Chain of Custody & Data Protection
How EchoLog ensures your evidence is legally valid, tamper-proof, and protected by the highest security standards.
AES-256
Encryption
RFC 3161
Timestamps
Blockchain
Anchored
GDPR/LGPD
Compliant
What is Chain of Custody?
Chain of custody is a legal concept that documents the chronological history of evidence. In digital forensics, it proves that evidence has not been tampered with since it was collected.
EchoLog implements a cryptographic chain of custody that:
- Creates a unique SHA-256 hash of every piece of evidence
- Links each entry to the previous one, forming an unbreakable chain
- Timestamps entries with trusted third-party authorities (RFC 3161)
- Anchors hashes to public blockchain for immutable proof
How Evidence Sealing Works
You Create an Entry
When you document an incident, EchoLog immediately captures the raw content, timestamp, and metadata.
SHA-256 Hash Generated
A cryptographic hash is created from your content. This 64-character fingerprint is unique to your exact content - even changing one character would produce a completely different hash.
RFC 3161 Timestamp
The hash is sent to a trusted Timestamp Authority (TSA) that provides a legally-valid certificate proving when the evidence was created. This timestamp cannot be backdated or altered.
Blockchain Anchoring
The hash is anchored to the Polygon blockchain, creating a permanent, public record that exists independently of EchoLog. Even if our servers disappeared, your evidence proof would remain on the blockchain forever.
Chain Linking
Each new entry includes the hash of your previous entry, creating an unbreakable chain. If anyone tries to modify or delete a past entry, the entire chain would break, making tampering immediately detectable.
Public Verification
Anyone can verify the authenticity of evidence without accessing the actual content. This is crucial for legal proceedings where you need to prove evidence hasn't been tampered with.
Verification URL Format:
https://echolog.net/verify/[evidence-hash]The verification page shows the timestamp, blockchain anchor, and integrity status without revealing any private content.
LGPD & GDPR Compliance
EchoLog is fully compliant with the Brazilian General Data Protection Law (LGPD) and the European General Data Protection Regulation (GDPR).
Your Rights
- • Access your data anytime
- • Export all your data
- • Request data deletion
- • Data portability
- • Withdraw consent
Our Commitments
- • End-to-end encryption
- • No data selling, ever
- • Minimal data collection
- • Transparent processing
- • Regular security audits
Technical Specifications
| Hash Algorithm | SHA-256 (FIPS 180-4) |
| Encryption | AES-256-GCM |
| Timestamp Standard | RFC 3161 (IETF) |
| Blockchain | Polygon (Ethereum L2) |
| Key Derivation | PBKDF2 with 100,000 iterations |
| TLS Version | TLS 1.3 |
| Data Centers | AWS (SOC 2 Type II certified) |