KURA
BETA — BUILT ON ICP

Certify Reality.
Prove Authenticity.
Defend the Truth.

Kura Protocol uses blockchain-anchored cryptography to certify photos, videos, and audio at the moment of capture — creating tamper-proof records designed to support legal proceedings, journalism, and investigations.

Kura privately stores your digital media in our decentralised cloud — encrypted, immutable, and yours forever.

See How It Works
Built with
SHA-256 ICP Blockchain vetKeys E2E Internet Identity
Kura Live
Certifying…
SHA-256 Hash
vetKeys Encrypt
Consensus Timestamp
On-Chain Commit
Certified
Immutable · Tamperproof
Hash
Timestamp
GPS 51.5074, -0.1278
Block
Status CERTIFIED
See It In Action
Kura Live
Certifying…
SHA-256 Hash
vetKeys Encrypt
Consensus Timestamp
On-Chain Commit
Certified
Immutable · Tamperproof
Hash
Timestamp
GPS 51.5074, -0.1278
Block
Status CERTIFIED
0
Records Certified
0
Verifications
0
Tamper-Proof
0
Certification Time

Four steps to an
immutable record

Capture
Photo, video, or audio with GPS and device metadata
a3f8c2...e91b
Hash
SHA-256 computed client-side, never leaving your device
Anchor
Hash locked on-chain with an immutable timestamp
Verify
Anyone can verify authenticity with just a URL
Verified
Hash a3f8c2d1...e91b4f07
Timestamp 2026-03-31 14:22:08 UTC
GPS (claimed) 51.5074, -0.1278
Principal m3in5...5qe
Authentic
Hash matches on-chain record
Timestamp verified immutable
Principal identity confirmed
No tampering detected

One URL proves
everything

No accounts. No downloads. No technical knowledge. Share a verification URL and anyone can confirm your media is authentic, unedited, and traceable to the person who captured it.

Your media, your keys,
your control

Every certified file is encrypted at rest using vetKeys — the Internet Computer's threshold encryption protocol. Only you hold the decryption key. Not us. Not the network. You.

End-to-end encrypted at rest
Client-side key derivation
Decentralized storage on ICP

Trusted by professionals
who can't afford doubt

Legal Evidence
Court-admissible records with immutable timestamps and GPS data. Prove chain of custody from capture to courtroom.
Insurance Claims
Cryptographic provenance for damage documentation. Eliminate disputes with records that can't be backdated or altered.
Journalism
Protect sources with time-locks and dead man's switches. Certify footage authenticity in an era of deepfakes.
Compliance
Immutable audit trails for internal investigations. Meet regulatory requirements with tamperproof documentation.

Release on your terms,
or automatically

Set a future date for automatic disclosure. Until then, the record stays encrypted and invisible. When the clock hits zero, designated recipients get access.

23:59:47
Time Remaining
editor@reuters.com
legal@aclu.org
journalist@nyt.com

Not another cloud backup.
A certification protocol.

Blockchain, not a database
Records are anchored to the Internet Computer. No single company controls deletion, alteration, or access.
Verifiable by anyone
Verification requires zero accounts, zero downloads. One URL. Any browser. Full cryptographic proof.
Client-side privacy
Hashing and encryption happen on your device. Raw files never touch our servers. We can't see what you certify.
GPS is always "claimed"
We don't pretend location is verified. Kura labels coordinates honestly — because trust starts with transparency.
No vendor lock-in
Open verification endpoints. Your records are readable and verifiable even if Kura Protocol ceases to exist.
Built for adversarial use
Dead man's switches, time-locks, encrypted vaults. Designed for people who need records to survive pressure.
Internet Computer Protocol
SHA-256 Hashing
vetKeys Encryption
Internet Identity
Rust Canisters
Stable Memory

Ready to certify
what matters?

Join lawyers, journalists, and investigators using Kura Protocol to create tamperproof evidence — no technical knowledge required.

Read the Litepaper