Receiz / FAQ

FAQ for teams, operators, and institutions.

Direct answers. Plain language. Full authority intact.

Receiz is a deterministic verification-and-settlement platform: original bytes are authoritative for verification, replayable ledger math is authoritative for settlement, and every trust claim is mapped to code and evidence artifacts.

Settlement authority is append-only ledger replay over persisted integer value fields and deterministic rate math.

The file verifies itself. Verify links (/v) are optional public convenience for that same file.

Flow: Record → Seal → Share → Verify.

The primitive

File-first model: file in, verdict out.

What is a receiz?

Receiz is a deterministic verification-and-settlement platform. Verification authority is the original file; settlement authority is replayable append-only ledger math. A verify link (/v) is optional public convenience for that same file.

What is authoritative for verification vs settlement?

Verification authority is original file bytes plus embedded verification material. Settlement authority is deterministic replay over persisted integer value fields and posting reference rate.

Is a receiz a file or a link?

Both. The file is the source of truth. Verify links (/v) are optional public convenience for that same file.

What is the "file"?

The file is the sealed file carrying embedded verification material. It can be a claim record, document/media artifact, or package file depending on flow.

What is the minimum I need to share?

Share the file (or package ZIP). That is what verifies. Share the verify links (/v) only when optional public convenience is needed.

Verification model

What is checked, what fails, and why screenshots do not verify.

What exactly is being checked?

Verification checks whether embedded proof data still matches the file bytes and record fields. If anything changes, verification fails.

What fails if someone tampers with the file?

Tampering breaks bindings. Verification rejects because the file no longer matches the issued record.

Can verification run offline?

Yes. Verify runs fully offline. The offline verifier checks integrity locally with no network calls and enforces the same deterministic bundle checks.

Do Record, Seal, and Verify all work offline?

Yes. Record, Seal, and Verify all run offline. No account is required for offline operation.

Do users need an account for offline Record/Seal?

No. Account access is optional. It adds custody, profile publishing, messaging, and billing surfaces, but is not required for offline Record, Seal, or Verify.

Why does trusted verification require signature v4?

Trusted verification requires signatureV4 because it verifies canonical payload hash, root-key policy, device certificate chain, certificate validity window, and final payload signature. This hard-fail path blocks unsigned, out-of-policy, expired-cert, or tampered bundles.

Is verification paywalled?

No. Verification is public and free. Plans unlock authorship, custody, and business tools.

Accounts, custody, and plans

Verification stays public. Free opens the public profile. Paid tiers add ownership, business tools, and scale.

Do I need an account?

No. Record, Seal, and Verify do not require one. A free account opens your public profile, Public Twin, embeds, and basic custody.

What does the dashboard store?

Sealed files in custody tools: Archive for your records, Received for opened external records with context.

What does Free include?

Free includes public verification, Public Twin, basic embeds, Archive/Received, and saved defaults.

What does Premium unlock?

Premium unlocks deeper ownership: signatures, co-signers, claim threads, visibility controls, export/import, and AssetSeal custody history.

What does Business unlock?

Business adds custom domains, payment control, team access, analytics, and higher limits.

What does Pro unlock?

Pro includes Business and adds WireProof, APIs, webhooks, structured claims, batch issuance, delegated issuers, and org archive/export.

Where does white-label start?

White-label does not start in Business. It starts at Enterprise.

What is AssetSeal?

AssetSeal issues one verifiable origin record, then appends custody/authorship events without rewriting origin.

What happens if I cancel a paid plan?

Existing records remain valid and verifiable. Verification is never gated by plan. Paid-only controls revert until the plan is re-enabled.

Receiz World and Public Twin

How the public profile expands without weakening the core trust model.

What is a Public Twin?

Public Twin is the profile in conversation.

What is Receiz World?

Receiz World is the world around the profile.

How do Public Twin and Receiz World relate?

Public Twin starts the conversation. Receiz World gives it range.

What problem do these solve?

They make the profile actionable.

