The Whistleblower’s Shield

Proving photographic evidence existed before retaliation

Zero
Files uploaded to any server
$200K+
Regulatory fines issued based on evidence
100%
Source identity protected throughout process

The Creator

Anonymous source (“Source K”), employee at an industrial facility in Central Europe.

The Situation

Source K photographed environmental violations at their employer’s facility: illegal waste dumping into a river, falsified monitoring equipment readings, and after-hours operations violating permit conditions. The concern: once the employer learned of the disclosure, they would claim the photos were fabricated, digitally altered, or taken at a different location/date.

The Problem

Whistleblower evidence is routinely attacked on three fronts: authenticity (“the photos are doctored”), timing (“the photos were taken after we fixed the issue, then backdated”), and chain of custody (“the files were modified after the original capture”). Camera EXIF metadata can be edited. Cloud storage timestamps can be questioned. The source needed tamper-proof, legally admissible evidence — without exposing their identity.

The AuthorHash Solution

Source K used AuthorHash to timestamp each photograph immediately after capture, before transferring them to any other device. Critical features for whistleblower protection: (1) the file never leaves the device — only the SHA-256 hash is transmitted, so even under subpoena, AuthorHash contains no photos, no metadata, no identifying information; (2) the EU-qualified eIDAS timestamp provides court-admissible proof under EU Regulation 910/2014; (3) the Bitcoin anchor creates permanent, globally distributed proof; (4) any alteration — even a single pixel — produces a completely different hash.

The Outcome

When the employer attempted to discredit the evidence during the regulatory investigation, the authority’s forensic team verified the AuthorHash certificates independently. The eIDAS timestamp confirmed the photos existed 3 weeks before the employer was notified. The “fabrication” defense collapsed. Fines exceeded $200,000.

"The fact that my photos never left my phone was everything. I could prove the evidence was real without revealing who I was until I was ready. The company’s lawyers had nothing to attack.

Source K (anonymized)

Key Takeaway

AuthorHash’s zero-knowledge architecture means your evidence is verifiable but your identity is protected. No file is ever uploaded — only a mathematical fingerprint.

WHISTLEBLOWER PROTECTION

Zero-knowledge architecture

Only a mathematical fingerprint (hash) is transmitted. The actual file, its content, EXIF metadata, and any identifying information never leave the source’s device. Even under subpoena, AuthorHash cannot produce what it never received.

Dual legal weight

eIDAS-qualified timestamps carry legal presumption of accuracy across all EU member states (Article 41, Regulation 910/2014). The Bitcoin anchor adds jurisdiction-independent verification.

Tamper detection

SHA-256 produces a completely different hash for any modification. A single modified pixel, a cropped edge, an edited EXIF tag — all produce verification failures.

No institutional dependency

Unlike notarization or lawyer escrow, AuthorHash does not depend on any single institution’s cooperation or continued existence. The Bitcoin blockchain provides permanent, distributed proof that no entity can alter or retract.

Protect Your Work

Generate a court-admissible certificate in 60 seconds.

TIMESTAMP NOW