Prove a file has not been changed since the moment it was sealed.

BitSeal hashes files in the browser with BLAKE3, signs the Merkle root with an Ed25519 Authority key, and anchors the seal to the Bitcoin blockchain via OpenTimestamps. The file bytes never leave your device. Seals persist in a Neon Postgres ledger and can be verified offline with standard cryptographic libraries.

bitseal.orygn.tech

BitSeal file sealing and verification interface

How it works

Seal a file, share the record, verify it later.

BitSeal streams your file through BLAKE3 in the browser, builds a Merkle tree from 64KB leaves, and sends only the cryptographic manifest to the server. The Authority signs the root with Ed25519 and submits it to OpenTimestamps for Bitcoin anchoring.

01

Drop a file to seal it

Select any file to create a cryptographic seal. The file is streamed through BLAKE3 in your browser, building a Merkle tree from 64KB chunks. Only the cryptographic manifest is sent to the server.

02

Receive a signed seal record

The Authority signs the Merkle root with Ed25519 and submits the digest to OpenTimestamps calendar servers for Bitcoin anchoring. You receive a signed manifest, a PDF certificate, and a ledger entry with a shareable URL.

03

Verify integrity at any time

Re-upload the file to re-hash it and compare against the original seal. BitSeal verifies the Ed25519 signature, checks the ledger, and shows the Bitcoin anchor status. Full offline verification is also possible with the Python SDK.

Why it matters

File integrity is a requirement, not a feature.

Bitcoin-anchored timestamps

Every seal is submitted to OpenTimestamps calendar servers and anchored to the Bitcoin blockchain. Once confirmed, the timestamp proves the file existed before a specific block, independent of BitSeal infrastructure.

Published Authority key

The Ed25519 verification key is published at /.well-known/bitseal-authority.json and derived at runtime from the signing key. Any third party can verify a seal without trusting BitSeal servers.

Contracts and legal documents

Prove that a signed contract, proposal, or agreement has not been altered after the fact. A seal record provides cryptographic evidence of the original document state, anchored to Bitcoin for independent verification.

Evidence and compliance records

Regulatory submissions, audit artifacts, and chain-of-custody documents need provable integrity. BitSeal creates verifiable records without relying on a third-party notary service.

Software releases and builds

Seal release artifacts, configuration files, or build outputs so downstream consumers can verify that what they received matches what was published.

Offline verification with the Python SDK

The open-source Python SDK verifies seals fully offline. Recompute the BLAKE3 Merkle root from the file, compare it to the manifest, and verify the Ed25519 signature against the published Authority key.

Built with

Cryptographic integrity with a Bitcoin anchor and open SDK.

BitSeal uses BLAKE3 for file hashing and Merkle leaves, SHA3-512 as a second whole-file digest, Ed25519 for Authority signatures, and OpenTimestamps with Bitcoin as the decentralized anchor. Seals persist in Neon Postgres. The open-source Python SDK lets developers integrate sealing and verification into their own systems.

Next.js 16 React 19 Neon Postgres BLAKE3 Ed25519 OpenTimestamps Cloudflare Turnstile Python SDK

FAQ

Common questions about BitSeal.

Yes. The web app and the open-source Python SDK are both free to use with no signup required. The SDK is MIT licensed on GitHub.
No. The file bytes never leave the device. BitSeal streams the file through BLAKE3 in the browser, computes a 32-byte Merkle root, and sends only a manifest of leaf hashes, the root, whole-file digests, filename, size, MIME type, entropy, and a UTC timestamp.
BLAKE3 for file hashing and Merkle leaves, SHA3-512 as a second whole-file digest, Ed25519 (RFC 8032) for Authority signatures, and OpenTimestamps with Bitcoin as the decentralized timestamp anchor. All choices are standard, widely implemented, and verifiable without BitSeal-specific tooling.
Every seal is submitted to OpenTimestamps calendar servers, which periodically commit a merkle root to the Bitcoin blockchain. Once confirmed, the seal has a Bitcoin-anchored timestamp that proves the file existed before a specific block, independent of BitSeal infrastructure.
Yes. Recompute the BLAKE3 Merkle root from the file, compare it to the manifest, and verify the Ed25519 signature against the published Authority key at /.well-known/bitseal-authority.json. The Bitcoin anchor check also works offline once you have an upgraded OpenTimestamps proof.
Yes. The Python SDK (BitSealCore.py) is a pure-HTTP client against the web API with full offline verification support. It provides sealing and verification functions that can be integrated into any application or workflow.

Built by Orygn

BitSeal is one of several tools Orygn has built to make digital integrity verification accessible.

Orygn builds custom software, internal tools, and security-focused systems for small businesses and growing teams. BitSeal is a working example of that approach applied to file integrity and provenance verification.

Open BitSeal