Degrees and transcripts get a cryptographic signature at the point of issue. Employers drop in the PDF — four checks run, done.
The process
We hash it, sign it with the institution’s private key, and get a timestamp from an independent authority. The registrar never touches the key.
It sits in their dashboard. They can download it, email it, or hand someone a verification link. The proof is baked into the document itself.
Drop in the PDF or paste the document ID. Four checks run — integrity, authority, revocation, timestamp. A few seconds, no phone calls, no middleman.
Verification
Is the signature intact? Is the institution real? Has it been revoked? Does the timestamp check out? If anything is off, you know immediately.
Under the hood
No passwords anywhere in the system. Login is a hashed one-time code. Every private key is encrypted at rest and only decrypted in memory during signing.
Each institution gets its own keypair. When keys rotate, old public keys stay so historical documents still verify.
Private keys encrypted with a unique salt per institution. Never written to disk in plaintext, never sent over the wire.
Change one byte in the PDF and the hash is completely different. Tampering is mathematically obvious.
A third-party timestamp authority confirms when the document was signed. We don’t control that clock — no one does.