ExistBefore

Forensic verification report

ExistBefore Verify Pro

Run a structured 10-step forensic verification on a file, a certificate PDF, a SHA-256 hash, an attestation id, or a text excerpt. The pipeline produces a deterministic, byte-identical Verification Report (PDF + JSON) suitable for legal, audit, and forensic use.

Your input never leaves the browser. Files are hashed locally with WebCrypto; only the resulting SHA-256 (32 bytes) transits via the proxy to the public ExistBefore registry.

Provide the input to verify

How Verify Pro differs from Verify

The public Verify page is built for one job: tell the user, in seconds, whether a file or a certificate is recognised by the ExistBefore registry. Verify Pro is built for a different audience — legal, audit, and forensic professionals who need a structured, reproducible verification record.

What this report guarantees — and what it does not

Forensic verification is a chain of statements made under specific conditions. Verify Pro is explicit about which statements it can make and which it cannot.

What an Authentic verdict establishes

What no Verify Pro report ever claims

How the 10-step pipeline runs

  1. VR01 — Input parsed. The input is recognised and routed to the correct path (file, certificate PDF, hash, attestation id, or text).
  2. VR02 — Hash computed. For files and text, the SHA-256 is computed locally with WebCrypto. For pre-supplied hashes and attestation ids, this step is not applicable.
  3. VR03 — Hash matches embedded. For certificate PDF input, the lookup hash is the same value embedded in the certificate. Internal divergence would already be a tamper indicator.
  4. VR04 — Embedded fingerprint matches embedded key. The SHA-256 of the embedded SPKI must equal the fingerprint declared in the certificate, otherwise the embedded key has been swapped.
  5. VR05 — Embedded signature is valid. The embedded ECDSA signature is verified against the embedded public key over the canonical signed payload.
  6. VR06 — Registry recognises the hash. The proxy forwards the hash to the public ExistBefore registry; an unrecognised hash means no attestation exists.
  7. VR07 — Registry attestation id matches embedded id. The certificate must not have been re-pointed at a different attestation.
  8. VR08 — Registry signing-key fingerprint matches embedded fingerprint. The same key must have signed the certificate and registered the attestation.
  9. VR09 — Current registry level vs generation level. The attestation may have been upgraded (T0 → T1 → T2) since the certificate was issued; this step reports the current level.
  10. VR10 — Embedded forensic findings. The producer-side forensic-findings snapshot embedded in the certificate is rendered verbatim and never re-computed at verification time.