How does a photo or receipt become court-grade evidence?
The sovereign vault is not a file share — it is timestamped events, hashes, and a daily Merkle surface verifiable without a dashboard session. Sensitive contact data can be protected with encryption when the operator enables the policy, with search limited to authorised scopes.
What the proof demonstrates
- Path capture: dispute and payment journeys persist as structured evidence tied to the unit and lease or receipt.
- Entity anchoring: payloads bind to the right business objects so media is never orphaned from context.
- Daily seal: a day-level tamper-evident layer makes silent backdating far harder.
Public verification
Operators (and parties they authorise) receive a public verification link with a calendar date and event reference — no login required — to confirm inclusion in that day's tree.