KURA
BETA — BUILT ON ICP

Certify Reality.
Prove Authenticity.
Defend the Truth.

Kura Protocol uses blockchain-anchored cryptography to certify photos, videos, and audio at the moment of capture — creating tamper-proof records with a downloadable PDF evidence pack designed for legal proceedings, journalism, and investigations.

Kura privately stores your digital media in our decentralised cloud — encrypted, immutable, and yours forever.

See How It Works
Built with
SHA-256 ICP Blockchain vetKeys E2E Internet Identity GDPR Ready
Kura Live
Certifying…
SHA-256 Hash
vetKeys Encrypt
Consensus Timestamp
On-Chain Commit
Identity Verified
Certified
Immutable · Tamperproof
Captured by J. Smith
Hash
Timestamp
Identity J. Smith
GPS 51.5074, -0.1278
Block
Status CERTIFIED
See It In Action
Kura Live
Certifying…
SHA-256 Hash
vetKeys Encrypt
Consensus Timestamp
On-Chain Commit
Identity Verified
Certified
Immutable · Tamperproof
Captured by J. Smith
Hash
Timestamp
Identity J. Smith
GPS 51.5074, -0.1278
Block
Status CERTIFIED
0
Records Certified
0
Verifications
0
Tamper-Proof
0
Certification Time

Five steps to a
court-ready record

Capture
Photo, video, or audio with GPS and device metadata
a3f8c2...e91b
Hash
SHA-256 computed client-side, never leaving your device
Anchor
Hash locked on-chain with an immutable timestamp
Verify
Anyone can verify authenticity with just a URL
Export
Download a court-ready PDF certificate with hash, timestamps, and chain of custody
Verified
Hash a3f8c2d1...e91b4f07
Timestamp 2026-03-31 14:22:08 UTC
GPS (claimed) 51.5074, -0.1278
Identity J. Smith ✓ Verified
Principal m3in5...5qe
Authentic
Hash matches on-chain record
Timestamp verified immutable
Identity verified via biometric auth
No tampering detected

One URL proves
everything

No accounts. No downloads. No technical knowledge. Share a verification URL and anyone can confirm your media is authentic, unedited, and traceable to the verified individual who captured it. Every record is tied to a biometrically authenticated identity — with a downloadable PDF evidence pack ready for court, compliance, or publication.

Your media, your keys,
your control

Every certified file is encrypted at rest using vetKeys — the Internet Computer's threshold encryption protocol. Only you hold the decryption key. Not us. Not the network. You.

End-to-end encrypted at rest
Client-side key derivation
Decentralized storage on ICP

Trusted by professionals
who can't afford doubt

Legal Evidence
Export a court-ready PDF certificate with cryptographic hash proof, immutable timestamps, and GPS data. Prove chain of custody from capture to courtroom.
Insurance Claims
Every record is linked to a biometrically verified identity. Eliminate disputes with tamperproof evidence tied to a named, authenticated person.
Journalism
Protect sources with time-locks and dead man's switches. Certify footage authenticity in an era of deepfakes.
Compliance
Immutable audit trails for internal investigations. Meet regulatory requirements with tamperproof documentation.

Release on your terms,
or automatically

Set a future date for automatic disclosure. Until then, the record stays encrypted and invisible. When the clock hits zero, designated recipients get access.

23:59:47
Time Remaining
editor@reuters.com
legal@aclu.org
journalist@nyt.com

Not another cloud backup.
A certification protocol.

Blockchain, not a database
Records are anchored to the Internet Computer. No single company controls deletion, alteration, or access.
Verifiable by anyone
Verification requires zero accounts, zero downloads. One URL. Any browser. Full cryptographic proof.
Client-side privacy
Hashing and encryption happen on your device. Raw files never touch our servers. We can't see what you certify.
GPS is always "claimed"
We don't pretend location is verified. Kura labels coordinates honestly — because trust starts with transparency.
No vendor lock-in
Open verification endpoints. Your records are readable and verifiable even if Kura Protocol ceases to exist.
Built for adversarial use
Dead man's switches, time-locks, encrypted vaults. Designed for people who need records to survive pressure.
Internet Computer Protocol
SHA-256 Hashing
vetKeys Encryption
Internet Identity
Rust Canisters
Stable Memory

Ready to certify
what matters?

Join lawyers, journalists, and investigators using Kura Protocol to create tamperproof evidence — no technical knowledge required.

Read the Litepaper