Voluntas Tech

Blog

Short, practical notes on provenance, evidence, and what’s coming next.

2026-02-256 min
C2PA is important, but it is not the end of proof

C2PA manifests are useful, but metadata can be stripped in repost pipelines. Robust verification needs an additional media-native signal and log-backed recovery path.

c2paprovenancemetadataverification
Read →
2026-02-246 min
Inside Deep Scan: log-assisted attribution when UID recovery is weak

Deep Scan is built for hard cases. When watermark signal is severely damaged, we compare recovered traits against internal logs and media parameters to return an attribution confidence score.

deaddetectdeep-scanforensicsoperations
Read →
2026-02-235 min
DeadMark SDK + DeadDetect API roadmap: free embedding, production verification

DeadMark SDK remains free for embedding and generation workflows. DeadDetect API is the paid verification layer for scale, enforcement, and operator evidence tooling.

roadmapsdkapiproduct
Read →
2026-01-106 min
When a photo becomes evidence: how synthetic media turns into "proof" overnight

A single image can trigger payouts, panic, or policy decisions. Here’s how synthetic media slips into the evidence chain — and how to build verification that survives real-world edits and reposts.

provenancedeepfakesverificationplatforms
Read →
2026-01-125 min
Detection scores aren’t evidence: moving from 'AI or not' to verifiable provenance

“AI-generated” is not the whole story. Teams need proof that is recoverable, explainable, and operational at platform scale.

watermarkingforensicscompliancesecurity
Read →
2026-01-157 min
A practical 2026 checklist for provenance, labeling, and incident response

Regulations and platform policies are converging on the same idea: disclose synthetic content and be able to verify it. Here’s a checklist you can implement without rebuilding your entire stack.

regulationgovernancetrustproduct
Read →
What we write about
  • • Backend verification integration patterns (queues, moderation tools, APIs)
  • • Evidence UX for internal operators (not public-facing watermark visuals)
  • • Survivability testing under transforms and platform processing
  • • C2PA + internal UID/log workflows for redundancy
Publishing style

We keep posts practical: what changed, what was measured, what failed, and what operators can actually verify. Less marketing language, more implementation signal.

News

For external regulatory updates and credible sources, see the News page.