Voluntas Tech

Security

How we think about integrity, verification, and operational safety for DeadMark + DeadDetect.

Security posture (current public summary)

  • • Stealth: image and video watermarks remain invisible; audio watermarks remain inaudible in normal listening.
  • • Redundancy: provenance is strongest when multiple signals are combined (e.g., watermark + logs + metadata such as C2PA).
  • • Auditability: encode/decode events can produce UID-linked structured logs and timestamps.
  • • API-first design: verification flows are intended to integrate into backend moderation / compliance systems.

Responsible disclosure

If you identify a security issue, please contact us with a clear reproduction path, expected impact, and any relevant samples. We prioritize issues that affect integrity, false attribution risk, or provenance handling.

Evidence overlays in this site

The dots, timelines, and heat strips shown in demos are operator-facing evidence-location visualizations only. They are not the watermark itself. The encoded signal remains invisible in image/video and inaudible in audio.