If You Can't Prove It's Real,
It Doesn't Matter
AI can generate anything. Kura proves what actually happened — a tamperproof photo and video notary that locks the truth the moment you press the shutter.
The Problem
Interviewer: "AI has received a lot of negative backlash often due to inability to discern what is real and what is not. Do you think public reception would be more positive if laws were put into place requiring things like watermarks on artificially generated things?"
Geoffrey Hinton: "I think to be able to distinguish artificially generated things from real things, it's going to be very hard to do it by watermarking the artificial things. You're going to have to do it by getting provenance for the real things. If you see a political video, which you'll see a lot of before an election, it should start with a QR code and that QR code should take you to a website. If that's the website of the campaign and that website has the identical video, you know it's real. So it's going to be easier, people believe in the long run, to establish provenance than to detect fakes. Because if you can find a way of detecting a fake, the people making the fakes can take that method of detecting fakes and basically back-propagate so that their thing that generates fakes isn't detected as a fake. They can figure out how to change what they generate so the fake detector won't detect it. So I don't think we're going to get automatic detectors of fakes. I think what we're going to get is sensible provenance. So I think it's going to have to be by provenance and we're going to have to put more work into mechanisms for establishing provenance."
— Geoffrey Hinton, Nobel Laureate in AI, Fireside Chat, March 2026This is exactly why we built Kura Protocol.
Geoffrey Hinton — the godfather of AI and a Nobel Laureate — is telling the world that fake detection is a dead end. That the only viable future is provenance: proving what is real at the source, at the moment of capture. He describes a system where a QR code takes you to a website, and if that website hosts the identical file, you know it's real.
Kura Protocol is that system — already built and live on mainnet.
When you capture a photo through Kura, it is SHA-256 hashed, timestamped by decentralised consensus, tied to your identity, encrypted, and committed to an immutable canister on the Internet Computer — all in a single atomic action. No one can alter it afterward. Not even us.
Every Kura record has a public verification URL — the "QR code to a website" Hinton describes. Anyone can visit it and see the cryptographic proof: the hash, the timestamp, the uploader, the GPS coordinates. The SHA-256 hash proves the file is bit-for-bit identical to the original capture. No trust required — just mathematics.
But Kura goes further than what Hinton imagines. Where he envisions a campaign website hosting public video, Kura adds privacy by default. Your media is encrypted with vetKeys threshold cryptography before it ever leaves your device. You control who sees it, when they see it, and under what conditions — selective sharing, timelocks, even a dead man's switch. You can prove a photo exists and is authentic without ever revealing what it contains.
Hinton is describing the problem. Kura is the answer.
We can no longer tell what is real. AI-generated images and videos are now indistinguishable from captured reality. The tools we built to detect fakes are losing the arms race. The result is a crisis of trust that affects everyone — from journalists trying to prove their footage is authentic to ordinary people trying to document a car accident, a property dispute, or evidence of wrongdoing.
The existing infrastructure fails at three levels:
Metadata is trivially forgeable
Date, time, location, and device metadata can be edited in seconds. No court should treat raw metadata as proof of anything.
Platforms strip provenance
Uploading to social media destroys authenticity signals. The cryptographic link between a file and its history is severed in transit.
Centralised servers are vulnerable
Data held by a single entity can be edited or deleted with zero audit trail. There is no independent, decentralized witness.
The world does not need another AI detection tool. Detection is an arms race with no finish line. What the world needs is a simple, accessible way to certify origin.
What Kura Is
Kura is a photo notary protocol built on the Internet Computer (ICP). It provides tamperproof, private-by-default storage for digital media with a cryptographic chain of custody — and it requires no tokens, no wallets, and no blockchain knowledge from the user.
The core promise is simple: upload a photo or video, and it is locked immutably on-chain with a timestamp, your identity, and the file hash. Nobody — including Kura — can alter it, delete it, or dispute that it existed in that exact form at that exact moment.
Kura does not detect fakes. It does not judge whether a photo is "real." It certifies origin — who uploaded it, when, from what device, and that it has not changed since. This is the same principle as a legal chain of custody: not a claim about truth, but a guarantee that the evidence has not been tampered with after collection.
Web2 experience. Web3 infrastructure. Kura is a native mobile app on the App Store and Google Play — it looks and feels like any other camera app. Download, open, shoot. Everything else is infrastructure.
How It Works
The user experience is three steps. Everything else is invisible infrastructure.
Zero Editing, Zero Tampering. When media is captured through the Kura app, there is no editing step. No crop tool, no filter, no rotation — the image travels directly from the camera sensor to the encryption layer to the canister. The moment you allow any modification between sensor and chain, you break the trust guarantee.
Claimed Data vs Verified Data. Device metadata is self-reported. Kura separates claimed data (device-reported) from verified data (canister timestamp generated by ICP subnet consensus — which the user has zero control over). Both are stored, and any discrepancy between them is immediately evident. Kura does not enforce truth — it makes deception detectable.
