Legal Technology Updated 2026 FRE 901/902 Open Source

How to Authenticate Web Evidence That Survives Cross-Examination

Screenshots get challenged. Evidence packages with SHA-256 hashes, blockchain timestamps, and independently verifiable chain of custody don't. Here's how to capture web evidence that holds up under FRE 901 and eIDAS 910/2014.

7 min read Open-Source Verification Available
Digital Evidence Evidence Authentication SHA-256 Blockchain Timestamp eIDAS ISO 27037

KEY FACTS Web Evidence Authentication — What Courts Require

Plain screenshot admissible?
Increasingly challenged
US standard
FRE 901(b)(9)
EU standard
eIDAS 910/2014
International standard
ISO/IEC 27037:2012
Hash algorithm required
SHA-256
ProofSnap vs Page Vault
$8.99/mo vs $195/mo
Open-source verification
ProofSnap only
Key case law
US v. Vayner (2d Cir.)

To authenticate web evidence that survives cross-examination, capture a forensic evidence package containing SHA-256 hashes, an RSA-4096 digital signature, an independent blockchain or eIDAS timestamp, and ISO/IEC 27037 chain of custody documentation — then verify it with an open-source tool.

You captured a web page for a case. Maybe it was a defamatory post, a listing with false claims, a social media threat, or terms of service that changed overnight. You took a screenshot.

Then opposing counsel stood up and said: "Your Honor, this is just a JPEG file. There is no way to verify when it was taken, whether it has been altered, or that it accurately represents the web page as it appeared at that time."

If that scenario sounds familiar, you are not alone. Courts are increasingly skeptical of plain screenshots as evidence — and for good reason.

Why Screenshots Fail Under FRE 901

Under Federal Rules of Evidence 901(b)(9), digital evidence must be authenticated by "evidence describing a process or system and showing that it produces an accurate result." A screenshot fails this standard on four counts:

  1. No timestamp verification. Your device clock can be changed before taking a screenshot. There is no independent proof of when the capture occurred.
  2. No integrity proof. A screenshot is a pixel array — it can be edited in any image editor with zero forensic trace. There is no way to prove it has not been altered.
  3. No metadata. A screenshot contains no information about who captured it, from what device, what URL was visited, or what the TLS certificate of the site was.
  4. No chain of custody. There is no documentation of how the evidence was handled between capture and presentation in court.

Courts have repeatedly excluded or questioned screenshot evidence:

  • United States v. Vayner (2d Cir. 2014) — Printout of a social media page excluded because "the proponent failed to show that the page accurately reflected the defendant's page at the relevant time."
  • Griffin v. State (Md. 2011) — Maryland Court of Appeals warned that courts should be "particularly cautious in admitting evidence from modern communication technologies, which can be easily fabricated."
  • Lorraine v. Markel (D. Md. 2007) — Landmark ruling establishing a five-part framework for authenticating digital evidence, including requiring evidence of the system's accuracy and reliability.
  • Laughner v. State (Ind. 2015) — Court held that simply printing a web page is insufficient without testimony about the reliability of the capture process.
THE PROBLEM Why this matters for your cases
73%
of attorneys report opposing counsel challenged digital evidence authenticity (ABA 2025)
FRE 901
requires verifiable process showing accurate result
$0
cost to verify ProofSnap evidence (open-source tool)

The trend is clear: as deepfakes and AI-generated content become more sophisticated, courts are raising the bar for digital evidence authentication. A screenshot with no metadata, no hash, and no chain of custody is no longer sufficient for contested matters.

See exactly what a court receives

Download a real evidence package — the same ZIP that gets submitted as proof. Or send any URL to support@getproofsnap.com and we'll capture it for you free.

Download Sample Package

What Courts Actually Want

The solution is not a better screenshot. It is a forensic evidence package — a bundle of files that together prove what a web page contained, when it was captured, and that nothing has been altered since.

