LogoVERITY VAULT
LIVE ON BNB CHAIN // ZERO-KNOWLEDGE PRIVACY


THE DECENTRALIZED VAULT FOR SENSITIVE DATA. MONETIZE LEAKS, JOURNALISM, IMAGES & INTELLIGENCE — ANONYMOUSLY, WITH CRYPTOGRAPHIC PROOF.

ENTER VAULT
ZK-SNARKS
AES-256
MERKLE PROOF
BNB CHAIN
CA:COMING SOON
SENDERWALLET0x7K8f...9mPqAMOUNT0.5 BNBFILEresearch_data.pdfENCRYPTIONAES-256-GCMPRIVATEZK-SNARK ENGINEPROOF GENERATIONCOMMITMENT SCHEMENULLIFIER HASHMERKLE TREE ROOTZERO-KNOWLEDGE WITNESSPROOF VERIFIEDVERIFIEDLATENCY: <3SCHAIN: BSCPRIVACY: 100%ON-CHAIN RESULTSENDERHIDDENAMOUNTHIDDENFILEHIDDENZK PROOFVALIDVERIFIED ON BSC

CORE

JOURNALISM & LEAKS

JOURNALISTS AND WHISTLEBLOWERS SUBMIT FIELD NOTES, DOCUMENTS, AND FOOTAGE. ZK PROOF OF PROVENANCE CONFIRMS AUTHORSHIP. SOURCE REMAINS SEALED FOREVER.

ZK PROOF OF AUTHORSHIP
AES-256-GCM ENCRYPTION
ANONYMOUS PAYMENT ROUTING
MEDIA

IMAGES & VIDEO EVIDENCE

UPLOAD HIGH-RESOLUTION IMAGES AND RAW FOOTAGE. GPS METADATA STRIPPED. SCENE AUTHENTICITY PROVEN VIA MERKLE COMMITMENT WITHOUT REVEALING THE SHOOTER'S LOCATION.

METADATA STRIPPING
GPS-PROOF WITHOUT LOCATION
FRAME-LEVEL MERKLE HASH
INTEL

HACKER INTELLIGENCE & LEAKS

RESEARCHERS AND THREAT ACTORS MONETIZE BREACH DATA, CREDENTIALS, AND ZERO-DAYS. SELLER ANONYMIZED VIA NULLIFIER HASH. BUYER IDENTITY PROVEN WITHOUT DEANONYMIZATION.

NULLIFIER-BASED ANONYMITY
ON-CHAIN DATA INTEGRITY
SELECTIVE DISCLOSURE

01
SHA-256 + MERKLE TREE

SEAL YOUR IDENTITY

YOUR FILE IS PROCESSED LOCALLY. ZK PROOF OF PROVENANCE IS GENERATED IN-BROWSER. YOUR IDENTITY IS NEVER TRANSMITTED — ONLY THE CRYPTOGRAPHIC PROOF.

02
PLONK PROOF SYSTEM

PUBLISH TO VAULT

THE ENCRYPTED FILE AND ZK PROOF ARE SUBMITTED ON-CHAIN. BUYERS CAN VERIFY AUTHENTICITY WITHOUT SEEING YOUR CONTENT OR IDENTITY.

03
AES-256-GCM ENCRYPTED

RECEIVE PAYMENT

WHEN A BUYER PURCHASES YOUR LISTING, PAYMENT IS AUTO-ROUTED TO YOUR ANONYMOUS WALLET. NO INTERMEDIARY. NO IDENTITY LEAKAGE.

[03] // BY THE NUMBERS
<3sPROOF VERIFICATION
100%SOURCE ANONYMITY
ZKCRYPTOGRAPHIC SECURITY
0.001BNB PER TRADE

SOURCE ANONYMITY
CRYPTOGRAPHIC PROVENANCE
BNB CHAIN SPEED (<3S)
ANONYMOUS PAYMENT ROUTING
ZK IDENTITY VERIFICATION
NO IDENTITY LEAKAGE
PAY-PER-USE PRICING
OPEN SOURCE & AUDITED

ZK COMMITMENT

SEALED SOURCE IDENTITY

JOURNALIST, WHISTLEBLOWER, OR RESEARCHER — YOUR WALLET ADDRESS IS NEVER LINKED TO YOUR SUBMISSION. ONLY ZK PROOFS ARE PUBLISHED ON-CHAIN.

NULLIFIER HASH

ANONYMOUS PAYMENTS

PAYMENT IS ROUTED DIRECTLY TO YOUR ANONYMOUS WALLET. NO EXCHANGE, NO KYC GATE, NO BANK REQUIRED.

AES-256-GCM

ENCRYPTED CONTENT

FILES ARE AES-256-GCM ENCRYPTED BEFORE UPLOAD. BUYERS RECEIVE THE DECRYPTION KEY ONLY AFTER CONFIRMED PAYMENT.

MERKLE PROOF

PROOF OF PROVENANCE

ZK PROOFS CONFIRM THAT THE DATA IS AUTHENTIC AND UNMODIFIED — WITHOUT REVEALING THE AUTHOR, DATE, OR LOCATION.

NULLIFIER CHECK

NO DOUBLE-SPENDING

NULLIFIER HASHES ENSURE EACH PIECE OF DATA CAN ONLY BE SOLD ONCE PER PROOF. BUYERS ALWAYS RECEIVE UNIQUE, UNTAMPERED CONTENT.

BNB CHAIN

INSTANT SETTLEMENT

BNB CHAIN FINALIZES IN SECONDS. WHISTLEBLOWERS AND RESEARCHERS RECEIVE PAYMENT IMMEDIATELY UPON VERIFIED PURCHASE.

PAY-PER-TRANSACTION: ONLY 0.001 BNB PER ANONYMOUS DATA TRADE. NO SUBSCRIPTIONS, NO HIDDEN FEES.

VerityVault is built for journalists who need to protect sources, whistleblowers submitting high-stakes documents, security researchers monetizing threat intelligence, photographers and videographers with sensitive evidence, and AI agents that need to autonomously purchase verified data. Anyone holding sensitive information that has monetary value — and needs to stay anonymous — can use the vault.

Your identity is never transmitted to our servers or stored on-chain. The ZK Proof of Provenance only commits a cryptographic fingerprint of your file. Your wallet address is the only identifier, and payment routing uses nullifier hashes to prevent any linkage between your on-chain activity and your real identity. There is no single point of identity leakage.

Buyers can verify the ZK proof on-chain before purchasing. The proof confirms: the file has not been tampered with (SHA-256 hash), the provenance chain is intact (Merkle root), the commitment is valid (PLONK ZK-SNARK), and the nullifier has not been reused. Full content is only accessible after payment — the decryption key is auto-released upon confirmed purchase.

VerityVault supports journalist field notes, investigative documents, raw video footage, photographic evidence, breach datasets, credential leaks, zero-day exploit code, threat intelligence profiles, whistleblower dossiers, and IoT sensor data with GPS provenance. Any file type (PDF, PNG, JPG, TXT) up to 10MB can be listed. Larger file support is on the roadmap.

VerityVault is a neutral infrastructure layer. Whether the data you are selling or buying is legal depends on your jurisdiction and the nature of the data. We provide the cryptographic tools for private transactions — we do not verify the legality of listed content. Users are responsible for ensuring compliance with applicable laws. VerityVault supports selective disclosure for regulated contexts.

STILL HAVE QUESTIONS?JOIN OUR DISCORD >

ENTER VAULT
OPEN SOURCE
AUDITED
NON-CUSTODIAL
BNB CHAIN