Back to Blog
Technical Content Provenance

Sealing the Moment: How CPP and VeraSnap Are Redefining Digital Evidence for the Age of Generative AI

Deepfake incidents increased 550% between 2019 and 2024. The Content Provenance Protocol (CPP) and VeraSnap address this crisis—not by detecting fakes after they spread, but by cryptographically proving authenticity at the moment of capture.

February 2, 2026 45 min read VeritasChain Standards Organization
EN JA ZH
The Digital Evidence Crisis

In January 2025, Sam Altman warned that "AI has fully defeated most of the ways that people authenticate currently." Deepfake incidents increased 550% between 2019 and 2024. AI-driven fraud losses are projected to reach $40 billion annually in the US alone by 2027. In 2024, 38 countries with 3.8 billion people were affected by deepfake-related election interference. The foundation upon which digital evidence depends—the assumption that a photograph represents something that actually happened—is crumbling.

Part I — The Structural Failure of Digital Evidence

Courts Cannot Trust Photographs Anymore

The admissibility of digital evidence in legal proceedings has become a global challenge of the first order. In the United States, Federal Rules of Evidence Rule 901 requires proof that "the item is what the proponent claims it is." For digital photographs, this means establishing metadata integrity, chain of custody continuity, and the absence of AI-generated manipulation.

The bar has risen sharply. In People v. Beckley (2010), photographs were excluded because there was "no testimony confirming the images were not composites or otherwise false." In 2024, defendants in the January 6 Capitol riot cases deployed the "deepfake defense," arguing that video evidence could have been AI-generated. The Advisory Committee on Evidence Rules convened in November 2024 to consider proposed Rule 901(c) governing "potentially fabricated or altered electronic evidence."

Global Legal Requirements
  • EU eIDAS Regulation (EU 910/2014): Recognizes legal force of electronic evidence
  • Regulation (EU) 2023/1543: Standardizes cross-border digital evidence collection
  • Japan Code of Criminal Procedure: Requires authentication with expert testimony
  • US Federal Rules 901(b)(9): Supports systems showing "a process that produces an accurate result"

The Deepfake Crisis Extends Beyond the Courtroom

Domain Impact Scale
Elections AI-generated campaign content India: $50M+ invested, 50M AI calls in 2 months
Financial Markets AI Pentagon explosion image $500 billion stock losses in minutes (May 2023)
Corporate Fraud Deepfake CFO video call $25 million transferred (Hong Kong, Feb 2024)
Public Health Vaccine misinformation 57.6% of US workers exposed to COVID conspiracy

Perhaps most insidious is the "Liar's Dividend" phenomenon. Research at Georgia Institute of Technology demonstrated that when politicians dismiss genuine scandals as "deepfakes," their approval ratings actually increase—more so than when they apologize. The mere existence of deepfake technology enables denial of authentic evidence.

Part II — Why C2PA Is Necessary but Not Sufficient

What C2PA Has Accomplished

The Coalition for Content Provenance and Authenticity (C2PA), founded in 2021 by Adobe, Microsoft, BBC, Intel, and Truepic, has established "Content Credentials"—cryptographically signed metadata tracking content origin and edit history. Over 6,000 member organizations participate through the Content Authenticity Initiative. Google Pixel 10 received C2PA certification in 2025. Major AI platforms—OpenAI, Google, Meta, Amazon—joined in 2024.

For its intended purpose—labeling AI-generated content and providing transparency in creative workflows—C2PA serves admirably. However, when requirements shift to legal proceedings, insurance claims, and regulatory compliance, C2PA's limitations become apparent.

Four Structural Limitations of C2PA
  1. No deletion detection: Cannot detect if unfavorable images were selectively deleted
  2. Metadata stripping: Social platforms (Instagram, Facebook, X, TikTok) strip all metadata
  3. Cannot verify truthfulness: C2PA explicitly states it "cannot determine whether content is true"
  4. Centralized trust: Relies on certificate authorities; compromised keys enable forgery

Part III — The Content Provenance Protocol: Technical Architecture

Four Foundational Principles

CPP Design Philosophy

1. "Verify, Don't Trust"

Every capture event is countersigned by an independent RFC 3161 Time-Stamp Authority. No single party can unilaterally forge a valid proof.

