How does a photo or receipt become court-grade evidence?

The sovereign vault is not a file share — it is timestamped events, hashes, and a daily Merkle surface verifiable without a dashboard session. Sensitive contact data can be protected with encryption when the operator enables the policy, with search limited to authorised scopes.

What the proof demonstrates

Public verification

Operators (and parties they authorise) receive a public verification link with a calendar date and event reference — no login required — to confirm inclusion in that day's tree.