Built to be trusted
Immutis is security-first infrastructure. Every architectural decision is made to preserve the integrity and provenance of digital evidence against manipulation, regardless of who holds the data.
Security pillars
Hardware Attestation
Every capture is bound to a verified hardware identity via TEE (Trusted Execution Environment). Evidence cannot be produced by an unverified device.
Cryptographic Sealing
At the moment of capture, a cryptographic hash is computed and sealed inside the secure enclave. Any downstream modification invalidates the seal.
Zero-Knowledge Verification
Third parties can verify the integrity and provenance of evidence without ever accessing the underlying content. Privacy is preserved by design.
Data Isolation
Evidence data is stored within tenant-isolated environments using Supabase Row Level Security. No cross-tenant data access is architecturally possible.
Immutable Audit Log
Every interaction with evidence — capture, retrieval, verification — is logged to an append-only audit trail for forensic accountability.
Compliance Ready
Architecture is designed to meet GDPR, CCPA, and SOC2 Type II requirements. Data retention policies are configurable per jurisdiction.
Verification chain
Capture
Hardware-bound TEE records the event
Seal
Cryptographic hash locked in secure enclave
Anchor
Seal committed to forensic ledger
Verify
Any party can validate without data access
Compliance status
Security questions?
Our security team is available to answer technical due-diligence questions from enterprise buyers and compliance teams.
Talk to our security team