2. "Absence of Evidence Is Evidence"

The Completeness Invariant uses XOR hash accumulation to detect any missing events. If a single capture is deleted, the violation is immediately detectable.

3. "Delete the Data, but Never Delete the Truth"

Media and proof are separated. Users can delete photographs for GDPR compliance while cryptographic proof remains intact.

4. "Provenance ≠ Truth"

CPP proves when, where, and by what device content was captured. It does not claim to prove content accuracy. UI guidelines mandate "Provenance Available," not "Verified."

The Five-Layer Cryptographic Stack

Layer Technology Threat Addressed
1. Hardware Signatures ES256 (ECDSA P-256) via Secure Enclave/StrongBox Software-based key extraction
2. RFC 3161 Timestamps Independent TSA countersignature Backdating, timestamp manipulation
3. Hash Chain Linkage PrevHash field linking sequential events Event reordering, tampering
4. Completeness Invariant XOR hash accumulation across session Selective deletion ("cherry-picking")
5. Biometric Binding Face ID/Touch ID authentication metadata Remote operation, bot capture

The Completeness Invariant: CPP's Signature Innovation

The Completeness Invariant maintains a running XOR accumulation of all event hashes within a session. Because XOR is both commutative and self-inverting, the accumulated value is exquisitely sensitive to changes:

H(E₁) ⊕ H(E₂) ⊕ H(E₃) ⊕ H(E₄) = Accumulated Value

If any single element is removed, the result changes.
The system detects selective deletion immediately.

This addresses the omission attack vector that C2PA cannot detect. A user cannot selectively delete unfavorable evidence without the Completeness Invariant flagging the discrepancy.

Conformance Levels

Level Requirements Use Case
Bronze Hash chain + Completeness Invariant (TSA optional) Basic provenance
Silver + Per-batch TSA timestamping VeraSnap free tier
Gold + Per-capture TSA + Biometric attestation Forensic-grade (Pro tier)

Part IV — LiDAR Screen Detection: Defeating the Analog Hole

The Attack That Cryptography Cannot Prevent

There exists an attack vector that no amount of cryptographic signing can address on its own: displaying a pre-existing image on a screen and photographing it with the authenticated camera. This "analog hole attack" produces cryptographically valid proof of content that was never part of the original scene.

How LiDAR Closes the Gap

VeraSnap uses the LiDAR sensor available on iPhone Pro models (12 Pro onward). LiDAR emits infrared light pulses and measures time of flight, producing a depth map with 49,152+ data points.

LiDAR Detection Mechanism
  • Real-world scene: Depth map shows natural variation—objects at different distances, complex 3D geometry
  • Flat screen: Depth map shows uniform distance readings across a planar surface
  • Classification result: Cryptographically signed as part of the CPP event

Five independent research institutions confirmed in January 2026 that VeraSnap represents the first consumer smartphone application combining dedicated LiDAR depth sensing with open-standard cryptographic provenance protocols for real-time screen capture detection.

Part V — Privacy-by-Design: Proof Without Exposure

The Separation of Media and Proof

The original photograph can be deleted at any time. The cryptographic proof record—hash, signature, timestamp, chain linkage, completeness data—persists independently. This serves:

Cryptographic Shredding and GDPR Alignment

When a user deletes media, VeraSnap generates a TOMBSTONE event—a cryptographically signed record documenting legitimate deletion. The TOMBSTONE maintains chain integrity while recording deletion. This satisfies:

Part VI — C2PA Interoperability

The Dual-Layer Strategy

CPP and C2PA serve complementary functions. During capture, CPP generates comprehensive forensic proofs. During distribution, proofs export as C2PA Content Credentials:

CPP Field C2PA Mapping
Session identifiers C2PA claim signatures
RFC 3161 timestamps C2PA timestamp assertions
Device attestation Signing device assertions
Geolocation EXIF GPS fields

However, three CPP categories have no C2PA equivalent: Completeness Invariant, biometric attestation, and LiDAR depth analysis. These remain available in full CPP proof for legal proceedings.

Post-Quantum Readiness

CPP v1.5 defines an ML-DSA migration path (NIST FIPS 204 post-quantum signature scheme). The proof format supports hybrid signatures—classical and post-quantum simultaneously—during transition periods.

