Receiz / FAQ

FAQ for teams, operators, and institutions.

Direct answers with Full Spec boundaries intact. Language stays plain while verification, policy, and trust posture stay canonical.

The file verifies itself. Verify links (/v) are optional public convenience for that same file.

Flow: Record → Seal → Share → Verify.

The primitive

File-first model: file in, verdict out.

What is a receiz?

Receiz is a verification primitive with one authoritative artifact: the file. A verify link (/v) is optional public convenience for that same file. Verification is public and deterministic.

Is a receiz a file or a link?

Both. The file is the source of truth. Verify links (/v) are optional public convenience for that same file.

What is the "file"?

The file is the sealed file carrying embedded verification material. It can be a claim record, document/media artifact, or package file depending on flow.

What is the minimum I need to share?

Share the file (or package ZIP). That is what verifies. Share the verify links (/v) only when optional public convenience is needed.

Offline

Record, Seal, and Verify without account dependency.

What is Offline Studio?

Offline Studio is the standalone on-device runtime for Record, Seal, and Verify. It generates verifiable artifacts locally and preserves original file format behavior for sealing flows.

Do Record, Seal, and Verify all work offline?

Yes. Record, Seal, and Verify are all offline-capable. Verification remains deterministic from file bytes, and does not require a network call.

Is an account required for offline operation?

No. Account access is optional and not required for offline Record, Seal, or Verify.

What does an account add if offline already works?

Accounts add authenticated authorship, custody surfaces (Archive and Received), profile publishing, messaging, team collaboration, and ownership workflows.

Why can a fresh device need one online open before offline Record/Seal?

Trusted signing material is provisioned to the device. Once provisioned, the offline runtime can keep issuing trusted offline Record and Seal outputs on that device.

Where do I verify fully offline?

Use the Offline Verifier HTML. It is the canonical offline verification reference and runs locally without account access.

How to use

Simple flow: Record Moment, Seal File, Share, Verify.

How do I use Record Moment or Seal File?

Use Record Moment (/record) for moment claims, or Seal File (/seal) for files/folders. Keep returned file bytes unchanged.

Can I seal MP3, video, PDF, or folders?

Yes. Receiz supports common document/media formats, generic binaries, and package/folder flows.

How do I verify?

Verify from file bytes, online or offline. Matching files verify; altered copies fail.

What if I only have a screenshot?

Screenshots fail. Originals verify. A screenshot does not carry embedded verification material.

Verification model

What is checked, what fails, and why screenshots do not verify.

What exactly is being checked?

Verification checks whether embedded proof data still matches the file bytes and record fields. If anything changes, verification fails.

What fails if someone tampers with the file?

Tampering breaks bindings. Verification rejects because the file no longer matches the issued record.

Can verification run offline?

Yes. Verify runs fully offline. The offline verifier checks integrity locally with no network calls and enforces the same deterministic bundle checks.

Do Record, Seal, and Verify all work offline?

Yes. Record, Seal, and Verify all run offline. No account is required for offline operation.

Do users need an account for offline Record/Seal?

No. Account access is optional. It adds custody, profile publishing, messaging, and billing surfaces, but is not required for offline Record, Seal, or Verify.

Why does trusted verification require signature v4?

Trusted verification requires signatureV4 because it verifies canonical payload hash, root-key policy, device certificate chain, certificate validity window, and final payload signature. This hard-fail path blocks unsigned, out-of-policy, expired-cert, or tampered bundles.

Is verification paywalled?

No. Verification is public and free. Plans unlock authorship, custody, and operational controls.

Accounts, custody, and plans

Verification is public. Plans unlock authorship, custody, and operations.

Do I need an account?

No account required for Record, Seal, or Verify. Accounts add authenticated authorship, Dashboard custody (Archive and Received), profile publishing, chat/messages, team collaboration, and ownership workflows.

What does the dashboard store?

Sealed files in custody surfaces: Archive for your records, Received for opened external records with context.

What does Premium unlock?

Authorship + custody controls: signatures, co-signers, claim threads, visibility controls, and AssetSeal custody workflows.

What is AssetSeal?

AssetSeal issues one verifiable origin record, then appends custody/authorship events without rewriting origin.

What happens if I cancel Premium?

Existing records remain valid and verifiable. Verification is never gated by plan.

Login with Receiz ID (passkey + email)

Passwordless sign-in behavior for users and integrators.

What is Login with Receiz ID?

Receiz ID is passwordless account access. Passkey (WebAuthn) is default, and email magic-link is fallback or alternate login method. Both methods resolve to one account identity.

Do users need an account before signing in?

