Skip to content

Filed under: evidence that outlives its lawsuit

Sign documents that outlive the lawsuit.

Sign in, drop a PDF, and the work happens inside your portal. Seal for hybrid PQ signatures anyone can verify. Vault for hybrid PQ encryption only your named recipients can open. We never store the original document.

ECDSA + ML-DSA-65
Seal · signature
X25519 + ML-KEM-768
Vault · encryption
0 bytes
PDF storage
public · free
Verifier
tsa.live · monitor
SHA-256 · 0xa3f2…b1c4
PQC Shield
ecdsa: okml-dsa-65: oktsa: 03:50z

FIPS 204 · NIST PQC

Adobe Reader · valid signature

The problem

E-signatures verify today.
Evidence has to verify decades from now.

DocuSign and Adobe Sign prove a person agreed. They don't prove the bytes survived intact, that the timestamp is authoritative, that the signature still verifies after the underlying algorithm breaks, or that an opposing counsel can open a privileged document only after they prove who they are. PQC Shield is the integrity and confidentiality layer those tools don't cover.

  1. 2017

    SHA-1 collisions become practical.

    Documents signed with SHA-1 lose meaningful integrity guarantees. Anyone can forge a matching hash.

  2. 2024

    NIST publishes FIPS 204 (ML-DSA).

    The standardized post-quantum signature algorithm. Enterprises with 20+ year retention obligations now have a target.

  3. 2030–2035

    RSA-2048 and ECDSA P-256 enter the danger zone.

    Once a cryptographically relevant quantum computer exists, every document signed with classical-only crypto becomes contestable.

  4. 2045

    Your closing package is in court.

    If its signature was classical-only, the chain of custody is now a defense exhibit. If it was hybrid, it still verifies.

How it works

Sign in. Seal or Vault. Anyone verifies.

Two products, one workspace. Seal for court-defensible signatures (anyone can verify). Vault for encrypted documents that only the people you name can read. We retain hashes and audit metadata, never the original bytes.

Programmatic API access (POST /v1/seal, /v1/vault) ships from the Pro plan upward. The portal is the default surface — no API key required to seal or verify.

Sign in

Magic-link sign-in. No passwords.

Drop your work email, click the link, and you land in your tenant's portal. First sign-in provisions a workspace on the Free plan. NextAuth + email-based one-time links — no shared credentials, no SMS, no SSO setup.

auth · flow
POST /api/auth/signin/nodemailer  → magic link delivered GET  /api/auth/callback/...?token=…  ↳ creates user + tenant + role  ↳ session JWT (HS256)  ↳ redirect /app/dashboard

Seal · in your portal

Seal a PDF without leaving the dashboard.

Drag a PDF onto the dashboard. We embed a hybrid PAdES signature — ECDSA P-256 + ML-DSA-65 — and chain an RFC 3161 timestamp from a qualified TSA. You download the sealed PDF plus a Certificate of Sealing. We retain only hashes and audit metadata.

asn.1 · CMS
SignedAttributes {  contentType, messageDigest,  signingTime, signingCertificateV2}Signatures {  ecdsa-p256-sha256        // classical  ml-dsa-65                // FIPS 204}TSA: RFC 3161 token (qualified)

Vault · share confidentially

Encrypt for one or more recipients.

Use Vault when the document content is sensitive. We encrypt with AES-256-GCM and wrap the data key per recipient using a hybrid X25519 + ML-KEM-768 KEM. Recipients prove identity with an email OTP and decrypt in-browser. Every open is logged.

crypto · per envelope
DEK = AES-256 randomciphertext = AES-256-GCM(DEK, pdf) For each recipient:  shared = X25519_DH(eph_sk, rcpt_pk)  (kem_ct, kem_ss) = MLKEM768.Encaps(rcpt_pk)  KEK = HKDF(shared || kem_ss)  wrappedDEK = AES-256-KW(KEK, DEK)

Verify · public, free

Anyone can verify. No account required.

