How It Works

The evidence pipeline

The Problem

Trust without shared evidence breaks down. Communities need transparent, inspectable verification — not just claims.

The Pipeline

1

Register

Sign up with just your email. Vera uses magic link authentication — no password to remember or manage. You're verified and ready in seconds.

2

Install

Download the Vera agent and install it on your Windows PC. The agent runs as a Windows Service, collecting process activity continuously.

3

Collect

The agent captures process names, paths, publishers, loaded drivers, and integrity posture flags. No keystrokes, screenshots, or personal files.

4

Focus

Vera identifies gameplay and streaming moments using curated catalogs of known games and tools. This reduces noise and clarifies context.

5

Publish

Completed sessions are bundled, signed, and uploaded to Vera's cloud. The platform generates findings and publishes proof pages anyone can inspect.

Evidence Types

Observed

Captured directly from the system (process names, paths, drivers, integrity flags)

Correlated

Derived from rules and cross-references (known-risk driver matches, catalog lookups)

User-provided

Manual additions (media links, notes, context)

Determinism and Integrity

All evidence includes signatures, hashes, and timestamps. Bundles are signed and verified. Ruleset versions are tracked for reproducibility.

What Vera Does Not Collect

  • No keystrokes or input monitoring
  • No screenshots or screen recording
  • No personal files or documents
  • No network traffic inspection
  • No memory scanning or injection