Skip to main content

Security & Trust

Security architecture.

Audrie's security model is built on a single principle: the less data we hold, the less there is to protect or exploit.

SECURITY ARCHITECTURE · CRYPTOGRAPHIC CHAINFile contents never stored or seen by Audrie – only the cryptographic fingerprintPDFDocumentany format#SHA-256File Hashcomputed locallySigned RecordML-DSA-65post-quantum crypto sealwritten simultaneouslyAudrie RegisterPostgreSQL · fast query cachesub-100ms verify<100msHedera HCSPublic ledger · independently governedimmutable · permanent proof3–5 secFast pathverify via Audrie registerIndependent pathverifiable without Audrie

Audrie does not store file contents.

When a file is authenticated:

  • A cryptographic fingerprint (hash) of the file is created
  • The hash is bound to a verified identity
  • A timestamp is recorded
  • The authentication record is independently anchored

Only integrity checkpoints are stored.

Authentication requires verified identity.

This ensures authenticated files are bound to a real, verified individual – not simply an email address.

Identity verification is required once and is not used for marketing purposes.

Authentication records are anchored to the Hedera public network.

This ensures:

  • Integrity records exist independently of the Audrie platform
  • Verification remains possible even if Audrie is unavailable
  • Long-term defensibility is preserved

File integrity does not depend on trusting a single vendor.

Verification requires:

  • File upload (drag-and-drop or selection)
  • Email entry (if no existing cookie)
  • Captcha to prevent abuse

Verification is free and publicly accessible.

Anyone can verify. Only verified identities can authenticate.

Audrie:

  • Does not store file contents
  • Does not index document text
  • Does not retain document copies

Only the cryptographic fingerprint and authentication metadata are recorded.

Enterprise clients may:

  • Deploy private verification endpoints
  • Integrate via API
  • Apply client branding to verification stamps

The core integrity architecture remains unchanged.