Security & Trust
Vetra's verification infrastructure is built on cryptographic integrity, not trust. Every component is designed so that tampering is detectable and provable.
Cryptographic Timestamp Chaining
Every event in a verified session — start, capture, checkpoint, end — is hashed using SHA-256 and linked to the previous event. This creates an immutable chain where modifying any entry invalidates everything after it.
- SHA-256(previousHash + timestamp + eventType + data)
- Chain validated server-side on session completion
- Timestamp monotonicity enforced (each event must be after the previous)
- Genesis hash anchors the chain — no entry can be prepended
Geolocation Verification
Device GPS coordinates are captured at session start and end, then compared against the property's known geocoded address. Sessions outside the configured geofence are flagged — not blocked — providing transparency without friction.
- Property addresses geocoded during setup
- Configurable geofence radius per property (default: 200m)
- Start and end coordinates captured and stored
- Impossible movement detection (GPS jumps during session)
Tamper-Evident Media Storage
Every photo and video is SHA-256 hashed on the device before upload. The hash is registered in the timestamp chain. Any modification to the file after capture will produce a different hash, making tampering immediately detectable.
- Hash computed on-device before network transmission
- Hash registered in timestamp chain before upload completes
- Server-side hash verification on upload receipt
- Original files stored immutably — no in-place modification
Infrastructure Security
Vetra runs on Google Cloud Platform via Firebase, inheriting GCP's SOC 1/2/3, ISO 27001, and FedRAMP certifications for infrastructure. Application-level security is built to complement these foundations.
- Firebase Auth with multi-factor support
- Firestore security rules enforce role-based access
- Firebase Storage rules prevent unauthorized media access
- All data encrypted at rest (AES-256) and in transit (TLS 1.3)
Compliance & Data Handling
SOC 2 Readiness
Building toward SOC 2 Type II from day one. Controls mapped, audit trail maintained.
CCPA / CPRA
Full data deletion pipeline. Users can request complete removal of their data.
7-Year Retention
Configurable retention policies. Default 7-year retention for compliance records.
GDPR Ready
Data handling compliant with GDPR requirements. Privacy-by-design architecture.
Security questions?
We're happy to discuss our security architecture, share our compliance documentation, or set up a call with our engineering team.
info@vetraverify.com