Why is a screenshot not enough for digital evidence?
Screenshots carry no proof of integrity -- pixels are editable and file timestamps are adjustable. A WRL capture is an Ed25519-signed WACZ bundle with SHA-256 hashes and an independent RFC 3161 timestamp. It includes all page resources, not just a rendered image. Anyone can verify the signatures and timestamps independently -- no account required.
Is web capture evidence admissible in court?
WRL captures provide the technical foundation for authentication under FRE 901(b)(9) and support self-authentication under FRE 902(14). With the eIDAS qualified timestamp option, captures carry an EU-recognized qualified electronic timestamp under Article 41(2). Admissibility depends on jurisdiction and the specific proceeding -- WRL provides the technical evidence foundation. Learn more about the legal framework, and consult qualified legal counsel for your matter.
Can I verify a capture without an account?
Yes. Every capture has a public verification URL. Verification checks signatures and timestamps using the CLI tool or web verifier. No account or API key is required.
What is forensic web capture?
Forensic web capture preserves web content in a way that maintains evidentiary value -- integrity through cryptographic hashing, a documented methodology, and a verified point in time. WRL's automated pipeline aligns with SWGDE best practices: every capture runs in a fresh, isolated browser, each artifact is hashed with SHA-256, and the signed bundle receives an independent RFC 3161 timestamp.
What is chain of custody for digital evidence?
Chain of custody tracks who handled evidence, when, and what they did with it. For digital evidence, it means proving data has not been altered between collection and presentation. WRL establishes a cryptographic chain of custody from capture through signing: the pipeline hashes every artifact, signs the bundle with Ed25519, and obtains an independent RFC 3161 timestamp -- all in a single automated process with no human handling. Learn how WRL documents the evidence chain.
What is defensible web collection?
Defensible collection means the method used to gather electronically stored information can withstand legal scrutiny. It requires a documented, repeatable process with a verifiable chain of custody. WRL's automated pipeline produces a signed, timestamped evidence bundle for every URL -- the process is deterministic, the output is independently verifiable, and the full methodology is documented. See how WRL supports defensible collection.
How do I preserve website evidence for litigation?
Submit the URL to WRL's capture API. The automated pipeline renders the page in an isolated browser, captures a screenshot, rendered HTML, and HTTP headers, then packages everything into a signed WACZ evidence bundle with an independent timestamp. For ongoing preservation, scheduled captures monitor URLs at regular intervals. For bulk collection, the batch API accepts up to 100 URLs per request.
How do OSINT investigators preserve web evidence?
OSINT investigators need to capture web content before it disappears -- social media posts, forum threads, product listings -- while maintaining a provenance record others can verify. WRL provides an API-driven approach: submit a URL, receive a signed WACZ bundle with proof of when the content existed and that nothing was altered after capture. The batch API handles up to 100 URLs per request, and scheduled captures monitor volatile pages automatically.
How do I archive web pages for regulatory compliance?
Regulatory audits require proof that public-facing content met requirements on specific dates. WRL creates a tamper-evident, independently timestamped record of any web page on demand -- your auditor can verify integrity without trusting your internal systems. For recurring obligations, scheduled captures automate regular snapshots. With the eIDAS qualified timestamp option, EU-regulated organizations get timestamps with a legal presumption of accuracy under Article 41(2).
How do I document online trademark infringement?
Trademark enforcement requires evidence that infringing content existed at a specific time on a specific page. Screenshots are easily challenged -- they carry no proof of integrity or timing. WRL produces a signed, timestamped evidence bundle with cryptographic proof of what the page contained and when, verifiable by opposing counsel or the tribunal without special tools. Scheduled captures can document duration and evolution of infringement.
What is an audit trail for web content?
An audit trail for web content is a verifiable record of what a page contained at specific points in time. Built on WRL captures, each record is cryptographically signed, independently timestamped, and stored in WACZ -- an open format not locked to any vendor. Auditors can confirm integrity using the public verification endpoint or the open-source CLI tool, with no account or platform access needed.
Can I self-host WRL?
Yes. WRL's full source code is public on GitHub. You can deploy it on your own Cloudflare Workers infrastructure for internal use. The hosted service at api.webresourceledger.com is the same codebase. The PolyForm Shield license permits all uses except offering a competing web capture service.