No. If a user is new, Receiz automatically creates the account on first successful passkey or magic-link login.

Can someone use passkey only and never provide email?

Yes. Passkey-only onboarding is supported. Email can be added later, and magic-link will then resolve to the same Receiz account.

If a user already uses email magic-link, what happens when they use passkey later?

They sign in to the same account. Passkey and email do not create separate users.

If a user first signs in with passkey, can they use email later?

Yes. Once email is linked to that profile, future magic-link sign-ins route to the same Receiz identity.

What happens in send-receiz email flows when the recipient clicks and signs?

Receiz signs the recipient in via magic-link. If the recipient is new, Receiz creates the account during that flow. After signing, they can use passkey or email to access the same account.

How should developers map app users when integrating Login with Receiz?

Map local users by OIDC `sub` (stable subject). Treat email as mutable profile data. This prevents identity split when users switch between passkey and email.

Where do developers configure Login with Receiz?

Create and manage OIDC clients in Receiz Connect, then implement Authorization Code flow with PKCE using discovery metadata.

WireProof (Pro) and API

Operational payment proof answers for teams and technical buyers.

What is WireProof?

WireProof is the Pro operations rail for payment proofs: sealed file plus verifier URL/QR.

What does Pro unlock for WireProof?

API/webhooks, structured claims, batch issuance, delegated issuers, and org archive/export. Verification remains public.

Do we need FaceID/TouchID signing?

No. Signing is optional and used when workflows require human-origin witness attestations.

Can we run a demo without signing in?

Yes. Unsigned demo flows are available. Signed/operational controls require account + plan entitlement.

Standards, trust, and developer references

Where to find schemas, trust posture, status, and integration guides.

Where are schemas, error codes, and test vectors?

Use Standards for canonical schema boundaries, trusted signature v4 profile requirements, error contracts, and conformance vectors.

How should developers integrate sealing and verification?

Use Developers for endpoint contracts, offline record/seal/verify integration patterns, and trusted signature v4 verification policy details.

Where can institutions review trust posture and incidents?

Use Trust for policy posture and route links, then Status for live operational reliability.

Where can teams monitor production reliability signals?

Use Status for live route health and incident visibility.

Advanced plan details

Use this section to compare Premium and Pro in real workflows

Premium control set

What Premium changes

Authorship, acknowledgment, and custody in one workflow
Prove you authored the original

PresenceBound owner signing binds your account to the exact original hash and signed timestamp.

Prove the counterparty received it

After owner sign-off, send receiver invites by email. Their passkey signature acknowledges that same exact original.

Multi-recipient workflow built in

Send comma-separated invites to up to 100 recipients in one request, each with their own signing slot.

Signer evidence you can keep

Dashboard records signer details, PBI receipt hash, signed time, and downloadable receiver-signed originals.

Authorship across real workflows

Use owner and receiver signatures for invoices, delivery milestones, payouts, transfer approvals, and custody handoffs.

Origin + custody continuity

Attach identity, co-signers, and claim threads, then append AssetSeal custody events without rewriting history.

Custody trail you can audit

Every handoff stays append-only, so you can prove who held what, when, and under which accepted terms.

Interactive use-case map

Creator-proof + custody + receiver-signoff by industry

15 major industry tracks with role-level workflows

Premium gives you two strong proofs in one system: creator-proof (you authored the original) and receiver-signoff (the other party acknowledged that exact original). Custody links both into one append-only continuity record. Choose your industry and role to see practical workflows for freelancers, operators, and business owners.

Industry
Freelancers & Business Owners

In Freelancers & Business Owners, work and payments move fast. This keeps one clear record of who made the original, who received it, and who approved it.

Freelancer can use this to cut arguments, speed up approvals, and get paid faster.

Creator-proof

Freelancer / Solo Creator

You made it. You signed it. The original is clearly yours.

No confusion about who created the file that was sent.

Custody

Freelancer / Solo Creator

Each handoff is saved in order, start to finish.

Custody logs each client handoff and acceptance event so you can show continuity from creation to payment resolution without chasing email trails.

You can show who had it first, who had it next, and when.

Receiver-signoff

Freelancer / Solo Creator

You sent it. They tapped Sign. Acknowledgment is now clear.

No one can honestly say they never received that same file.

How this applies right now

Use all three together to reduce non-payment, “wrong version,” and “never received” claims.

You finish the work and sign the original with Face ID.
You send that same file. They tap Sign to confirm acknowledgment.
Each handoff is saved in order, so custody is clear.
If there is a dispute later, one record settles it quickly.

