SECURE LOCAL PROCESSING   |   After this page loads, all cryptographic operations run locally in your browser. You may disconnect from the network before dropping evidence files.  Data never leaves this device.
Terminal
Verify Hash
History Log
PROTOCOL NOTICE: Once this page has fully loaded, all cryptographic operations are performed entirely within your browser. No evidence file data is uploaded or transmitted to any external server at any point. You may disconnect from the network before dropping evidence files. SHA-256 per NIST FIPS 180-4.
Section 1 — Proceeding Details  [Section 63(4) Schedule]
Section 2 — Deponent / Certifying Officer Details
Section 3 — Source Device Particulars  [BSA Schedule Mandatory Fields]
As required by BSA Schedule — select the relationship of the deponent to the device
Section 4 — Electronic Record Particulars
Section 5 — Statutory Declaration  [Section 63(2) Compliance]
Section 6 — Part B: Certifying Expert Details  [BSA Schedule — Expert Signature]

The BSA Schedule requires Part B to be signed by an Expert (Name, Designation & Signature). Select a signing mode, then fill in the details. These fields are optional — if left blank, Part B generates with blank signature lines as before.

MODE A — LEGAL BASIS FOR SELF-CERTIFICATION: Under Interpretation (i) of Section 63(4) BSA, the person who personally operated the hash terminal and has direct knowledge of the computation process may sign Part B. The BSA Schedule specifies no minimum qualification for the Part B signatory. This interpretation is supported by leading Indian legal commentators (LiveLaw, 2024; Obiter.in, 2025) and is the most commonly adopted approach at the district court level. If challenged at the High Court level, be prepared to defend it — the question of who qualifies as "Expert" under Section 63 remains unsettled by the Supreme Court.
This guidance is not printed in the generated certificate PDF.
Section 7 — Evidence File Hash Computation  [SHA-256 · NIST FIPS 180-4]

↓  Drag & Drop Evidence File Here

Complete all sections and check the statutory declaration above to enable processing

All file types supported  ·  10 MB chunk processing  ·  SHA-256 (NIST FIPS 180-4)

Computing SHA-256 hash… 0%
SHA-256 Cryptographic Hash Value (NIST FIPS 180-4)
File Name
File Size
Processed On (IST)
Independent Hash Verification

For opposing counsel, courts, or any party seeking to independently verify the integrity of a file against a stated SHA-256 hash value. Drop the file and enter the expected hash — this tool will confirm whether they match. No data leaves this device.

↓  Drop File to Verify

Drop the evidence file here

SHA-256 will be computed and compared against the hash you enter below

Computing SHA-256… 0%
Certificate Generation Log

Records are stored locally in your browser only. Clearing browser cache will permanently erase this log. No evidence file data is retained — only certificate metadata.

Your 3 Free Certificates Have Been Used
We're finalising pricing around how advocates actually work. Tell us about your practice and we'll notify you when certificates are available.
What best describes your practice?
Occasionally
Digital evidence comes up in a few of my cases
Regularly
Digital evidence is part of my active litigation practice
Frequently
Digital evidence appears in most of my cases
Opening soon at portal.rezvo.in
Leave your email and we'll notify you:
Already purchased? Enter your license key:
Not now — return to terminal