News listSuccinct launches iPhone app to cryptographically verify photos
CoinTelegraph2026-04-24 10:44:11

Succinct launches iPhone app to cryptographically verify photos

AI Impact AnalysisGrok analyzing...
📄Full Article· Automatically extracted by trafilatura2192 words
How the Zcam application works. Source: Succinct According to Succinct, the app works by hashing raw image data and signing it using keys generated inside Apple’s Secure Enclave, a hardware-based security module. The resulting signature, along with capture metadata and attestation, is embedded into the file using the Coalition for Content Provenance and Authenticity (C2PA) standard, a framework for attaching tamper-evident provenance data to digital media. Standards such as C2PA are designed to establish the origin and edit history of digital content by embedding signed provenance metadata into files. According to the C2PA, its open technical standard lets publishers, creators and consumers establish the “origin and edits” of digital content. It allows users to record how the content was created, which tools were used and how it changed over time. Related: Spain seizes crypto cold wallets in illegal manga piracy raid The launch pushes Succinct’s applied cryptography work beyond blockchain infrastructure and into media provenance, as companies look for ways to authenticate digital content at creation rather than rely only on after-the-fact AI detection tools. The launch comes as security concerns in crypto increasingly include AI-driven fraud. On Thursday, blockchain security firm CertiK warned that deepfakes, phishing attacks and AI-assisted social engineering are likely to drive some of the largest crypto hacks in 2026. The report highlighted how attackers are using convincing synthetic media to deceive users and bypass security checks. Succinct said Zcam is an early step toward broader adoption of cryptographic provenance tools, which could be used in areas such as journalism, insurance claims and identity verification, where trust in digital media is increasingly critical. The company acknowledged limitations in its current implementation, noting that the Zcam software development kit is unaudited and not production-ready. It also said secure enclaves have been compromised in the past and that ensuring a fully tamper-proof capture-to-signing process remains an active area of research. Magazine: AI-driven hacks could kill DeFi — unless projects act now
Data Status✓ Full text extractedRead Original (CoinTelegraph)
🔍Historical Similar Events· Keyword + Asset Matching3 items
💡 Currently matching via keywords + symbols (MVP) · Will be upgraded to embedding semantic search later
Raw Information
ID:763da08131
Source:CoinTelegraph
Published:2026-04-24 10:44:11
Category:General · Export Category neutral
Symbols:Unspecified
Community Votes:+0 /0 · ⭐ 0 Important · 💬 0 Comments
Succinct launches iPhone app to cryptographically verify photos | Feel.Trading