Content Credentials

Preview

Content Credentials is built on the open C2PA standard developed by Adobe, Microsoft, Intel, and others to help viewers evaluate the authenticity of digital media. Functioning like a "nutrition label" for digital content, Lens embeds a cryptographic "manifest" directly into your photos and videos to provide a transparent history of the media.

What It Helps Verify

Origin

The file was captured by Lens on your specific device

Integrity

The file has not been altered since capture

Timestamp

When the capture occurred (network-verified)

Location

Where the capture occurred (GPS coordinates, when enabled in Settings)

Version

App version for vulnerability management

The Technology Stack

Lens uses industry-standard cryptographic protocols to ensure your content credentials are secure, verifiable, and tamper-evident.

C2PA

Coalition for Content Provenance and Authenticity standard for embedding cryptographic metadata in media files.

ES256

Elliptic Curve Digital Signature Algorithm using P-256 and SHA-256, providing hardware-backed signing via Secure Enclave.

Trusted Timestamp (TSA)

RFC 3161-compliant timestamps from DigiCert (C2PA TSA Trust List) when available. Device time matches trusted NTP servers; photos signed with "Network Verified" timestamp; full trust chain intact.

NTP

Network Time Protocol verification against Apple, Cloudflare, and Google servers with 60-second drift tolerance.

SHA-256

Cryptographic hash function ensuring pixel-level integrity verification of captured media content.

JUMBF

JPEG Universal Metadata Box Format for embedding structured C2PA manifests directly in image files.

Secure Enclave Integration

Your iPhone contains a Secure Enclave — a dedicated security processor that stores cryptographic keys in hardware. Lens generates your signing key inside this chip:

Hardware-bound: The key physically cannot leave your device
Non-exportable: Even you cannot extract it
Device-unique: A new phone means a new key
Tamper-resistant: Protected even if iOS is compromised

This is the same technology that protects Face ID and Apple Pay.

Current Status: Preview

What Works Today

  • Live Secure Enclave key generation
  • Live Photo signing (JPEG)
  • Live Video signing (MOV/MP4)
  • Live Trusted Timestamp (TSA)
  • Live Spoofing detection
  • Live Guided Trust UI

What's Coming

  • In Progress C2PA Conformance Audit
  • Planned CA-verified certificate
  • Future C2PA Trust List inclusion

How to Use Content Credentials

Once enabled, Lens embeds provenance data directly into your captures and exposes it through a three-level disclosure model.

  1. Enable the feature: Open Settings → Content Credentials, toggle Enable Content Credentials on, and accept the enrollment prompt.
  2. L1 — HUD indicator: A shield + Content Credentials icon appears in the camera HUD to signal that provenance is available while you shoot.
  3. L2 — Summary views: Verification tools surface a concise summary of key assertions such as signer, timestamp, and any key warnings.
  4. L3 — Full manifest inspection: For audits and investigations, you can inspect the full manifest to review every assertion and transformation step.

C2PA UX v2.2 Compliance

Lens implements the C2PA UX v2.2 recommendations as a capture-only iOS camera app. We've implemented 30 of 31 applicable requirements (Section 2.8 Continuous Feedback is optional and was removed per product decision).