Receiz / FAQ

FAQ for teams, operators, and institutions.

Direct answers. Plain language. Full authority intact.

Receiz is a deterministic verification-and-settlement platform: original bytes are authoritative for verification, replayable ledger math is authoritative for settlement, and every trust claim is mapped to code and evidence artifacts.

Settlement authority is append-only ledger replay over persisted integer value fields and deterministic rate math.

The file verifies itself. Verify links (/v) are optional public convenience for that same file.

Flow: Record → Seal → Share → Verify.

The primitive

File-first model: file in, verdict out.

What is a receiz?

Receiz is a deterministic verification-and-settlement platform. Verification authority is the original file; settlement authority is replayable append-only ledger math. A verify link (/v) is optional public convenience for that same file.

What is authoritative for verification vs settlement?

Verification authority is original file bytes plus embedded verification material. Settlement authority is deterministic replay over persisted integer value fields and posting reference rate.

Is a receiz a file or a link?

Both. The file is the source of truth. Verify links (/v) are optional public convenience for that same file.

What is the "file"?

The file is the sealed file carrying embedded verification material. Depending on flow, it is a claim record, document/media artifact, or package file.

What is the minimum I need to share?

Share the file (or package ZIP). That is what verifies. Share the verify links (/v) only when optional public convenience is needed.

Settlement operations

Account settlement, offline notes, and deterministic replay under one contract.

How does settlement run end-to-end?

Deposit, transfer, reserve-note issue, and note-claim redemption all post append-only ledger events under one deterministic value contract.

Which fields are required for deterministic replay?

The canonical value tuple is `amountUsdCents`, `amountPhiMicro`, and `usdPerPhiMicrocents`. Replay and reconciliation depend on this tuple remaining present and unmodified.

How is custody value stored?

Custody is stored as integer Settlement Ledger Unit (SLU) micro values in `phi*` protocol field names (for example `amountPhiMicro` and `balancePhiMicro`) while account UI remains USD-readable.

What is an offline note?

A sealed portable settlement instrument (PNG, PDF, or JSON packet) issued from reserve value and redeemable later through verification + claim posting.

What prevents invalid or duplicate note redemption?

Claim routes validate packet authenticity and claim state before credit posting. Invalid token, invalid state, or already-claimed notes hard-fail with no settlement credit write.

How do private and public ledger views relate?

Private and public ledger routes keep the same value and proof semantics while differing only in identity visibility. Independent verification stays intact across both routes.

Where is settlement conformance evidence published?

Conformance publishes requirement rollups, source/runtime checks, revision anchors, and raw JSON artifacts for independent review.

Value, Φ, notes, and settlement shares

Settlement, reserve, notes, certificates.

What is settlement?

Settlement is proof-native value: completion resolved by the deterministic record. Send it, put it to work in Market, or issue shares into a certificate.

When do gains become reserve?

Funded market sales, certificate purchases, and funded events add reserve. Until then, gains stay priced, sendable settlement that issues into certificates.

How do settlement shares and notes work together?

Reserve builds ownership. Settlement shares issue into certificates. Use reserve proceeds to issue notes.

Why do notes issue from reserve?

Issue notes from reserve. Receive a note and receive funded value.

What do settlement shares do?

Settlement shares turn a position into a buyer-ready ownership object. Buyer gets the claim. Seller receives reserve.

What happens when only part of a sale is funded now?

Funded value posts to reserve. The rest remains settlement, ready to issue into shares for a buyer-funded purchase.

Verification model

What is checked, what fails, and why screenshots do not verify.

What exactly is being checked?

Verification checks whether embedded proof data still matches the file bytes and record fields. If anything changes, verification fails.

What fails if someone tampers with the file?

Tampering breaks bindings. Verification rejects. The file no longer matches the issued record.

Does verification run offline?

Yes. Verify runs fully offline. The offline verifier checks integrity locally with no network calls and enforces the same deterministic bundle checks.

