You can prove which recipient leaked your data. Cryptographically. In court.

Invisible quantum fingerprints embedded in every document, API response, and database record. Each recipient gets a unique copy. If it leaks, Trace tells you who.

FINGERPRINT YOUR FIRST ASSETHOW IT WORKS

3 STEPS TO LEAK ATTRIBUTION

1

Fingerprint

Embed an invisible quantum marker unique to each recipient. Steganographic — invisible to humans, invisible to software.

2

Distribute

Send each recipient their uniquely marked copy. They look identical. They aren't.

3

Attribute

When data leaks, the marker fires a silent callback. You know which recipient's copy was leaked — with a quantum-signed breach certificate.

7 EMBEDDING SURFACES

PDF
Metadata + raw markers
TXT
Zero-width Unicode steganography
JSON
Hidden trace fields
DB
Row-level nonce + canary
API
Response fingerprinting
IMG
LSB steganography + EXIF
EMAIL
Tracking pixel + ZWC + HTML comments
TOKEN
Quantum API token with anomaly detection

COURT-READY EVIDENCE

PRICING

Trace
Free
  • 100 fingerprints/month
  • 3 API tokens
  • Email alerts
  • Text + JSON embedding
GET STARTED
Shield
$49/mo
  • 10K fingerprints/month
  • Unlimited tokens
  • Webhooks + breach certs
  • All 7 embedding surfaces
  • Anomaly detection
START TRIAL
Vault
$299/mo
  • Unlimited everything
  • SIEM integration
  • SDK SLA
  • Legal discovery support
  • Priority support
CONTACT SALES