Can developers integrate or embed these surfaces?

Yes. Public profile, messaging, streaming, and embed routes are documented on the Developers page.

Standards, settlement, trust, and developer references

Where to find schemas, settlement contracts, trust posture, status, and integration guides.

Where are schemas, error codes, and test vectors?

Use Standards for canonical schema boundaries, trusted signature v4 profile requirements, error contracts, and conformance vectors.

How should developers integrate sealing and verification?

Use Developers for endpoint contracts, offline record/seal/verify integration patterns, and trusted signature v4 verification policy details.

Where is claim-to-code traceability for settlement guarantees?

Use the Settlement Standard tables: Claim-to-Code Traceability, Guarantee Boundaries, and Conformance Controls. These map each trust claim to route/function sources and verification evidence.

Where is deterministic rate authority defined?

Use the Value Source Appendix for pulse authority, deterministic derivation procedure, persisted-field contract, and replay validation checks.

Where can institutions review trust posture and incidents?

Use Trust for policy posture and route links, then Status for live operational reliability.

Where can institutions review governance ownership and control evidence cadence?

Use Governance for control owners, mandatory approval paths, separation-of-duties policy, and published evidence-cadence artifacts.

Where can teams monitor production reliability signals?

Use Status for live route health and incident visibility.

Offline

Record, Seal, and Verify without account dependency.

What is Offline Studio?

Offline Studio is the standalone on-device runtime for Record, Seal, and Verify. It generates verifiable artifacts locally and preserves original file format behavior for sealing flows.

Do Record, Seal, and Verify all work offline?

Yes. Record, Seal, and Verify are all offline-capable. Verification remains deterministic from file bytes, and does not require a network call.

Is an account required for offline operation?

No. Account access is optional and not required for offline Record, Seal, or Verify.

What does an account add if offline already works?

Accounts add authenticated authorship, custody tools (Archive and Received), profile publishing, messaging, team collaboration, and ownership controls.

Why can a fresh device need one online open before offline Record/Seal?

Trusted signing material is provisioned to the device. Once provisioned, the offline runtime can keep issuing trusted offline Record and Seal outputs on that device.

Where do I verify fully offline?

Use the Offline Verifier HTML. It is the canonical offline verification reference and runs locally without account access.

How to use

Simple flow: Record Moment, Seal File, Share, Verify.

How do I use Record Moment or Seal File?

Use Record Moment (/record) for moment claims, or Seal File (/seal) for files/folders. Keep returned file bytes unchanged.

Can I seal MP3, video, PDF, or folders?

Yes. Receiz supports common document/media formats, generic binaries, and package/folder flows.

How do I verify?

Verify from file bytes, online or offline. Matching files verify; altered copies fail.

What if I only have a screenshot?

Screenshots fail. Originals verify. A screenshot does not carry embedded verification material.

Settlement operations

Account settlement, offline notes, and deterministic replay under one contract.

How does settlement run end-to-end?

Deposit, transfer, withdrawal-note mint, and note-claim redemption all post append-only ledger events under one deterministic value contract.

Which fields are required for deterministic replay?

The canonical value tuple is `amountUsdCents`, `amountPhiMicro`, and `usdPerPhiMicrocents`. Replay and reconciliation depend on this tuple remaining present and unmodified.

How is custody value stored?

Custody is stored as integer Settlement Ledger Unit (SLU) micro values in `phi*` protocol field names (for example `amountPhiMicro` and `balancePhiMicro`) while account UI remains USD-readable.

What is an offline settlement note?

A sealed portable settlement instrument (PNG, PDF, or JSON packet) minted from account value and redeemable later through verification + claim posting.

What prevents invalid or duplicate note redemption?

Claim routes validate packet authenticity and claim state before credit posting. Invalid token, invalid state, or already-claimed notes hard-fail with no settlement credit write.

How do private and public ledger views relate?

Private and public ledger routes keep the same value and proof semantics while differing only in identity visibility. Independent verification stays intact across both routes.