Do Record, Seal, and Verify all work offline?

Yes. Record, Seal, and Verify all run offline. No account is required for offline operation.

Do users need an account for offline Record/Seal?

No. Account access is optional. It adds custody, public identity publishing, messaging, and billing tools, but is not required for offline Record, Seal, or Verify.

Why does trusted verification require signature v4?

Trusted verification requires signatureV4. It verifies canonical payload hash, root-key policy, device certificate chain, certificate validity window, and final payload signature. This hard-fail path blocks unsigned, out-of-policy, expired-cert, or tampered bundles.

Is verification paywalled?

No. Verification is public and free. Plans unlock authorship, custody, and business tools.

Accounts, custody, and plans

Verification stays public. Each paid layer adds one new operating unlock.

Do I need an account?

No. Record, Seal, and Verify do not require one. A free account opens your public identity, embeds, live work, and basic custody.

What does the dashboard store?

Sealed files in custody tools: Archive for your records, Received for opened external records with context.

What does Free include?

Free turns the work into a live demand surface.

What does Authorship unlock?

Authorship keeps authorship and custody attached to what is yours.

What does Business unlock?

Business moves the public close onto your domain.

What does Automation unlock?

Automation keeps follow-up going without waiting on you.

Where does white-label start?

White-label does not start in Business. It starts at Enterprise.

What is AssetSeal?

AssetSeal issues one verifiable origin record, then appends custody/authorship events without rewriting origin.

What happens if I cancel a paid plan?

Existing records remain valid and verifiable. Verification is never gated by plan. Paid-only controls revert until the plan is re-enabled.

Front door and discovery

How public identity expands without weakening the core trust model.

What does the live profile do?

It turns the profile into a live surface where people arrive in context and move into the next step.

How does discovery work?

Discovery reaches beyond the profile and keeps the same relationship moving after the first touch.

How do the live profile and discovery relate?

One starts the relationship. The other extends its reach without breaking the same identity and thread.

What problem do these solve?

They let people land in context and move straight to the right next step.

Do developers integrate or embed these entry points?

Yes. Public identity, messaging, streaming, and embed routes are documented on the Developers page.

Standards, settlement, trust, and developer references

Where to find schemas, settlement contracts, trust posture, status, and integration guides.

Where are schemas, error codes, and test vectors?

Use Standards for canonical schema boundaries, trusted signature v4 profile requirements, error contracts, and conformance vectors.

How should developers integrate sealing and verification?

Use Developers for endpoint contracts, offline record/seal/verify integration patterns, and trusted signature v4 verification policy details.

Where is claim-to-code traceability for settlement guarantees?

Use the Settlement Standard tables: Claim-to-Code Traceability, Guarantee Boundaries, and Conformance Controls. These map each trust claim to route/function sources and verification evidence.

Where is deterministic rate authority defined?

Use the Value Source Appendix for pulse authority, deterministic derivation procedure, persisted-field contract, and replay validation checks.

Where do institutions review trust posture and incidents?

Use Trust for policy posture and route links, then Status for live operational reliability.

Where do institutions review governance ownership and control evidence cadence?

Use Governance for control owners, mandatory approval paths, separation-of-duties policy, and published evidence-cadence artifacts.

Where do teams monitor production reliability signals?

Use Status for live route health and incident visibility.

Offline

Record, Seal, and Verify without account dependency.

What is Offline Studio?

Offline Studio is the standalone on-device runtime for Record, Seal, and Verify. It generates verifiable artifacts locally and preserves original file format behavior for sealing flows.

Do Record, Seal, and Verify all work offline?

Yes. Record, Seal, and Verify are all offline-capable. Verification remains deterministic from file bytes, and does not require a network call.

Is an account required for offline operation?

No. Account access is optional and not required for offline Record, Seal, or Verify.

What does an account add if offline already works?

Accounts add authenticated authorship, custody tools (Archive and Received), public identity publishing, messaging, team collaboration, and ownership controls.