Fraud + cash-flow reality

Why authorship and custody save money

Real reported figures, mapped to day-to-day operations

For freelancers and business owners, disputes are rarely just legal risk. They are cash-flow delays, rework time, and margin loss. Premium reduces this by combining creator-proof, custody continuity, and receiver-signoff into one verifiable record.

5%

Estimated revenue lost to occupational fraud each year

Even a small share of disputed payouts, rework, or chargebacks can erase margin fast for freelancers and owner-led teams.

Source: ACFE Fraud Week 2024
$145,000

Median loss per occupational fraud case

Independent proof of authorship, custody, and acceptance helps reduce high-cost dispute escalations before they become full losses.

Source: ACFE 2024 Key Findings
$16.6B

Internet crime losses reported in 2024

Business Email Compromise alone reached $2.77B in reported losses, which reinforces the need for verifiable transaction evidence.

Source: FBI IC3 2024 Report
56%

Small businesses report outstanding unpaid invoices

Average unpaid balance was $17,500 and invoices took 45.6 days to get paid, so faster dispute resolution directly protects cash flow.

Source: Intuit QuickBooks 2025 Research
Freelancers

Use creator-proof to defend delivered work, custody to show handoff history, and receiver-signoff to speed up payment release.

Business owners

Replace scattered email trails with one verifiable transaction continuity record, reducing time spent on “who sent what” disputes.

Teams at scale

Keep acceptance and custody evidence audit-ready so finance, legal, and ops can resolve issues faster with lower write-off risk.

AI fake reality

Receiz is a category, not a feature.

Built for the AI-authenticity era, not pre-AI assumptions

AI-generated content makes “looks real” insufficient. The durable standard now is process proof: who authored the content, how custody moved, and who acknowledged that exact content.

Category definition

Receiz defines Verified: a digital file that remains independently verifiable online and offline, is bound to passkey-backed authorship and receiver-signoff, and carries append-only custody continuity.

This is not another detector, signer, or dashboard log. It is foundational proof infrastructure for modern digital operations.

Synthetic content is cheap to produce

AI can generate convincing files, messages, and documents fast, so visual plausibility is no longer enough.

Single-signal proof breaks easily

A timestamp alone, a signature alone, or a portal log alone is usually not enough when disputes escalate.

Future disputes will be continuity disputes

The winning record will be the one that proves authorship, custody, and recipient acknowledgment together.

Email threads, screenshots, and PDFs

Weak
What it tries to prove

Shows that something was sent or shared.

Where it breaks

Easy to edit, forward out of context, or dispute as a representation instead of an original.

Receiz advantage

Receiz binds creator-proof, custody, and receiver-signoff to one verifiable file.

Best fit

Basic communication history only.

Cloud timestamps and file metadata

Weak
What it tries to prove

Shows file activity in a storage system.

Where it breaks

Not enough by itself to prove recipient acceptance or full handoff continuity across parties.

Receiz advantage

Receiz adds explicit acceptance evidence and append-only custody events beyond storage metadata.

Best fit

Internal file operations.

E-signature platforms

Partial
What it tries to prove

Good for formal document signing workflows.

Where it breaks

Often document-centric; less suited to ongoing custody continuity and operational record handoffs.

Receiz advantage

Receiz is built for recurring operational proof with coordinated authorship + custody + acknowledgment.

Best fit

Contract execution moments.

Watermarks and branded exports

Weak
What it tries to prove

Adds visible branding or origin hints.

Where it breaks

Visual markers can be copied, cropped, or faked; they do not prove recipient signoff or custody timeline.

Receiz advantage

Receiz verifies the original by exact bytes and tracks who signed and when.

Best fit

Deterrence, not high-confidence proof.

Hash-only timestamping

Partial
What it tries to prove

Proves some data existed at a point in time.

Where it breaks

Does not inherently prove human authorship identity, recipient acknowledgment, or business context.

Receiz advantage

Receiz layers business-readable context and signer identity workflows on top of integrity proof.

Best fit

Existence proof baseline.

AI detectors and deepfake scoring

Weak
What it tries to prove

Estimates whether content looks synthetic.

Where it breaks

Probabilistic and contested; not a robust acceptance or authorship record for settlement disputes.

Receiz advantage

Receiz is evidence-of-process, not just detection-of-content.

Best fit

Triage signals, not final proof.

Portal logs / ERP audit entries

Partial
What it tries to prove

Shows internal system actions.

Where it breaks

Hard to share externally and often not portable as independent evidence across counterparties.

Receiz advantage

Receiz produces portable proof files that travel outside your stack and still verify.

Best fit

Internal operational tracking.

Receiz category: Verified

Strong
What it tries to prove

Defines a new primitive: digital files that verify online/offline, with passkey-backed authorship, custody continuity, and receiver acknowledgment.

