All content

Browse all articles and insights from the TrueScreen blog

Articles

How to certify a smartphone video as legal evidence in court (2026 guide)

How to certify a smartphone video as legal evidence in court (2026 guide)

When a smartphone video stands in court: lawful acquisition, file integrity, chain of custody, formal filing. Norms, case law and tech requirements 2026.

Agent-to-agent communication: provenance and audit trail for multi-agent AI ecosystems

Agent-to-agent communication: provenance and audit trail for multi-agent AI ecosystems

Agent to agent communication provenance: how to build a verifiable multi-agent AI audit trail compliant with AI Act and admissible in court.

How chain of custody for digital evidence works in US proceedings

How chain of custody for digital evidence works in US proceedings

How US federal and state courts treat chain of custody for digital evidence under FRE 901, FRE 902(14), FRCP 37(e), Lorraine v. Markel, NIST SP...

Digital evidence in French civil procedure: chain of integrity under article 1366 Code civil and eIDAS

Digital evidence in French civil procedure: chain of integrity under article 1366 Code civil and eIDAS

Article 1366 Code Civil and the eIDAS Regulation give electronic writing legal force in French civil litigation. Practitioner guide to the chain of integrity.

ISO/IEC 27037: The International Standard for Digital Evidence

ISO/IEC 27037: The International Standard for Digital Evidence

ISO 27037 explained: 4 phases (identification, collection, acquisition, preservation), DEFR/DES roles, chain of custody, and the ISO forensic family.

WhatsApp evidence in court: 2026 guide to chats, screenshots and voice messages with legal value

WhatsApp evidence in court: 2026 guide to chats, screenshots and voice messages with legal value

WhatsApp evidence in court: how 2026 case law treats chats, voice notes and screenshots, what ISO/IEC 27037 and FRE 901 require for forensic acquisition.

eIDAS 2.0: 21 May 2026 deadline for remote digital seals

eIDAS 2.0: 21 May 2026 deadline for remote digital seals

On 21 May 2026 the eIDAS 2.0 deadline for remote qualified signature and seal devices expires. Technical obligations for QTSPs and downstream businesses.

Italy’s deepfake law 132/2025: what changed after the Meloni case

Italy’s deepfake law 132/2025: what changed after the Meloni case

Italy's law 132/2025 introduces a criminal offence for non-consensual AI deepfakes. What the law covers, the Meloni case, and how corporations should respond.

Virtual vehicle inspection: how certified photos prevent insurance fraud

Virtual vehicle inspection: how certified photos prevent insurance fraud

Virtual vehicle inspections relying on uncertified photos are structurally vulnerable to AI manipulation. Learn how source-side certification protects insurers.

Trust by design: building SaaS products with verifiable integrity from the first line of code

Trust by design: building SaaS products with verifiable integrity from the first line of code

Trust by design for SaaS: five architectural primitives for verifiable integrity, forensic audit trail and GDPR, NIS2, AI Act compliance in a single layer.

Deepfakes: what they are, how they’re made, the fraud they enable, and why detection alone is losing the war

Deepfakes: what they are, how they’re made, the fraud they enable, and why detection alone is losing the war

Deepfakes in 2026: what they are, how AI generates them, the fraud they enable, and why source certification beats detection.

Digital evidence in Spanish civil procedure: cadena de custodia under article 326 LEC and eIDAS

Digital evidence in Spanish civil procedure: cadena de custodia under article 326 LEC and eIDAS

How article 326 LEC, Ley 6/2020 and eIDAS shape digital-evidence admissibility in Spanish civil courts: presumption, chain of custody, QTSP integration.

PEC in court: legal weight, challenges and source-level certification

PEC in court: legal weight, challenges and source-level certification

PEC probative value in court: what it proves, how it can be challenged, how to certify attachments at the source with forensic methodology and QTSP...

Short-Term Rental Documents: The Complete Guide for Hosts in 2026

Short-Term Rental Documents: The Complete Guide for Hosts in 2026

Short-term rental documents hosts must collect, sign and archive: ID, contract, privacy, condition photos, AirCover and Booking claims.

Digital evidence in German civil procedure: chain of custody under § 371a ZPO and eIDAS

Digital evidence in German civil procedure: chain of custody under § 371a ZPO and eIDAS

Verbatim explainer of § 371a ZPO, eIDAS Article 25, GoBD and Beweiskette: how digital evidence holds up in German civil and criminal courts.