Why does a fresh device need one online open before offline Record/Seal?

Trusted signing material is provisioned to the device. Once provisioned, the offline runtime keeps issuing trusted offline Record and Seal outputs on that device.

Where do I verify fully offline?

Use the Offline Verifier HTML. It is the canonical offline verification reference and runs locally without account access.

How to use

Simple flow: Record Moment, Seal File, Share, Verify.

How do I use Record Moment or Seal File?

Use Record Moment (/record) for moment claims, or Seal File (/seal) for files/folders. Keep returned file bytes unchanged.

What formats does Seal support?

Yes. Receiz supports common document/media formats, generic binaries, and package/folder flows.

How do I verify?

Verify from file bytes, online or offline. Matching files verify; altered copies fail.

What if I only have a screenshot?

Screenshots fail. Originals verify. A screenshot does not carry embedded verification material.

Login with Receiz ID (passkey + email)

Passwordless sign-in behavior for users and integrators.

What is Login with Receiz ID?

Receiz ID is passwordless account access. Passkey (WebAuthn) is default, and email magic-link is fallback or alternate login method. Both methods resolve to one account identity, and that identity continues across every Receiz experience, your domain, external apps, and real-world entry points using Receiz Connect.

Do users need an account before signing in?

No. If a user is new, Receiz automatically creates the account on first successful passkey or magic-link login.

Does passkey-only work without email?

Yes. Passkey-only onboarding is supported. Email is added later when needed, and magic-link then resolves to the same Receiz account.

If a user already uses email magic-link, what happens when they use passkey later?

After they connect passkey from Account settings, passkey and email sign in to the same account. The two methods do not create separate users.

If a user starts with passkey, what happens when email is added later?

Yes. Once email is linked to that profile, future magic-link sign-ins route to the same Receiz identity.

What happens in send-receiz email flows when the recipient clicks and signs?

Receiz signs the recipient in via magic-link. If the recipient is new, Receiz creates the account during that flow. After signing, they use passkey or email to access the same account.

How should developers map app users when integrating Login with Receiz?

Map local users by OIDC `sub` (stable subject). Treat email as mutable profile data. This prevents identity split when users switch between passkey and email.

Where do developers configure Login with Receiz?

Create and manage OIDC clients in Receiz Connect, then implement Authorization Code flow with PKCE using discovery metadata.

WireProof (Automation) and API

Automation answers for finance / ops teams and technical buyers.

What is WireProof?

WireProof is one included automation for payment proof: a sealed file plus verifier URL or QR.

What does Automation unlock for WireProof?

Automation adds what payment proof needs at scale: APIs, webhooks, structured claims, batch issuance, delegated issuers, org archive/export, and higher-volume execution. Verification stays public.

Do we need FaceID/TouchID signing?

No. Signing is optional and used when teams need human-origin witness attestations.

Does a demo run without signing in?

Yes. Unsigned demo flows are available. Signed and advanced controls require account + plan entitlement.

Advanced plan details

Use this section to compare plan layers in real workflows

Authorship control set

What Authorship changes

Authorship, acknowledgment, and custody in one workflow
Prove you authored the original

PresenceBound owner signing binds your account to the exact original hash and signed timestamp.

Prove the counterparty received it

After owner sign-off, send receiver invites by email. Their passkey signature acknowledges that same exact original.

Multi-recipient workflow built in

Send comma-separated invites to up to 100 recipients in one request, each with their own signing slot.

Signer evidence you can keep

Dashboard records signer details, PBI receipt hash, signed time, and downloadable receiver-signed originals.

Authorship across real workflows

Use owner and receiver signatures for invoices, delivery milestones, payouts, transfer approvals, and custody handoffs.

Origin + custody continuity

Attach identity, co-signers, and claim threads, then append AssetSeal custody events without rewriting history.

Custody trail you can audit

Every handoff stays append-only, so you can prove who held what, when, and under which accepted terms.

