Select Page

VHC Verify — Security Overview

Data minimisation: VHC captures non-confidential, high-level human actions (role, intent, timestamp) and avoids sensitive payloads/source content.

Cryptographic receipts: Human steps are signed and time-stamped; proofs can be verified deterministically.

Provenance alignment: VHC is compatible with C2PA-style packaging so evidence can travel with assets.

Selective disclosure: Verification can reveal role evidence only or full identity under policy.

Key practices: Key rotation policy, separate storage of secrets, TLS in transit.

This overview is informational and not a substitute for legal/security advice.