Part VII — Industries Transformed

Industry Market Size CPP Value Proposition
Insurance $308B annual fraud (US) Truepic + RFC 3161 eliminated 24% of on-site inspections
Legal/e-Discovery $18.7B evidence management Capture-time authentication layer
Construction 70% of disputes trace to documentation Timestamped, completeness-verified records
Journalism 40% global trust in news Cryptographic capture-time provenance
Human Rights 85,000+ files via eyeWitness Evidence that protects its gatherer

Part VIII — Market and Regulatory Landscape

Market Projections

Total Addressable Market
  • Media provenance: $130M (2024) → $780M (2033) at 23.6% CAGR
  • Deepfake detection: $110M → $5.6B (2034) at 47.6% CAGR
  • AI content detection: $1.18B → $8.9B (2033) at 22.4% CAGR
  • Composite TAM: Exceeds $100 billion by 2033

Regulatory Tailwinds

Regulation Effective Date Key Requirement
EU AI Act Article 50 August 2, 2026 AI content must be machine-detectable; up to €35M or 7% revenue penalty
TAKE IT DOWN Act May 2025 First US federal deepfake law; 48-hour removal requirement
China Deep Synthesis January 2023 Mandatory labeling, consent, real-name authentication

Part IX — Open Standards: CPP as IETF Internet-Draft

Why Openness Matters

CPP is published as IETF Internet-Draft draft-vso-cpp-core-00 and available on GitHub. Three strategic convictions drive this:

  1. Interoperability requires openness: Courts, insurers, and tribunals must be able to verify independently
  2. Vendor lock-in is antithetical to evidence integrity: If VSO ceased operations, proofs must remain verifiable
  3. Legal credibility correlates with standards recognition: RFC 3161's acceptance in eIDAS flows from IETF status

CPP Version Evolution

Version Key Additions
v1.0 Hash chains, Completeness Invariant, RFC 3161, Ed25519 signatures
v1.1 ES256 (ECDSA P-256) for mobile compatibility, TOMBSTONE events
v1.3 Full Merkle tree specification—critical interoperability milestone
v1.4 Depth Analysis Extension (LiDAR), 16 sensor types
v1.5 DynamicQR, ML-DSA post-quantum migration path

Part X — VeraSnap: The Reference Implementation

Simplicity Over Complexity

Everything described—five cryptographic layers, Merkle trees, Completeness Invariants, RFC 3161 interactions, LiDAR analysis—executes behind a single button press. Users need no knowledge of hash functions, digital signatures, or timestamp protocols.

VeraSnap Features
  • Case management: Organize captures by project with independent hash chains
  • Export formats: CPP JSON (forensic), C2PA (platform integration), DynamicQR (survives metadata stripping)
  • Free tier: Core signing, RFC 3161 timestamps, hash chains, Completeness Invariant
  • Pro tier: Multi-TSA redundancy, LiDAR detection, Gold conformance
  • Localization: 10 languages including English, Japanese, Chinese, Korean, Spanish, French, German

Part XI — What VeraSnap Does Not Claim

The Discipline of Honest Limitations

In a market where competitors use "Verified" and "Authenticated" liberally, VeraSnap's UI guidelines mandate:

"This shows capture provenance. It does NOT verify content truthfulness or signer identity."

This restraint is not modesty—it is engineering integrity. VeraSnap can prove that a photograph was captured at a specific time, location, and device, with a human present, and no captures deleted. It cannot prove the photograph tells the whole story or that the photographer's interpretation is correct.

Conclusion: An Invitation

The question is no longer whether generative AI will challenge our ability to distinguish real from fake. That challenge is already here. The question is whether we will build the cryptographic infrastructure to meet it.

CPP is an open protocol. The specification is published. The GitHub repositories are accessible. We welcome review, criticism, implementation, and contribution from the security research community, the legal profession, standards bodies, and anyone who shares the conviction that digital evidence integrity is a foundational requirement for functioning societies.


Document ID: VSO-BLOG-CPP-2026-001
Publication Date: February 2, 2026
Author: VeritasChain Standards Organization
License: CC BY 4.0

#CPP #VeraSnap #DigitalEvidence #ContentProvenance #Deepfake #C2PA #RFC3161 #LiDAR #CryptographicProof #GDPR #EUAIAct #VeritasChain