< All Topics
Print

What is C2PA Verify Tool?

The C2PA Verify Tool (often referred to simply as the “Verify” tool) is a publicly accessible, open-source web utility used by consumers, developers, and journalists to check the provenance and authenticity of digital content.

It is a key part of the larger framework developed by the C2PA (Coalition for Content Provenance and Authenticity), a cross-industry group (including Adobe, Microsoft, Intel, and others) dedicated to combating misinformation.

How it Works

The tool is designed to read and display Content Credentials, which are cryptographically signed metadata that compliant software, cameras, and AI tools (like DALL-E, Nikon cameras, and Adobe products) embed into a piece of digital media (images, videos, audio, or PDFs).

You use the tool by uploading a file or entering a public URL. If the file has Content Credentials, the Verify Tool displays a “digital nutrition label” with the following verifiable information:

  • Origin: When and where the content was created (e.g., captured by a specific camera model, or generated by a specific AI model).
  • Edits/Process: A historical log of what happened to the content, including:
    • What software application was used (e.g., Photoshop, a specific text editor).
    • What actions were taken (e.g., cropped, color corrected, image combined with another).
    • AI-Generated Content: Whether the content or parts of it were generated or modified using Generative AI.
  • Signing Information: The identity (or certificate) of the creator or publisher who asserted the claims, which is cryptographically verified to ensure the information has not been tampered with.

The Core Purpose

The goal of the C2PA Verify Tool is to provide transparency and accountability by allowing consumers to make informed decisions about the media they encounter.

  • It does not determine “truth” or “falsity.” It simply shows the content’s verifiable history.
  • It is tamper-evident. If the Content Credentials have been stripped, modified, or if the file itself has been altered in a way that breaks the cryptographic link, the tool will display a warning.

In short, it is the public-facing mechanism for inspecting the “tamper-evident history book” attached to a piece of digital media.