Interactive workflow map

Creator-proof + custody + receiver-signoff across common workflows

15 broad workflow tracks with role-level examples

Authorship gives you two strong proofs in one system: creator-proof (you authored the original) and receiver-signoff (the other party acknowledged that exact original). Custody links both into one append-only continuity record. Choose a workflow track and role to see how it applies across broad categories of work.

Workflow track
Client Services & Owner-Led Teams

In Client Services & Owner-Led Teams, work and payments move fast. This keeps one clear record of who made the original, who received it, and who approved it.

Freelancer can use this to cut arguments, speed up approvals, and get paid faster.

Creator-proof

Freelancer / Solo Creator

You made it. You signed it. The original is clearly yours.

No confusion about who created the file that was sent.

Custody

Freelancer / Solo Creator

Each handoff is saved in order, start to finish.

Custody logs each client handoff and acceptance event so you can show continuity from creation to payment resolution without chasing email trails.

You can show who had it first, who had it next, and when.

Receiver-signoff

Freelancer / Solo Creator

You sent it. They tapped Sign. Acknowledgment is now clear.

No one can honestly say they never received that same file.

How this applies right now

Use all three together to reduce non-payment, “wrong version,” and “never received” claims.

You finish the work and sign the original with Face ID.
You send that same file. They tap Sign to confirm acknowledgment.
Each handoff is saved in order, so custody is clear.
If there is a dispute later, one record settles it quickly.

Fraud + cash-flow reality

Why authorship and custody save money

Real reported figures, mapped to day-to-day operations

For owner-led teams and operating businesses, disputes are rarely just legal risk. They are cash-flow delays, rework time, and margin loss. Authorship reduces this by combining creator-proof, custody continuity, and receiver-signoff into one verifiable record.

5%

Estimated revenue lost to occupational fraud each year

Even a small share of disputed payouts, rework, or chargebacks can erase margin fast for freelancers and owner-led teams.

Source: ACFE Fraud Week 2024
$145,000

Median loss per occupational fraud case

Independent proof of authorship, custody, and acceptance helps reduce high-cost dispute escalations before they become full losses.

Source: ACFE 2024 Key Findings
$16.6B

Internet crime losses reported in 2024

Business Email Compromise alone reached $2.77B in reported losses, which reinforces the need for verifiable transaction evidence.

Source: FBI IC3 2024 Report
56%

Small businesses report outstanding unpaid invoices

Average unpaid balance was $17,500 and invoices took 45.6 days to get paid, so faster dispute resolution directly protects cash flow.

Source: Intuit QuickBooks 2025 Research
Independent operators

Use creator-proof to defend delivered work, custody to show handoff history, and receiver-signoff to speed up payment release.

Operating teams

Replace scattered email trails with one verifiable transaction continuity record, reducing time spent on “who sent what” disputes.

Scaled organizations

Keep acceptance and custody evidence audit-ready so finance, legal, and ops can resolve issues faster with lower write-off risk.

AI fake reality

Receiz is a category, not a feature.

Built for the AI-authenticity era, not pre-AI assumptions

AI-generated content makes “looks real” insufficient. The durable standard now is process proof: who authored the content, how custody moved, and who acknowledged that exact content.

Category definition

Receiz defines Verified: a digital file that remains independently verifiable online and offline, is bound to passkey-backed authorship and receiver-signoff, and carries append-only custody continuity.

This is not another detector, signer, or dashboard log. It is foundational proof infrastructure for modern digital operations.

Synthetic content is cheap to produce

AI can generate convincing files, messages, and documents fast, so visual plausibility is no longer enough.

Single-signal proof breaks easily

A timestamp alone, a signature alone, or a portal log alone is usually not enough when disputes escalate.

Future disputes will be continuity disputes

The winning record will be the one that proves authorship, custody, and recipient acknowledgment together.

Email threads, screenshots, and PDFs

Weak
What it tries to prove

Shows that something was sent or shared.