Where it breaks

Requires teams to treat proof as core operational infrastructure, not optional afterthought.

Receiz advantage

Unifies integrity, identity, acceptance, and custody into one portable record that stands outside any single portal or vendor dashboard.

Best fit

High-stakes delivery, payment, transfer, settlement, and audit workflows.

Bottom line
  • AI makes content easier to fake, so proof must be process-based, not appearance-based.
  • Receiz introduces a category-level primitive for original digital proof, online and offline.
  • Passkey-backed authorship + receiver-signoff + custody continuity is the new operational baseline.
  • That baseline reduces dispute time, protects cash flow, and lowers write-off risk across industries.

Government + institutions

Pressing record-integrity problems and how Receiz handles them

8 high-risk sectors

This is the practical layer: where records fail, how fraud allegations form, and how a verifiable file with passkey-backed authorship, receiver signoff, and custody continuity reduces ambiguity.

Select sector
Election Administration

Election trust fails when record handoffs are unclear. Receiz secures the records around the process.

Receiz does not replace voting machines or tabulation. It secures custody and signoff records around them.

Election fraud claims after missing handoff proof

Where it breaks

Ballot, seal, media, and results records move across teams with fragmented logs and no shared continuity record.

Receiz method

Each transfer record is signed by sender and receiver with append-only custody continuity on the exact original.

Operational result

Allegations can be reviewed against one verifiable record set instead of conflicting screenshots and emails.

Result packet disputes between precinct and county

Where it breaks

Time, sender, and packet integrity are hard to prove when records are copied across systems.

Receiz method

Receiz binds the original packet hash, signer identity, and transfer timeline into one portable file.

Operational result

Faster reconciliation and stronger confidence in transmission integrity.

Observer and incident log disagreements

Where it breaks

Manual logs can be edited or disputed after the fact.

Receiz method

Incident records are authored, received, and custody-tracked as immutable originals.

Operational result

Clearer audit review and reduced ambiguity in post-election incident handling.

Buyer FAQ

Questions buyers ask before upgrading

Clear answers by category so you can decide fast.

Plan & Access
What does Free include?

Free includes sealed file creation, public verify links, basic Archive/Received views, and saved defaults.

What changes when I upgrade?

Premium is the authorship + custody control tier: owner and receiver passkey signing, co-signers, claim threads, private visibility controls, AssetSeal custody, and verified-owned profile showcase. Pro is the operations tier: it includes Premium, then adds WireProof, API/webhooks, structured claims, batch issuance, delegated issuers, and org archive/export. Verification remains free.

Does upgrading change old originals?

No. Existing originals stay valid. Upgrade affects what you can attach and do on new or updated records.

What is Premium vs Pro?

Premium is the control tier for authorship and custody. Pro is the operations tier for volume workflows. Pro includes all Premium features, then adds WireProof, API/webhooks, structured claims, batch issuance, delegated issuers, and org archive/export.

Can I start on Premium and move to Pro later?

Yes. Upgrading to Pro is additive. Your existing originals, signatures, and archive history remain intact.

How fast does access update after checkout?

Access syncs automatically after successful checkout and session refresh.

Signing & Anti-Fraud
Do recipients need a paid plan to sign?

No. Recipients only need the invite magic link and a supported passkey device/browser to complete signing.

If a recipient has no account, can they still sign?

Yes. Clicking the invite magic link creates their account automatically (if needed), signs them in, and opens the original.

Can I send to multiple recipients in one shot?

Yes. Send comma-separated emails; one request supports up to 100 invited signers.

Do I need to sign first before sending invites?

Yes. Owner signature happens first, then receiver invites become available for that exact sealed file.

What does owner authorship prove?

It proves your account signed the exact original hash with a passkey ceremony at a specific time.

What does receiver sign-off prove?

It proves the counterparty acknowledged that same exact original, not a changed screenshot or rewritten payload.

What evidence do I get after someone signs?

You get signer metadata, PBI receipt hash, signed timestamp, and a downloadable signed original in your dashboard.

Verification & Privacy
Does verification become paywalled if I upgrade?

No. Verification stays public and free. Premium adds authorship, custody, and signer workflows.

Are screenshots valid for verification?

No. Verification is for originals. Screenshots and altered copies fail by design.

Do I need an account to verify?

No. Anyone can verify publicly without a paid plan.

Can I keep records private?

Yes. Premium supports private saved originals and private custody event access while preserving public verification behavior.

Billing
Can I cancel any time?

Yes. Monthly and yearly plans can be managed from billing; cancellation does not remove already issued originals.