Two Tiers of Trust
Kura distinguishes between two levels of certification, always visible to anyone viewing the record.
| Trust Level | Method | What It Proves |
|---|---|---|
| Kura Captured | Photo taken via Kura app | Device, GPS, time, sensor data + immutable on-chain record. Full chain from sensor to canister. |
| Kura Stored | Existing file uploaded to Kura | File existed in this exact form from the moment of upload. No guarantees about prior history. |
Both tiers provide tamperproof, immutable records from the point of commit. This honesty is a feature, not a limitation — it ensures that Kura never overpromises what it can verify.
Why the Internet Computer
Kura is built on ICP because no other blockchain can serve as both the storage layer and the delivery layer for media assets.
Full On-Chain Media
ICP canisters store the actual media files in stable memory, meaning the content itself is part of the tamperproof record — not just a reference to it.
Native HTTP Delivery
Content is served directly to browsers over standard HTTP. Verified images can be viewed at a URL — no special software or crypto wallets required.
Internet Identity
Hardware-backed authentication without seed phrases or wallet software. Users log in with biometrics — eliminating the single biggest barrier to adoption.
vetKeys Security
Verifiably Encrypted Threshold Keys enable private-by-default storage, selective disclosure, and timelock encryption without trusting an external key manager.
Autonomous Backends
The entire backend — storage, encryption, and audit logs — runs as autonomous smart contracts. No servers to maintain and no admin with a "delete" button.
06 — Competitive Landscape
| Feature | Traditional | Numbers | C2PA | Kura on ICP |
|---|---|---|---|---|
| Privacy | Platform-controlled | Public by default | Public by default | Private by default |
| Storage | Centralised cloud | IPFS / off-chain | Off-chain | Fully on-chain |
| Tokens Required | No | Yes (NUM) | No | No |
| Wallet Required | No | Yes | No | No (Internet Identity) |
| Selective Disclosure | No | No | No | Yes (per-recipient) |
| Timelock / Dead Man's Switch | No | No | No | Yes (vetKeys) |
| User Experience | Simple | Crypto-native | Device-dependent | Blockchain invisible |
07 — Target Markets
Kura's initial markets are defined by a single criterion: people who suffer real consequences when the authenticity of a photo or video is questioned.
- Tenant photographs apartment condition on move-in day. Landlord later claims damage — Kura proves the damage pre-existed.
- Car accident documented immediately. Insurance company cannot dispute when or where it was taken.
- Neighbour disputes: whoever documents first with Kura owns the narrative.
- Contractor photographs completed work before client sign-off. Client disputes quality — Kura shows exactly what was delivered and when.
- Delivery driver documents condition of goods at point of handover.
- Property manager documents unit condition between tenants systematically.
- Personal injury lawyer advises client to Kura the accident scene immediately.
- Insurance adjuster captures loss scene before remediation begins.
- Law firm generates court-ready chain of custody PDF reports directly from the dashboard.
- Freelance journalist in a conflict zone captures footage with the same cryptographic proof as a Reuters photographer — without institutional backing.
- Citizen journalist at a protest documents police interaction. Cannot be dismissed as edited or fabricated.
- NGO worker at a disaster site documents conditions for accountability purposes.
- Domestic abuse victim documents injuries immediately, sealed and private. Revealed only when ready or to a specific lawyer.
- Employee documenting workplace harassment without risk of employer visibility.
- Whistleblower captures evidence of wrongdoing. Dead man's switch ensures automatic delivery if the user goes silent.
- Musician records a rough demo or original sample. Timestamped before anyone else can claim it.
- Designer uploads original logo concept before pitching to a client who might steal it.
- Writer uploads manuscript draft before submitting to publishers — prior creation established.
08 — The vetKeys Advantage
ICP's vetKeys (Verifiably Encrypted Threshold Keys) are the single most important technical differentiator in Kura's architecture. No competing platform — C2PA, Numbers Protocol, or any other blockchain provenance solution — offers equivalent functionality.
vetKeys enable the ICP subnet nodes to collaboratively derive decryption keys under programmable conditions, without any single node ever holding the complete key.
Privacy-by-Default
Content is encrypted before it reaches the canister. Even the nodes storing the data cannot read it. Privacy is mathematical, not policy-based.
Selective Disclosure
Sharing with a recipient does not require a central key server — the subnet derives a recipient-specific key through threshold cryptography.
Timelock Encryption
Content can be locked until a future date. The decryption key is only derivable once that time has passed — enforced by consensus.
Dead Man's Switch
If a user remains inactive, the canister automatically triggers key derivation for designated recipients, ensuring data is never lost.
Zero-Knowledge Proofs
Establish that an encrypted file existed at a specific time and matches a hash — without ever needing to decrypt the content itself.
09 — Product Vision
10 — Conclusion
The digital world does not need another detection tool. Detection is an arms race. What it needs is a notary — a simple, accessible, private way to certify that a file existed in a specific form at a specific moment, with a chain of custody that nobody can dispute.
Kura is that notary. Built on the Internet Computer, powered by vetKeys, and designed for people who have never heard of blockchain and never need to. The protocol does not claim a photo is real. It proves the photo has not changed since it was taken. In a world where that distinction is no longer obvious, that guarantee is everything.
Upload a photo or video. It is locked. It is provable. Forever.
For technical enquiries and partnership discussions, contact the Kura Protocol team.