Where it breaks

Easy to edit, forward out of context, or dispute as a representation instead of an original.

Receiz advantage

Receiz binds creator-proof, custody, and receiver-signoff to one verifiable file.

Best fit

Basic communication history only.

Cloud timestamps and file metadata

Weak
What it tries to prove

Shows file activity in a storage system.

Where it breaks

Not enough by itself to prove recipient acceptance or full handoff continuity across parties.

Receiz advantage

Receiz adds explicit acceptance evidence and append-only custody events beyond storage metadata.

Best fit

Internal file operations.

E-signature platforms

Partial
What it tries to prove

Good for formal document signing workflows.

Where it breaks

Often document-centric; less suited to ongoing custody continuity and operational record handoffs.

Receiz advantage

Receiz is built for recurring operational proof with coordinated authorship + custody + acknowledgment.

Best fit

Contract execution moments.

Watermarks and branded exports

Weak
What it tries to prove

Adds visible branding or origin hints.

Where it breaks

Visual markers can be copied, cropped, or faked; they do not prove recipient signoff or custody timeline.

Receiz advantage

Receiz verifies the original by exact bytes and tracks who signed and when.

Best fit

Deterrence, not high-confidence proof.

Hash-only timestamping

Partial
What it tries to prove

Proves some data existed at a point in time.

Where it breaks

Does not inherently prove human authorship identity, recipient acknowledgment, or business context.

Receiz advantage

Receiz layers business-readable context and signer identity workflows on top of integrity proof.

Best fit

Existence proof baseline.

AI detectors and deepfake scoring

Weak
What it tries to prove

Estimates whether content looks synthetic.

Where it breaks

Probabilistic and contested; not a robust acceptance or authorship record for settlement disputes.

Receiz advantage

Receiz is evidence-of-process, not just detection-of-content.

Best fit

Triage signals, not final proof.

Portal logs / ERP audit entries

Partial
What it tries to prove

Shows internal system actions.

Where it breaks

Hard to share externally and often not portable as independent evidence across counterparties.

Receiz advantage

Receiz produces portable proof files that travel outside your stack and still verify.

Best fit

Internal operational tracking.

Receiz category: Verified

Strong
What it tries to prove

Defines a new primitive: digital files that verify online/offline, with passkey-backed authorship, custody continuity, and receiver acknowledgment.

Where it breaks

Requires teams to treat proof as core operational infrastructure, not optional afterthought.

Receiz advantage

Unifies integrity, identity, acceptance, and custody into one portable record that stands outside any single portal or vendor dashboard.

Best fit

High-stakes delivery, payment, transfer, settlement, and audit workflows.

Bottom line
  • AI makes content easier to fake, so proof must be process-based, not appearance-based.
  • Receiz introduces a category-level primitive for original digital proof, online and offline.
  • Passkey-backed authorship + receiver-signoff + custody continuity is the new operational baseline.
  • That baseline reduces dispute time, protects cash flow, and lowers write-off risk across industries.

Government + institutions

Pressing record-integrity problems and how Receiz handles them

8 high-risk sectors

This is the practical layer: where records fail, how fraud allegations form, and how a verifiable file with passkey-backed authorship, receiver signoff, and custody continuity reduces ambiguity.

Select sector
Election Administration

Election trust fails when record handoffs are unclear. Receiz secures the records around the process.

Receiz does not replace voting machines or tabulation. It secures custody and signoff records around them.

Election fraud claims after missing handoff proof

Where it breaks

Ballot, seal, media, and results records move across teams with fragmented logs and no shared continuity record.

Receiz method

Each transfer record is signed by sender and receiver with append-only custody continuity on the exact original.

Operational result

Allegations can be reviewed against one verifiable record set instead of conflicting screenshots and emails.

Result packet disputes between precinct and county

Where it breaks

Time, sender, and packet integrity are hard to prove when records are copied across systems.

Receiz method

Receiz binds the original packet hash, signer identity, and transfer timeline into one portable file.