Authentication Requirement Screenshot ProofSnap Evidence Package
Timestamp verification Device clock (changeable) Bitcoin blockchain + eIDAS QTSP
Integrity proof None (editable pixels) SHA-256 hash + RSA-4096 signature
Source metadata None URL, TLS cert, HTTP headers, DNS
Chain of custody None ISO/IEC 27037 forensic log
HTML source preserved No Yes (full page source)
Independent verification Impossible Open-source tool (MIT)

What's in the Evidence Package

Every ProofSnap capture produces a ZIP containing 13 files:

Capture
screenshot.jpeg
Full-page scrolled screenshot
Capture
page.html
Complete HTML source code
Capture
domtextcontent.txt
Extracted DOM text
Metadata
metadata.json
URL, TLS cert, headers, device info
Report
evidence.pdf
Court-ready forensic report
Chain of Custody
forensic_log.json
ISO 27037 operation log + hash chain
Chain of Custody
chain_of_custody.json
Who captured, when, from what device
Integrity
manifest.json
SHA-256 hash of every file
Integrity
manifest.sig + publickey.pem
RSA-4096 digital signature
Timestamp
manifest.json.ots
Bitcoin blockchain proof (OpenTimestamps)
Timestamp
manifest.json.tsr
eIDAS qualified timestamp (RFC 3161)
Timestamp
eidas_validation.json
LTV data for offline verification

The Weak Link: Who Verifies the Verifier?

Evidence tools like Page Vault ($195/month) and Hunchly ($130/year) create evidence packages. But they all share the same vulnerability: verification depends on the vendor.

When opposing counsel asks "How do we know this evidence package is valid?", the answer with proprietary tools is: "The vendor's software says so." That is a circular argument. You are asking the court to trust a commercial entity that has a financial interest in its product working correctly.

This is why we open-sourced our verification tool.

Independent Verification: Anyone Can Check, No One Has to Trust

proofsnap-verify is a standalone, open-source tool (MIT license) that independently verifies every ProofSnap evidence package. It runs five cryptographic checks:

  1. Digital signature — RSA-4096 signature verification of the manifest
  2. File integrity — SHA-256 hash recomputation for every file in the package
  3. Forensic log integrity — hash chain validation per ISO/IEC 27037
  4. Bitcoin blockchain timestamp — OpenTimestamps proof verified against calendar servers
  5. EU qualified timestamp — eIDAS RFC 3161 timestamp with offline certificate chain validation

The tool has no connection to ProofSnap. It does not contact our servers. It uses only standard cryptographic algorithms (SHA-256, RSA) that any forensic expert can audit. The source code is publicly available and MIT-licensed.

"Your Honor, the verification tool is open source. Opposing counsel's forensic expert can inspect every line of code, run the verification independently, and confirm the results. No trust in ProofSnap is required."

That is a fundamentally stronger position than "the vendor says it works."

How Your Paralegal Uses It (Two Options)

Option 1: Drag and Drop (30 Seconds)

Open the online verifier in any browser. Drag the evidence ZIP onto the page. Results appear immediately. The file never leaves the browser — everything runs client-side.

This is ideal for quick verification before filing or during deposition preparation.

Option 2: Command Line (For Forensic Experts)

For full Bitcoin blockchain verification, forensic experts can run the open-source CLI tool:

git clone https://github.com/proofsnap/proofsnap-verify.git
cd proofsnap-verify
npm install && npm run build
node dist/index.js evidence.zip

The output lists each check with PASS or FAIL, including the specific Bitcoin block number and eIDAS timestamp. This output can be included in forensic reports or expert witness declarations.