Send the sealed PDF to opposing counsel, an auditor, or a future judge. They drop it into our public verifier — we re-derive the digest, validate ECDSA + ML-DSA, and confirm the RFC 3161 timestamp. Free, on every plan, forever.

json · response
{  "valid": true,  "ecdsa": "ok",  "mlDsa": "ok",  "tsa":   "FreeTSA · 2026-04-28T03:50Z",  "sealId":     "01HX9F…",  "tenantHash": "bc8a…3f"}

Built for

The documents your grandchildren will need.

Title & escrow · Seal

Closing packages that survive 30-year title chains.

Real estate closings already require notarization. Seal the PDF of the closing package in your portal and the chain of custody is no longer a deposition exercise — it is a 60-second public verifier check.

Anyone verifies · free, no account

Legal counsel · Vault

Send privileged documents to opposing counsel.

Encrypt the deposition, expert report, or settlement draft for one or more named recipients. They prove identity with an email OTP, decrypt in-browser, and every open is logged in your audit trail. The bytes never leave your tenant un-encrypted.

Hybrid X25519 + ML-KEM-768

Long-retention contracts · Seal

Master agreements with 20-year terms.

Insurance, energy, infrastructure. The signature has to outlive the analyst who wrote it. Hybrid PQ keeps the seal defensible the day a cryptographically relevant quantum computer is announced.

Re-seal · scheduled rotation

Why it holds up

We picked the boring, defensible primitives.

None of this is research code. The algorithms are NIST-standardized, the formats are ISO-published, and the timestamp authorities are the same ones the EU's eIDAS regime relies on.

  • Hybrid by default

    Seal uses ECDSA P-256 + ML-DSA-65; Vault uses X25519 + ML-KEM-768 + AES-256-GCM. We pair classical with post-quantum on every operation so a break in either family alone never compromises the document.

  • Standards, not novelty

    PAdES on the PDF side, RFC 3161 on the timestamp side, FIPS 204 ML-DSA, FIPS 203 ML-KEM. Same algorithms NIST and the EU eIDAS regime are standardizing on. No proprietary envelope.

  • Hashes only — Seal

    We never persist the original sealed PDF. Audit records contain the hash, signature bytes, TSA token, and certificate URL. Your customers' documents stay on their disks.

  • Encrypted at rest — Vault

    Vault envelopes live in S3 encrypted with AES-256-GCM under a per-document data key, wrapped per recipient with a hybrid KEM. Recipient private keys are KMS-wrapped; Enterprise can BYOK to its own HSM.

  • Public verifier, free

    Sealed PDFs can be verified by anyone without a PQC Shield account. Vault open events are logged back to the sender's audit trail in real time.

  • Tenant-isolated

    Per-tenant key material in Postgres. Magic-link sign-in provisions a workspace; queries refuse to execute without a resolved tenant. No cross-tenant leakage by construction.

Pricing

Seal + Vault, metered separately. Verifier is free.

Full pricing details →

Free

$0/ mo

Kick the tires. Seal real evidence.

  • 10 Seal · 5 Vault sends / month
  • Hybrid ECDSA + ML-DSA + ML-KEM
  • Public verifier access
  • Certificate of Sealing PDF
  • Magic-link sign-in
Start free

Starter

$49/ mo

Solo lawyers, small title shops.

  • 100 Seal · 50 Vault sends / month
  • Up to 5 team members
  • Email support · 2 business days
  • 12-month audit log retention
  • No API access — portal only
Choose Starter

Pro

$299/ mo

Title companies, mid-size firms.

  • 1,000 Seal · 500 Vault sends / month
  • REST API + API key management
  • Rate limit 60 req/min/key
  • Indefinite audit log retention
  • Priority support · same-day
Choose Pro

Enterprise

Custom

ALTA partners, insurers, gov.

  • Custom Seal + Vault volumes
  • BYOK · bring your own KMS or HSM
  • Unlimited API rate · dedicated TSA
  • SAML SSO · BAA · SOC 2 in progress
  • Dedicated solutions engineer
Talk to sales

Questions we get a lot

The honest answers.

Start sealing

Your free workspace is one magic link away.

No credit card. Free tier covers 10 Seal + 5 Vault sends a month using the same hybrid post-quantum algorithms our Pro plan uses. The public verifier is free for everyone, forever — no account required.