How chain of custody for digital evidence works in UK proceedings

How chain of custody for digital evidence works in UK proceedings

How chain of custody for digital evidence works under ACPO Principle 3, CPR Part 31 and Practice Direction 31B in UK courts and tribunals.

Image authentication for enterprises: the four levels that secure your visual assets

Image authentication for enterprises: the four levels that secure your visual assets

Enterprise image authentication explained: the four operational levels, when each is required, and how to embed them in document workflows beyond AI.

Voice cloning corporate fraud: the verifiable defense for CFOs after the Arup case

Voice cloning corporate fraud: the verifiable defense for CFOs after the Arup case

After the Arup 25.6M deepfake fraud, voice cloning targets corporate finance: the defense for CFOs with certified voice baseline and out-of-band rules.

Data integrity in the AI era: why source certification rewrites the paradigm

Data integrity in the AI era: why source certification rewrites the paradigm

Classic data integrity falls short in the generative AI era. Source certification extends the guarantee to the moment data is born.

EU e-Evidence Regulation for Service Providers: Obligations, Orders, and Cross-Border Cooperation

EU e-Evidence Regulation for Service Providers: Obligations, Orders, and Cross-Border Cooperation

Insights

Hash SHA-256 and qualified eIDAS timestamping: the forensic language every law firm should master

Hash SHA-256 and qualified eIDAS timestamping: the forensic language every law firm should master

Voice cloning CEO defense: stopping BEC 2.0 with source-certified corporate audio

Voice cloning CEO defense: stopping BEC 2.0 with source-certified corporate audio

Work progress photo evidence: building site documentation that holds up in appellate court

Work progress photo evidence: building site documentation that holds up in appellate court

Storm 1516: anatomy of Russia’s AI disinformation machine in 2026

Storm 1516: anatomy of Russia’s AI disinformation machine in 2026

How to timestamp a document: practical guide and method comparison

How to timestamp a document: practical guide and method comparison

B2B formal demand: how to prove emails, registered delivery and screenshots in court

B2B formal demand: how to prove emails, registered delivery and screenshots in court

Certifying audio recordings as court evidence: chain of custody and qualified timestamp

Certifying audio recordings as court evidence: chain of custody and qualified timestamp

Remote-work information notice: how to prove delivery and meet EU compliance

Remote-work information notice: how to prove delivery and meet EU compliance

Content provenance in newsrooms: a six-step verification workflow

Content provenance in newsrooms: a six-step verification workflow

WhatsApp stalking evidence: digital proof after Italian Supreme Court ruling 6024/2026

WhatsApp stalking evidence: digital proof after Italian Supreme Court ruling 6024/2026

Deepfake video and biometric KYC bypass: defending bank onboarding in 2026

Deepfake video and biometric KYC bypass: defending bank onboarding in 2026

Certified digital whistleblowing reports: balancing evidence and anonymity under the EU Directive

Certified digital whistleblowing reports: balancing evidence and anonymity under the EU Directive

Video Evidence in Private Investigations: Admissibility in Civil and Criminal Proceedings (2026)

Video Evidence in Private Investigations: Admissibility in Civil and Criminal Proceedings (2026)

Chain of custody of digital evidence: operational guide for lawyers and law firms

Chain of custody of digital evidence: operational guide for lawyers and law firms

Corporate Espionage: How to Document Trade Secret Theft with Court-Ready Digital Evidence

Corporate Espionage: How to Document Trade Secret Theft with Court-Ready Digital Evidence

Mortgage property appraisal: what lenders look for and what evidence you need in 2026

Mortgage property appraisal: what lenders look for and what evidence you need in 2026

Screen recording in remote work: how to protect employees and employers with certified digital evidence

Screen recording in remote work: how to protect employees and employers with certified digital evidence

Certified Web Evidence vs Wayback Machine: Three Evidentiary Scenarios

Certified Web Evidence vs Wayback Machine: Three Evidentiary Scenarios

AI Act Article 50: EU Rules on Labelling Synthetic Content from 2 August 2026

AI Act Article 50: EU Rules on Labelling Synthetic Content from 2 August 2026

How to check QTSP availability via the EU Trusted List before a critical timestamp

How to check QTSP availability via the EU Trusted List before a critical timestamp