Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/concepts/two-layer-trust.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ When you capture media with SignedShot, two things happen:
1. **Capture Trust** — The server issues a signed token proving a verified device started a capture session
2. **Media Integrity** — The device signs the content hash using its Secure Enclave

Together, these prove: *"This exact content was captured on a verified device, in an authorized session, and hasn't been modified since."*
Together, these prove: *"This exact content was captured on a verified device, in an authorized session, and hasn't been modified since."* Verifiers choose which claims to trust and at what level.

## Layer 1: Capture Trust

Expand Down
6 changes: 3 additions & 3 deletions docs/intro.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,15 +7,15 @@ slug: /

**Signed at capture. Verified anywhere.**

SignedShot is an open protocol for proving photos and videos haven't been altered since capture—cryptographically, not by guessing.
SignedShot is an open protocol that creates cryptographic evidence that photos and videos haven't been altered since capture—proof, not guessing.

## The Problem

Digital manipulation is easy and getting easier. Anyone can alter an image in seconds, and there's no built-in way to prove otherwise.

This leads to an erosion of trust in visual media—and no way to prove "I didn't edit this."

SignedShot solves this by embedding cryptographic proof at the moment of capture.
SignedShot solves this by creating verifiable evidence at the moment of capture.

## A Different Approach

Expand All @@ -25,7 +25,7 @@ SignedShot doesn't detect fakes. It proves authenticity at the moment of capture

The result: **"This device captured this content at this time."**

Anyone can verify the proof independently. Open source, no vendor lock-in.
Anyone can verify independently. No account, no platform, no vendor lock-in.

## How It Works: Two Layers

Expand Down