Cost Comparison

Page Vault Hunchly ProofSnap
Price ~$195/month $130/year From $8.99/month
Blockchain timestamp No No Yes (Bitcoin)
eIDAS qualified timestamp No No Yes (EU Regulation 910/2014)
ISO 27037 chain of custody Partial Partial Full (forensic log + hash chain)
Open-source verification No No Yes (MIT license)
WhatsApp / Telegram capture No No Yes (dedicated logic)
Data leaves your device Yes (their servers) No No (100% local)

For a solo practitioner or small firm handling 10–20 evidence captures per month, ProofSnap costs roughly what Page Vault charges for a single capture session. And the evidence package is stronger — because it includes independent timestamps and open-source verification that Page Vault does not offer.

Tax tip: ProofSnap is a deductible business expense for law firms and professional services — making it effectively free for tax purposes. Consult your accountant for details specific to your jurisdiction.

Practice Areas Where This Matters Most

  • Family law — Social media posts, dating profiles, and messages that get deleted once litigation begins
  • Employment law — Internal communications, policy pages, and job postings that change after a complaint is filed
  • IP and trademark — Infringing product listings, counterfeit websites, and brand abuse on marketplaces
  • Insurance defense — Claimant social media activity contradicting injury claims
  • Defamation — Online posts, reviews, and comments that get edited or deleted
  • Real estate disputes — Property listings with misrepresentations, Airbnb disputes, HOA violations
  • Compliance — Website terms, cookie banners, and privacy policies that need to be documented at a specific point in time
Trusted by legal professionals across 15+ countries
Law firms, investigators, insurance companies, and compliance teams
13
Languages supported
5
Messaging platforms (WhatsApp, Telegram, Discord, Slack, Messenger)
MIT
Open-source verification license

Frequently Asked Questions

Are screenshots admissible as evidence in court?

Screenshots are increasingly challenged. Under FRE 901(b)(9), digital evidence must be authenticated through a verifiable process. A plain screenshot has no timestamp verification, no integrity proof, no metadata, and no chain of custody. Courts in US v. Vayner, Griffin v. State, and Lorraine v. Markel have excluded or questioned screenshot evidence for failing authentication standards.

What makes digital evidence admissible in court?

Admissible digital evidence requires: a cryptographic hash proving integrity (SHA-256), an independent timestamp (blockchain or eIDAS qualified), chain of custody documentation per ISO/IEC 27037, and a verification process that can be independently audited. ProofSnap creates evidence packages meeting all of these requirements, with open-source verification.

Can opposing counsel verify ProofSnap evidence independently?

Yes. The verification tool is open source (MIT license). Opposing counsel's forensic expert can download the code, audit every line, and run verification independently without any connection to ProofSnap. This eliminates the "trust the vendor" objection entirely.

Does ProofSnap work for WhatsApp and social media evidence?

Yes. ProofSnap has dedicated capture logic for WhatsApp Web, Telegram Web, Discord, Slack, and Facebook Messenger. Using the web version of these apps (rather than phone screenshots) captures full HTML, metadata, and TLS certificate information — producing a significantly stronger evidence package than a phone screenshot.

How does ProofSnap compare to Page Vault?

Page Vault costs approximately $195/month and sends your data to their servers. ProofSnap starts at $8.99/month, processes everything locally in your browser, and includes blockchain timestamps, eIDAS qualified timestamps, and open-source verification — features Page Vault does not offer. See the full comparison table above.

Is the evidence valid in the EU?

Yes. ProofSnap includes eIDAS qualified timestamps issued by an EU-accredited Trust Service Provider under Regulation 910/2014. These timestamps are legally valid across all 27 EU member states. The evidence package also complies with ISO/IEC 27037:2012 for chain of custody.

The Bottom Line

If you are still using screenshots as evidence, you are one objection away from having critical evidence excluded. The standard has moved beyond "print screen and pray."

A proper evidence package — with cryptographic hashes, independent timestamps, chain of custody, and verification that anyone can run independently — is what courts expect in 2026. It is also what protects your client and your credibility as counsel.

The verification tool is open source because evidence integrity should not depend on trusting a vendor. It should be provable.