Operational result

Faster reconciliation and stronger confidence in transmission integrity.

Observer and incident log disagreements

Where it breaks

Manual logs can be edited or disputed after the fact.

Receiz method

Incident records are authored, received, and custody-tracked as immutable originals.

Operational result

Clearer audit review and reduced ambiguity in post-election incident handling.

Buyer FAQ

Questions buyers ask before upgrading

Clear answers by category so you can decide fast.

Plan & Access
What does Free include?

Free includes public verification, a live profile that can qualify, book, and collect, website embeds, scheduling, communications, basic Receiz Payments links, basic Archive/Received views, and saved defaults.

Do I need Business for live work, calendar, communications, or payments?

No. Those public surfaces stay open on Free. Business adds the business tools around them: custom domain connection, routing, Receiz Payments controls, staff workflows, and analytics.

What changes when I upgrade?

Authorship adds proof and custody controls: owner and receiver passkey signing, co-signers, claim threads, private visibility controls, AssetSeal custody, and verified-owned profile showcase. Business adds guided custom domain connection, routing, Receiz Payments controls, team handoff, business blocks, and analytics. Automation includes Business and adds the operating system: API/webhooks, structured claims, batch issuance, delegated issuers, org archive/export, and included automations such as WireProof. Enterprise is where white-label and org governance begin. Verification remains free.

Does upgrading change old originals?

No. Existing originals stay valid. Upgrade affects what you can attach and do on new or updated records.

How do Authorship, Business, and Automation differ?

Authorship is proof control: authorship, signatures, claim continuity, provenance, and custody. Business adds the customer-facing operations layer: domain control, routing, Receiz Payments controls, staffing, and analytics. Automation is the active operating tier: it includes Business, then adds the broader operating system with API/webhooks, structured claims, batch issuance, delegated issuers, org archive/export, and included automations such as WireProof.

Can I start on Authorship or Business and move up later?

Yes. Upgrades are additive. You can start with Authorship for proof control, move to Business when inbound demand becomes real operations, and move to Automation when you need the system to carry motion forward. Existing originals, signatures, and archive history remain intact.

Where does white-label start?

White-label does not start in Business. Business keeps a Receiz trust mark on the surface. White-label starts at Enterprise.

How fast does access update after checkout?

Access syncs automatically after successful checkout and session refresh.

Signing & Anti-Fraud
Do recipients need a paid plan to sign?

No. Recipients only need the invite magic link and a supported passkey device/browser to complete signing.

If a recipient has no account, can they still sign?

Yes. Clicking the invite magic link creates their account automatically (if needed), signs them in, and opens the original.

Can I send to multiple recipients in one shot?

Yes. Send comma-separated emails; one request supports up to 100 invited signers.

Do I need to sign first before sending invites?

Yes. Owner signature happens first, then receiver invites become available for that exact sealed file.

What does owner authorship prove?

It proves your account signed the exact original hash with a passkey ceremony at a specific time.

What does receiver sign-off prove?

It proves the counterparty acknowledged that same exact original, not a changed screenshot or rewritten payload.

What evidence do I get after someone signs?

You get signer metadata, PBI receipt hash, signed timestamp, and a downloadable signed original in your dashboard.

Verification & Privacy
Does verification become paywalled if I upgrade?

No. Verification stays public and free. Paid tiers add proof control, business operations, and automation, but they do not paywall verification.

Are screenshots valid for verification?

No. Verification is for originals. Screenshots and altered copies fail by design.

Do I need an account to verify?

No. Anyone can verify publicly without a paid plan.

Can I keep records private?

Yes. Authorship supports private saved originals and private custody event access while preserving public verification behavior.

Billing
Can I cancel any time?

Yes. Monthly and yearly plans can be managed from billing; cancellation does not remove already issued originals.

Next step

Choose the path.

Start from the file, open a live surface, or move the relationship onto your domain.

Start with the record