Cryptographic proof that media was captured live, from a real device, in real time — not generated, not edited, not deepfaked.

The Problem

Anyone can generate a photorealistic video with AI. Anyone can edit footage and claim it's original. There's no way to know if media you're watching was actually captured from a real camera sensor, in real time, without tampering.

Until now.

How It Works

1

Record

Open MIR Capture in your browser or app. Point your camera and hit record — just like any other camera.

2

Hash in real time

While you record, MIR Capture extracts video frames and computes SHA-256 hashes every few seconds. Each hash links to the previous one, forming an unbreakable chain — streamed to the server during capture, not after.

3

Sign & assert

When you stop recording, the final video is hashed and a cryptographic assertion is created on MIR Assertions — a public registry that links the video's hash to your identity, the device, and the hash chain.

4

Verify anywhere

Anyone with the video file can compute its hash, look it up on the registry, and confirm: this video was captured live, from a real camera, by a known capturer, at a specific time and place.

Frame 0 00:00
a3f8c1... genesis
|
Frame 1 00:02
7b2e09... a3f8c1...
|
Frame 2 00:04
e41d5f... 7b2e09...
|
Frame N final
20d3db... e41d5f... CAPTURED_BY assertion on MIR Assertions

Why It's Trustworthy

🔗

Real-time hash chain

Frame hashes are streamed during recording. You can't retroactively build a chain for pre-rendered content — the timestamps and server receipts prove liveness.

🔑

Client-side signing

Assertions are signed with a private key that never leaves your device. Even the server can't forge your signature.

📍

Sensor metadata

GPS coordinates, accelerometer, and gyroscope data are embedded in each chain entry — proving physical device presence.

🔍

Public verification

Anyone can verify a capture by hashing the file and looking it up. No account needed. No trust required.

🚫

No video storage

Your video never leaves your device. We only receive cryptographic hashes and metadata — never the media itself. You keep full control of your files.

🔒

Privacy first

We don't share your data with third parties. Account information is used solely to operate the service. Read our privacy policy.

Use Cases

📰

Journalism

Prove footage is authentic and unedited from the moment of capture.

⚖️

Legal Evidence

Establish chain of custody for video evidence with cryptographic proof.

🏢

Insurance Claims

Verify that damage documentation was captured on-site, in real time.

🛡️

Anti-Deepfake

Distinguish real captures from AI-generated or manipulated media.

🌍

Human Rights

Document events with tamper-proof provenance that withstands scrutiny.

🎬

Content Creators

Prove original authorship of footage before anyone else can claim it.

Get Started

Create an account, generate a signing key, and start capturing provenance-verified media in your browser. No app install required.