Sovereign Architecture

Sovereign

A local-first architecture for creator intellectual property protection. Cryptographic identity, file lineage, and verifiable authorship proof — without the cloud.

All systems local
$ init integrity-engine provenance engine ready ✓ $ connect vault.db sqlite connected ✓ provenance log: append-only ✓ $ mount watchers 2 roots found ✓ file watchers engaged ✓ $ init provenance-engine 8 files indexed ✓ SHA3-256 fingerprint engine loaded ✓ verification pipeline ready ✓ ■ ■ ■ $ init integrity-engine provenance engine ready ✓ $ connect vault.db sqlite connected ✓ provenance log: append-only ✓ $ mount watchers 2 roots found ✓ file watchers engaged ✓ $ init provenance-engine 8 files indexed ✓ SHA3-256 fingerprint engine loaded ✓ verification pipeline ready ✓ ■ ■ ■

If you make it, Sovereign protects it.

You should not need a law degree to prove you made something. Drop your files in a folder. Sovereign handles the rest.

🎵
Musicians & Songwriters
Protect demos, stems, lyrics, and masters before they leave your hard drive. Every version timestamped. Every revision recorded. Prove the song was yours before the split sheet existed.
🎨
Visual Artists & Illustrators
Your work gets scraped, reposted, and fed into AI models. Sovereign embeds a watermark that survives screenshots and stripping, and keeps a provenance trail from first sketch to final piece.
📷
Photographers
Metadata gets stripped the moment your image hits social media. The frequency watermark lives inside the pixels — it survives resizing, recompression, and format conversion.
✍️
Writers & Content Creators
Manuscripts, blog drafts, scripts, research. Every save is fingerprinted. If someone publishes your work before you do, the provenance log proves you had it first.
⚖️
IP Lawyers & Legal Teams
The proof bundle is built for you. SHA3-256 fingerprint, hash-chained timeline, self-verifying script. Hand it to opposing counsel. They run one command and see the evidence.
🎬
Filmmakers & Producers
Protect pre-release cuts, raw footage, storyboards, and scripts. Full archive mode preserves every version so you can prove the creative timeline from concept to delivery.

Six stages. Seven if you enable Full Archive. Zero cloud.

Every file you protect passes through a six-stage pipeline — fingerprinted, watermarked, logged, and verified. With Full Archive enabled, a seventh stage preserves every version. Entirely on your machine.

01 — INTAKE

File Intake

Digital file enters the system through the vault watcher or manual import.

02 — INTEGRITY

Integrity Engine

File validation, format detection, and integrity baseline established.

03 — IDENTITY

SHA3-256 Fingerprint

Quantum-resilient cryptographic hash. Deterministic and independently verifiable.

04 — WATERMARK

Dual Watermark

Metadata embed plus frequency-domain watermark surviving stripping and recompression.

05 — LOGGING

Provenance Record

Append-only event log with hash chain. Every action recorded. Nothing overwritten.

06 — EXPORT

Proof Bundle

Portable verification package anyone can independently confirm.

07 — ARCHIVE (OPTIONAL)

Full Archive

Versioned backup of every file state. Recoverable history for files that change over time.

DO NOT TRAIN

Do Not Train

Mark any file as off-limits for AI training. The flag and its full history are logged in the provenance chain.

PORTABLE

USB Deployment

Runs entirely from a USB stick. No install. No admin rights. Air-gapped protection on any Windows machine.

One engine. Complete verification.

Every file gets fingerprinted, watermarked, logged, and verified through a single deterministic pipeline — no external dependencies.

Sovereign application dashboard showing provenance engine, file protection table, live provenance stream, and file evidence panel

Five layers of proof. Any one is enough.

Redundant authorship evidence. Each layer independently supports a claim — together they're comprehensive.

01

Embedded Watermark

Authorship metadata written directly inside the file (ID3 for audio, EXIF for images)

02

Frequency-Domain Watermark

Authorship evidence embedded in DCT coefficients — survives metadata stripping, resizing, and recompression

03

Cryptographic Fingerprint

Quantum-resilient SHA3-256 identity — tamper-proof, independently verifiable by anyone

04

Append-Only Provenance Log

Immutable timeline of every event from creation through all modifications

05

Portable Proof Bundle

Self-contained verification package for independent third-party confirmation

One bundle. Complete proof.

