How It Works
The evidence pipeline
The Problem
Trust without shared evidence breaks down. Communities need transparent, inspectable verification — not just claims.
The Pipeline
Register
Sign up with just your email. Vera uses magic link authentication — no password to remember or manage. You're verified and ready in seconds.
Install
Download the Vera agent and install it on your Windows PC. The agent runs as a Windows Service, collecting process activity continuously.
Collect
The agent captures process names, paths, publishers, loaded drivers, and integrity posture flags. No keystrokes, screenshots, or personal files.
Focus
Vera identifies gameplay and streaming moments using curated catalogs of known games and tools. This reduces noise and clarifies context.
Publish
Completed sessions are bundled, signed, and uploaded to Vera's cloud. The platform generates findings and publishes proof pages anyone can inspect.
Evidence Types
Observed
Captured directly from the system (process names, paths, drivers, integrity flags)
Correlated
Derived from rules and cross-references (known-risk driver matches, catalog lookups)
User-provided
Manual additions (media links, notes, context)
Determinism and Integrity
All evidence includes signatures, hashes, and timestamps. Bundles are signed and verified. Ruleset versions are tracked for reproducibility.
What Vera Does Not Collect
- ✓ No keystrokes or input monitoring
- ✓ No screenshots or screen recording
- ✓ No personal files or documents
- ✓ No network traffic inspection
- ✓ No memory scanning or injection
