Nov 28, 2025

How We Acquire Your Data

Proof is way more than just a data download, read below to understand more.

How We Acquire Your Data

When you use Proof to collect evidence, we don't just download files—we capture them forensically. That means preserving not just the content, but everything that proves it's authentic: metadata, timestamps, and cryptographic verification.

Here's how the process works, and why it matters.

Step 1: Secure Connection

When you connect a cloud account—Google Drive, OneDrive, or others—we use official APIs provided by those platforms. We never ask for your password. Instead, you grant temporary and read only, limited access through the provider's own authentication system (the same "Sign in with Google" flow you've used elsewhere).

This means your credentials stay with the provider, not with us. And you can revoke access at any time.

Step 2: Targeted Collection

You choose exactly what to collect. We don't hoover up your entire account—you select the specific files, folders, emails, or messages you need. This keeps acquisitions focused and avoids collecting irrelevant personal data.

Once you've made your selection, we capture everything in its original format, including:

  • The file or message content itself

  • Metadata (creation dates, modification history, author information)

  • Folder structure and context

  • Any attachments or embedded media

Step 3: Forensic Capture

Here's where we differ from a simple download.

As each item is collected, we generate cryptographic hashes (SHA-256) in real time. These hashes act as digital fingerprints, creating a mathematical proof of exactly what was captured at that moment.

We also log every action taken during the acquisition: timestamps for each step, the account used, the files selected, and the order of operations. This creates an unbroken record from start to finish.

The result is evidence that can be independently verified. Anyone can check the hash against the file and confirm nothing has changed.

Step 4: Secure Storage

Once collection is complete, your evidence is encrypted and stored securely. Access is controlled and logged—meaning there's a record of who viewed the evidence and when. Only YOU can access your evidence. Each user has their own encryption signing key, tied to the account.

You can download your evidence package up to 4 times, each of which includes:

  • The original files in their native format

  • A full chain of custody report

  • Cryptographic hash values for every item

  • A summary of the acquisition process

Everything you need to present the evidence confidently, whether to a solicitor, in mediation, or in court.

Why This Approach Matters

A regular download—right-clicking and saving a file—doesn't prove anything. There's no record of when it was captured, no verification it hasn't been edited, and no documentation of the process.

Forensic acquisition is different. It creates a complete, verifiable trail that turns ordinary files into court-ready evidence. The same methods used by professional forensic examiners, made accessible without the specialist software or expertise.

Built on Industry Standards

Our acquisition process follows internationally recognised standards for digital evidence handling. The same principles used by law enforcement and expert witnesses apply to every collection made through Proof.

You don't need to understand all the technical details. What matters is that when you present your evidence, it meets the standard courts expect—and it can withstand scrutiny from the other side.

The Bottom Line

We acquire your data the right way: securely connected, precisely targeted, forensically captured, and properly stored. Every step is logged, every file is hashed, and every acquisition comes with the documentation to prove it.

You focus on what you need to collect. We make sure it holds up.