documents that never existed — generated in seconds, undetectable by human eyes.

Metadata Forgery

EXIF timestamps, GPS coordinates, and device info can be stripped or rewritten with free tools. Traditional metadata is worthless as evidence.

Screen & Print Fraud

Photographing screens or printed documents to create "authentic" captures. Standard cameras can't distinguish a screen from the real world.

Five proofs, one shutter press

Every photo captured through Captilo simultaneously generates five independent, cryptographically-linked proofs — all before you see the success screen.

01

Authorized

Biometric auth via Face ID or fingerprint. A cryptographic commitment binds the device owner to this capture.

02

When

EU-qualified eIDAS timestamp from a certified TSA. Legally binding proof of time.

03

Where

GPS coordinates with spoof detection. Location bound to the cryptographic fingerprint.

04

What Device

Device model, OS, camera facing, and capture mode permanently recorded.

05

Untampered

SHA-256 of raw bytes + 4-layer fraud detection. Any pixel change breaks the hash.

Proof creation timeline
Auth
Capture
Hash + Sign + Detect
Blockchain + eIDAS (parallel)
0s~0.5s~2.2s~10s → Immutable proof
Verify any Captilo proof

Anyone can verify a proof's authenticity — no account, no app, just math.

Open Verifier

Built on open standards, not trust

Every layer is independently verifiable. You don't need to trust Captilo — you only need to trust mathematics and cryptography.

BLOCKCHAIN

Sonic Network

EVM-compatible blockchain with sub-1-second finality. Two hashes per proof: pictureHash (raw photo bytes) and metadataHash (14 canonical fields).

Split V2 hashing · CaptiloProofRegistryV2 · RFC 8785 canonicalization
LEGAL

eIDAS Timestamps

EU-qualified timestamps from a certified Greek APED TSA. Legally binding proof of time under EU eIDAS regulation — accepted across all EU member states.

RFC 3161 · Qualified Trust Service · EU-wide legal validity
PRIVACY

Biometric Proofs

Biometric templates never leave the Secure Enclave. Each photo receives a unique cryptographic commitment binding the authenticated user to the specific capture.

Hash-based commitment · BIP39 seed · HKDF key derivation
INTEGRITY

4-Layer Fraud Detection

FFT moiré pattern analysis, pixel grid autocorrelation, accelerometer motion analysis, and temporal physics — all run before blockchain submission.

Screen detection · Print detection · Mounted device detection
STANDARD

C2PA Content Credentials

Photos exported for social sharing are embedded with Content Credentials following the C2PA standard by Adobe, Microsoft, and Google.

Content Authenticity Initiative · Trust badges · real.gallery hosting
ARCHITECTURE

Privacy-First Design

Photos never leave your device. Only cryptographic hashes are transmitted to the blockchain. The original image is yours alone — forever.

Local-only storage · SQLite · No server-side photo storage

C2PA native. Provenance built in, not bolted on

Captilo doesn't just sign images — it captures the proof at the moment of creation. When you export a verified photo, the C2PA manifest carries the entire chain: blockchain anchor, eIDAS timestamp, biometric commitment, fraud detection results, and device context.

Capture-time provenance

C2PA manifests begin at the shutter press, not at export. Every step from biometric auth to blockchain anchoring is included.

Blockchain-backed assertions

Captilo's assertions are independently verifiable on the Sonic blockchain — adding immutability that file-based signing alone can't provide.

Fraud detection metadata

The C2PA manifest includes screen detection confidence, motion analysis, and integrity scores.

Platform-ready trust badges

Content Credentials recognized by Adobe, Microsoft, Google, and the broader Content Authenticity Initiative ecosystem.

C2PA Content Credential
Captilo Verified Export
claim_generatorCaptilo/2.4.0
signatureValid
blockchain_anchorSonic Verified
eidas_timestampEU Qualified
biometric_authCommitment Verified
fraud_detectionClean (score: 8)
picture_hasha3f8b2c1d4e5...c7d8e9f0
metadata_hash7b2e9f4a1c8d...3e6a5b0f
sonic_tx0x7a8b9c0d1e2f...4a5b6c7d
trust_levelProduction

Proof matters everywhere

Anywhere a photo needs to be trusted — that's where Captilo works. These are the sectors where verified imagery changes outcomes.

HIGH URGENCY

Insurance

Eliminate fraudulent claims documentation. Policyholders submit blockchain-verified accident and damage photos directly to claims systems.

HIGH URGENCY

Dating & Social

Verified profile photos that prove they are recent and authentic. Reduce catfishing, build platform trust, and give users confidence.

HIGH URGENCY

Construction

Timestamped progress documentation that proves project milestones. Protect against liability claims with immutable photographic evidence.

HIGH URGENCY

Legal

Court-admissible evidence with maintained chain of custody. Every photo's integrity is mathematically provable.

HIGH URGENCY

Journalism

Verify photojournalism at the source. Combat misinformation with photos that carry their own proof of authenticity.

MEDIUM-HIGH

Supply Chain

Verified shipment condition at every handoff point. Proof-of-delivery that can't be disputed. Quality control that withstands audit.

Digital trust starts with proof

Whether you're an enterprise needing verified evidence at scale or a developer passionate about content authenticity — we'd love to talk.

Photos never leave your device
Pennies per proof
No SDK needed for partners
Cross-device verification