Everything a third party needs to independently verify authorship — no access to the original system required.

PROOF BUNDLE CONTENTS
Your original file
The protected file itself, included for verification
#
fingerprint.txt
SHA3-256 cryptographic identity hash
{
provenance_export.json
Full provenance chain with timestamps and hash links
provenance_report.pdf
Human-readable provenance report for legal or dispute use
chain_hash.txt
Tamper-evidence hash of the entire provenance log
verify.py + verify.bat
Self-verification script — Python 3, zero dependencies. Run it and know.

Sovereign doesn't control what happens after a file is shared — it ensures you can always prove its origin.

What the alternatives actually offer.

Most IP protection tools require cloud accounts, subscriptions, or blockchain wallets. Sovereign runs on your machine with zero dependencies.

Feature Sovereign ScoreDetect Digimarc TruePic Email / Cloud
Works offline Yes No — cloud required No No No
No account required Yes Account required No No No
One-time purchase $24.99 once Subscription Subscription Subscription Free
Proof survives if company shuts down Yes — self-contained No — certificates die No No No
Self-verifying proof verify.py — zero dependencies Requires their platform No No No
Frequency watermark Yes — survives stripping No Yes No No
Quantum-resilient hash SHA3-256 Standard hash No No No
Hash-chained timeline Yes Blockchain timestamp only No No No
Runs from USB Yes — air-gapped No No No No
Data stays on your machine Always Cloud + blockchain Cloud Cloud Third-party servers
Unlimited protections Yes — no per-file fees 100/month then $0.11 each Enterprise pricing Enterprise pricing Unlimited
Designed for solo creators Yes Enterprise focus Enterprise Enterprise Anyone

Built for any machine.

0
Cloud dependencies
0
GPU required
Tauri v2
Rust + React
SQLite
Local single-file DB

One-time purchase. No subscription.

Buy it once. Own it forever. Your proof doesn't expire when a subscription does.

Starter
$24.99
Get started protecting your work
  • 1 vault
  • 20 protected files
  • SHA3-256 fingerprinting
  • Dual watermarking
  • Proof bundle export
 
COMING SOON
Expand
$14.99
Add another vault to your setup
  • +1 additional vault
  • 20 files per vault
  • All Starter features
  • Stacks with existing license
per vault
COMING SOON
Unlimited Upgrade
$99.99
For existing customers with 3+ vaults
  • Upgrade to unlimited
  • Replaces current license
  • All Unlimited features
  • Rewards early adopters
requires 3 vaults owned
COMING SOON

Get notified when Sovereign is available for purchase.

FAQ

Common questions.

How does Sovereign protect my creative work?+
Sovereign fingerprints every file with SHA3-256, embeds a frequency-domain watermark that survives screenshots and metadata stripping, logs every event in a hash-chained timeline, and exports a proof bundle anyone can verify by running one Python script.
Does it need an internet connection?+
No. Everything runs on your machine. Sovereign works air-gapped from a USB stick on any Windows machine. No cloud, no account, no login.
What is a proof bundle?+
A ZIP file containing your original file, its SHA3-256 fingerprint, the full provenance chain, a human-readable PDF report, a tamper-evidence hash, and a self-verification script. Hand it to a lawyer or opposing counsel — they run one command and see the evidence.
What file types does it support?+
Images (JPG, PNG, TIFF, WebP), audio (WAV, MP3, FLAC, M4A), video (MP4, MOV), documents (PDF, DOCX, TXT, MD), and more. Each format gets appropriate watermarking — frequency-domain for images, ID3 for audio, container metadata for video, sidecar files for everything else.
Is it a subscription?+
No. One-time purchase. Starter is $24.99 for one vault with 20 files. Unlimited is $149.99 for unlimited vaults and files. Your proof never expires.
What makes SHA3-256 better than SHA-256?+
SHA3-256 uses the Keccak sponge construction, which is structurally different from SHA-256 and provides stronger resistance against future quantum computing attacks. Your proof needs to hold up years from now — SHA3-256 ensures it will.

Public Record

The Sovereign architecture is documented through a defensive publication and public repository.

Sovereign is a local-first architecture for creator-side authorship verification through cryptographic identity, provenance tracking, and quantum-resilient fingerprinting. A project by Alterna Axiom Labs.