Back to Home
Enterprise-Grade Security

Chain of Custody & Data Protection

How EchoLog ensures your evidence is legally valid, tamper-proof, and protected by the highest security standards.

AES-256

Encryption

RFC 3161

Timestamps

Blockchain

Anchored

GDPR/LGPD

Compliant

What is Chain of Custody?

Chain of custody is a legal concept that documents the chronological history of evidence. In digital forensics, it proves that evidence has not been tampered with since it was collected.

EchoLog implements a cryptographic chain of custody that:

  • Creates a unique SHA-256 hash of every piece of evidence
  • Links each entry to the previous one, forming an unbreakable chain
  • Timestamps entries with trusted third-party authorities (RFC 3161)
  • Anchors hashes to public blockchain for immutable proof

How Evidence Sealing Works

1

You Create an Entry

When you document an incident, EchoLog immediately captures the raw content, timestamp, and metadata.

2

SHA-256 Hash Generated

A cryptographic hash is created from your content. This 64-character fingerprint is unique to your exact content - even changing one character would produce a completely different hash.

Example: a7f5c3d2e1b4...8f9e0d1c2b3a
3

RFC 3161 Timestamp

The hash is sent to a trusted Timestamp Authority (TSA) that provides a legally-valid certificate proving when the evidence was created. This timestamp cannot be backdated or altered.

4

Blockchain Anchoring

The hash is anchored to the Polygon blockchain, creating a permanent, public record that exists independently of EchoLog. Even if our servers disappeared, your evidence proof would remain on the blockchain forever.

5

Chain Linking

Each new entry includes the hash of your previous entry, creating an unbreakable chain. If anyone tries to modify or delete a past entry, the entire chain would break, making tampering immediately detectable.

Public Verification

Anyone can verify the authenticity of evidence without accessing the actual content. This is crucial for legal proceedings where you need to prove evidence hasn't been tampered with.

Verification URL Format:

https://echolog.net/verify/[evidence-hash]

The verification page shows the timestamp, blockchain anchor, and integrity status without revealing any private content.

LGPD & GDPR Compliance

EchoLog is fully compliant with the Brazilian General Data Protection Law (LGPD) and the European General Data Protection Regulation (GDPR).

Your Rights

  • • Access your data anytime
  • • Export all your data
  • • Request data deletion
  • • Data portability
  • • Withdraw consent

Our Commitments

  • • End-to-end encryption
  • • No data selling, ever
  • • Minimal data collection
  • • Transparent processing
  • • Regular security audits

Technical Specifications

Hash AlgorithmSHA-256 (FIPS 180-4)
EncryptionAES-256-GCM
Timestamp StandardRFC 3161 (IETF)
BlockchainPolygon (Ethereum L2)
Key DerivationPBKDF2 with 100,000 iterations
TLS VersionTLS 1.3
Data CentersAWS (SOC 2 Type II certified)

Ready to Protect Your Evidence?

Start documenting with enterprise-grade security today.

EchoLog - Documentação Segura