Authenticate the cryptographic chain-of-custody of Linux distributions (like Arch Linux and Debian) to their source code inputs
-
Updated
Apr 18, 2025 - Rust
Authenticate the cryptographic chain-of-custody of Linux distributions (like Arch Linux and Debian) to their source code inputs
Digital forensics on a complete OS data-image captured from an Apple iPhone. The collected evidence showed criminal conspiracy with intent to steal valuable artifacts from the National Gallery of Art.
AutoChain is a smart Chain of custody creator with the ability to create Forensic images and validate them
Cryptographic authorship witnessing for writers and creators
A technical framework for insurable, verifiable autonomous agents. Implements the "Fleet & Driver" liability model and OCSP-style API revocation (RFC)
NFTPadala is a blockchain-powered decentralized application (dApp) that provides a tamper-proof chain-of-custody system for physical or digital item delivery. By leveraging NFTs and immutable smart contracts, NFTPadala ensures transparent, verifiable tracking of item ownership and handoffs throughout the delivery process.
Immutable forensic logging — hash-chained evidence, blockchain-anchored, tamper-proof incident recording for digital forensics.
Evidence-based historical timeline with S.E.P.T. indexing (Source, Event, Place, Time). Interactive map and odometer dial interface. Tracks chain of custody for every source.
Chain of Custody is a tamper-proof forensic evidence system ensuring integrity, traceability, and availability through dual storage (Local + IPFS), fuzzy hashing, and a private blockchain with role-based access control. 4th Place @ CIDECODE 2.0
omphalOS is computational infrastructure for institutionalized doubt.
My Master's Degree Thesis. A blockchain-based Chain of Custody for digital evidences.
Digital Evidence (ITMS 583) - Spring 2026 | Illinois Institute of Technology | Prof. Shawn Davis
Digital Forensics and Incident Response: Investigation, Evidence Preservation, and Timeline Reconstruction;
Privacy-first secure storage for sensitive legal evidence
Dieses Repository ist Bestandteil der Chain of Custody, meiner Doktorarbeit und meiner Deepweb Forschungsreihe, Meta-Abstract Dokumentationsübersicht der SIA Security Intelligence Artefact Forschungsreihe. Forscherin und Autorin ich Frau @isabelschoeps-thiel
Evidex is a command-line tool designed to capture and verify the integrity of collections of files. It produces deterministic manifests and tamper-evident audit logs so that the state of digital evidence can be verified later
Java-based digital evidence integrity and chain-of-custody system developed during IBM Internship, using SHA-256 hashing to detect tampering and verify file authenticity.
Open-source forensic imaging & file-carving suite that recovers 40+ formats (JPEG, PNG, PDF, DOCX, MP4, ZIP, WAV, etc.) from raw disks, USB sticks, SD cards or disk-images. Creates bit-for-bit copies, SHA-256/MD5/SHA-1 triple hashes, logs chain-of-custody, exports deleted entries via The Sleuth Kit and performs multi-threaded signature-based .
HRPM.org is an AI-powered digital platform and investigation hub. It archives institutional failures and legal injustices, using advanced algorithms to map relationships, identify misconduct patterns, and assess security risks.
Add a description, image, and links to the chain-of-custody topic page so that developers can more easily learn about it.
To associate your repository with the chain-of-custody topic, visit your repo's landing page and select "manage topics."