The Digital Evidence Problem
Digital evidence is fragile. A screenshot can be edited. A document can be backdated. A photo’s metadata can be stripped. An email can be fabricated.
Courts know this. That’s why digital evidence faces higher scrutiny than physical evidence. The party presenting digital evidence must demonstrate:
- Authenticity — Is this actually what it claims to be?
- Integrity — Has it been modified since creation?
- Chain of custody — Who had access, and when?
Traditional approaches to these questions rely on expert witnesses, forensic analysis, and custodial testimony. Blockchain timestamps provide a simpler, stronger foundation.
Why Timing Matters in Evidence
In many legal contexts, the question isn’t just “does this evidence exist?” but “when did it exist?”
- Intellectual property: Who created it first?
- Contract disputes: Was the document signed before or after the alleged breach?
- Employment law: When was the performance review actually written?
- Insurance claims: Did the damage documentation predate or postdate the claim?
- Regulatory compliance: Was the filing completed before the deadline?
- Defamation: When was the statement published?
In each case, a verifiable timestamp transforms the evidence from “we believe this existed on [date]” to “here’s cryptographic proof it existed on [date], verifiable by anyone.”
How Legal-Grade Evidence Works
When you timestamp evidence with Legal-Grade, you receive a complete evidence bundle:
The timestamp certificate
A PDF showing the file’s SHA-256 hash, the blockchain transaction ID, the block number, and the anchor time. This is the primary proof of existence.
certificate.json
A machine-readable version of the certificate, suitable for automated verification and as a structured exhibit.
merkle_proof.json
If your file was part of a batch anchor, this provides the mathematical proof that your specific file was included. It allows independent verification of your file’s inclusion without revealing other files in the batch.
identity_attestation.jws
A JSON Web Signature binding your verified identity to the timestamp. This proves that a specific, identified person submitted the evidence. Verifiable using TimeProof’s public key at /.well-known/jwks.json.
identity_readme.json
Instructions explaining how the identity attestation works and how to verify it — written for non-technical readers.
verification_guide.txt
A plain-language, step-by-step guide for attorneys, paralegals, judges, or arbitrators. Explains what each file is, how to verify the timestamp, and what it proves. No technical background required.
CHECKSUMS.sha256
SHA-256 hashes of every file in the bundle, providing integrity verification of the bundle itself.
Evidence Preservation Best Practices
Timestamp immediately
The shorter the gap between evidence capture and timestamp, the stronger the evidence. If you take a screenshot at 2:15 PM and timestamp it at 2:16 PM, that’s a tight, credible window. If you timestamp it a week later, the delay itself may be questioned.
Use Instant timestamps for evidence
Evidence preservation is time-sensitive. Use Instant timestamps when immediate blockchain anchoring matters. Instant mode uses 2 credits per file rather than the 1-credit scheduled batch mode.
Preserve the original file
After timestamping, do not modify the original file in any way. Even opening a document and clicking “Save” can change its hash. Store the exact file you timestamped alongside its certificate.
Document the capture process
Note how you captured the evidence: what device, what time, what you observed. This context strengthens the timestamp’s evidentiary value.
Store the Legal-Grade bundle with the evidence
Keep the entire evidence bundle (all 7 files) with the original evidence file. Together, they form a self-contained proof package.
Use Cases in Practice
Screenshot preservation
You discover a competitor is infringing your trademark on their website. You take screenshots. But screenshots are trivially faked — any court knows this. By timestamping the screenshots immediately, you create blockchain-anchored proof that these exact images existed at this moment.
Whistleblower documentation
An employee witnesses financial misconduct and documents it. They timestamp the evidence before reporting, creating an immutable record that predates any organizational response. The identity attestation proves they specifically submitted the evidence.
Contract versioning
During a negotiation, multiple contract versions are exchanged. Timestamping each version creates a verifiable timeline showing exactly which terms were proposed when — eliminating “he said, she said” disputes about the negotiation history.
Pre-litigation preparation
An attorney anticipating litigation begins timestamping relevant documents and communications. When litigation begins, the timestamped evidence chain pre-exists the filing — strengthening the argument that evidence wasn’t fabricated for the lawsuit.
Cost of Evidence Protection
| Use Case | Typical Volume | Suggested approach | Credit planning |
|---|---|---|---|
| Individual evidence preservation | 5-20 files | Use instant timestamps for urgent captures and add Legal-Grade when formal review is likely | 10-40 instant credits, plus 50 credits per contested batch |
| Small law firm | 50-100 files/month | Use Scheduled mode for routine matter files and Instant for time-sensitive evidence | 50-100 scheduled credits plus selective instant and LG usage |
| Litigation department | 200+ files/month | Use Pro or Business plans with selective LG on high-risk batches | 200+ scheduled credits/month, with LG reduced to 25 credits on Business |
| eDiscovery integration | Thousands | Use API workflows with Business or Enterprise plans | 2,500+ monthly credits, with free LG on Enterprise |
For context: a single forensic examiner charges $300-$500/hour. A blockchain timestamp that strengthens your evidence typically uses 1 or 2 credits, with Legal-Grade added only when formal packaging is justified.