How Vetra Works

Vetra creates a tamper-evident chain of proof for every vendor service. AI-generated checklists, video verification, geolocation, and cryptographic timestamps — linked together so nothing can be faked or backdated.

Step 1

Start a Verified Session

The service provider taps "Start Job Protection" when they arrive on-site. Vetra captures their GPS coordinates, loads the AI-generated checklist for their service, and starts the verification chain.

  • GPS coordinates captured and verified against property geofence
  • Cryptographic timestamp chain initiated (first hash: GENESIS)
  • Session timer begins — all events are monotonically timestamped

Within Geofence

200m radius verified

6 capturesChain valid
Step 2

Verify Each Checklist Item

The vendor completes each checklist item on camera. Photos and videos are SHA-256 hashed on the device and linked to the timestamp chain before upload.

  • Each photo/video hashed on-device before upload
  • Hash registered in the cryptographic timestamp chain
  • Chain entry: SHA-256(previousHash + timestamp + eventType + mediaHash)
  • Up to 20 photos and 120-second video clips per session
Step 3

Verification Receipt Generated

On session completion, the entire timestamp chain is validated server-side. A verification receipt is generated with an integrity score and shareable link.

  • Full chain recomputed and validated (hash integrity + timestamp monotonicity)
  • AI analysis summarizes findings and flags anomalies
  • PDF receipt auto-generated with QR code
  • Shareable link — no login required for recipients

Integrity Score: 97

Chain valid · Geolocation verified

Built for the field

Every feature designed for real-world field conditions.

Mobile-first PWA

Install from browser. No app store. Works on any device with a camera.

Offline support

Captures cached locally when connectivity drops. Synced automatically on reconnect.

Geofence verification

Configurable radius per property. Flags sessions started outside the expected location.

Cryptographic chaining

SHA-256 hash chain links every event. Tampering breaks the chain visibly.

Real-time dashboard

Property managers see sessions as they happen. Green means verified.

AI-powered analysis

AI generates service-specific checklists and analyzes video to flag incomplete or anomalous work.

Ready to see it in action?

We'll walk you through a live verified session in 15 minutes.

Request a Demo