VHC Verify — Security Overview
Data minimisation: VHC captures non-confidential, high-level human actions (role, intent, timestamp) and avoids sensitive payloads/source content.
Cryptographic receipts: Human steps are signed and time-stamped; proofs can be verified deterministically.
Provenance alignment: VHC is compatible with C2PA-style packaging so evidence can travel with assets.
Selective disclosure: Verification can reveal role evidence only or full identity under policy.
Key practices: Key rotation policy, separate storage of secrets, TLS in transit.
This overview is informational and not a substitute for legal/security advice.