One Platform for
Everything You Publish
Articles, photos, podcasts, video, websites, ads, live streams. Cryptographic provenance built on the C2PA standard we co-authored, with watermarking designed for EU AI Act compliance. Free for every publisher.
Content Provenance Stack
Six layers from signing through licensing. Built on C2PA with proprietary watermarking across 31 media formats.
Core Capabilities
Protect, verify, and monetize every content format you produce.
Sign Every Format You Publish
Articles, photos, podcasts, video, PDFs, websites, live streams. One API handles all of them. Composite signing bundles an entire article package into a single provenance unit, so the hero image, podcast clip, and written piece share one verifiable chain of custody.
Watermarks That Survive Everything
Invisible text embeddings survive copy-paste, scraping, and CMS rendering. Audio and video watermarks survive transcoding, compression, and format conversion. Image watermarks survive cropping and resizing. Together they satisfy the EU AI Act proposed multilayered marking requirements.
Free Verification for Anyone
Any journalist, court, compliance team, or AI company can verify any signed asset at no cost through the public API. Quote integrity verification checks whether AI-generated citations match your original signed content.
From Detection to Licensing
Attribution analytics show where your content appears across the web. Formal notices establish willful infringement. Evidence packages hold up in court. The pipeline works across articles, images, audio, and video.
Rights at Every Level
Publisher rights profiles, licensing terms, and usage policies travel with content. Per-segment rights let you license one section of an article under Creative Commons while keeping another exclusive. AI companies resolve rights programmatically before ingestion.
Coalition Licensing
Auto-enrolled in the Encypher Coalition. Every format you sign is indexed for licensing deals. Publishers keep the majority of revenue on every deal.
Encypher co-chairs the C2PA Text Provenance Task Force and implements the standard across all media. Building content authenticity together.
Strengthens Your Existing Stack
Content provenance is not a replacement for access control or attribution tools. It is the layer that makes them enforceable.
Access Control
Tell AI crawlers not to scrape. These tools work at the server level, but only when AI companies respect your directives.
When crawlers ignore these signals, content-level provenance provides the evidence that your terms were attached and violated.
Content Provenance
Proof of ownership embedded in the content itself. Articles, photos, audio, video, websites. Works whether AI companies cooperate or not.
Attribution & Monetization
Estimate which sources contributed to AI outputs and route revenue to publishers. These tools work inside opted-in ecosystems.
Cryptographic proof of origin makes attribution claims verifiable, not just statistical estimates.
Standards and Frameworks Compatible
Built for Developers
One API call to sign. One API call to verify. Production-grade SLAs for every scale.
API Specifications
Production-grade infrastructure with documented limits and uptime guarantees.
10K / min (Ent.)
REST API
Full-featured REST API with Python, TypeScript, Go, and Rust SDKs. Batch endpoints for archive workflows.
Integrations
Drop-in plugins for existing workflows. Kafka event streaming for high-throughput pipelines.
- WordPress plugin
- Prebid RTD module (ad-tech)
- CDN edge integrations
- GitHub Action + CLI
- OpenAPI 3.1 spec included
Documentation
Comprehensive guides, API reference, and interactive playground for testing before you commit.
- Quick-start guide
- Full API reference
- Interactive playground
- Publisher integration guide
- Archive signing cookbook
Why Encypher
The only platform covering articles, photos, audio, video, and websites under one provenance infrastructure.
| Capability | Encypher | Alternatives |
|---|---|---|
| Articles, photos, audio, video, websites, ads, live streams | Text-only or image-only tools | |
| Watermarks survive transcoding, compression, and format conversion | Fragile metadata stripped by platforms | |
| Co-authored the C2PA standard we implement | Third-party implementations of standards others wrote | |
| Composite signing: one provenance unit per article package | Separate, unlinked signing per file | |
| Court-ready evidence packages with cryptographic chain of custody | Basic detection reports | |
| Free signing for every publisher, paid enforcement add-ons | Per-document fees from day one |
Start Protecting Your Content Today
Sign articles, photos, podcasts, and video at no cost. Add enforcement tools when you are ready to license. Enterprise plans for unlimited volume and dedicated support. Read our guide to content provenance verification.