Where is settlement conformance evidence published?

Conformance publishes requirement rollups, source/runtime checks, revision anchors, and raw JSON artifacts for independent review.

Login with Receiz ID (passkey + email)

Passwordless sign-in behavior for users and integrators.

What is Login with Receiz ID?

Receiz ID is passwordless account access. Passkey (WebAuthn) is default, and email magic-link is fallback or alternate login method. Both methods resolve to one account identity.

Do users need an account before signing in?

No. If a user is new, Receiz automatically creates the account on first successful passkey or magic-link login.

Can someone use passkey only and never provide email?

Yes. Passkey-only onboarding is supported. Email can be added later, and magic-link will then resolve to the same Receiz account.

If a user already uses email magic-link, what happens when they use passkey later?

They sign in to the same account. Passkey and email do not create separate users.

If a user first signs in with passkey, can they use email later?

Yes. Once email is linked to that profile, future magic-link sign-ins route to the same Receiz identity.

What happens in send-receiz email flows when the recipient clicks and signs?

Receiz signs the recipient in via magic-link. If the recipient is new, Receiz creates the account during that flow. After signing, they can use passkey or email to access the same account.

How should developers map app users when integrating Login with Receiz?

Map local users by OIDC `sub` (stable subject). Treat email as mutable profile data. This prevents identity split when users switch between passkey and email.

Where do developers configure Login with Receiz?

Create and manage OIDC clients in Receiz Connect, then implement Authorization Code flow with PKCE using discovery metadata.

WireProof (Pro) and API

Payment-proof answers for teams and technical buyers.

What is WireProof?

WireProof is the Pro console for payment proof: a sealed file plus verifier URL or QR.

What does Pro unlock for WireProof?

API/webhooks, structured claims, batch issuance, delegated issuers, and org archive/export. Verification remains public.

Do we need FaceID/TouchID signing?

No. Signing is optional and used when teams need human-origin witness attestations.

Can we run a demo without signing in?

Yes. Unsigned demo flows are available. Signed and advanced controls require account + plan entitlement.

Advanced plan details

Use this section to compare plan layers in real workflows

Premium control set

What Premium changes

Authorship, acknowledgment, and custody in one workflow
Prove you authored the original

PresenceBound owner signing binds your account to the exact original hash and signed timestamp.

Prove the counterparty received it

After owner sign-off, send receiver invites by email. Their passkey signature acknowledges that same exact original.

Multi-recipient workflow built in

Send comma-separated invites to up to 100 recipients in one request, each with their own signing slot.

Signer evidence you can keep

Dashboard records signer details, PBI receipt hash, signed time, and downloadable receiver-signed originals.

Authorship across real workflows

Use owner and receiver signatures for invoices, delivery milestones, payouts, transfer approvals, and custody handoffs.

Origin + custody continuity

Attach identity, co-signers, and claim threads, then append AssetSeal custody events without rewriting history.

Custody trail you can audit

Every handoff stays append-only, so you can prove who held what, when, and under which accepted terms.

Interactive workflow map

Creator-proof + custody + receiver-signoff across common workflows

15 broad workflow tracks with role-level examples

Premium gives you two strong proofs in one system: creator-proof (you authored the original) and receiver-signoff (the other party acknowledged that exact original). Custody links both into one append-only continuity record. Choose a workflow track and role to see how it applies across broad categories of work.

Workflow track
Client Services & Owner-Led Teams

In Client Services & Owner-Led Teams, work and payments move fast. This keeps one clear record of who made the original, who received it, and who approved it.

Freelancer can use this to cut arguments, speed up approvals, and get paid faster.

Creator-proof

Freelancer / Solo Creator

You made it. You signed it. The original is clearly yours.

No confusion about who created the file that was sent.

Custody

Freelancer / Solo Creator

Each handoff is saved in order, start to finish.

Custody logs each client handoff and acceptance event so you can show continuity from creation to payment resolution without chasing email trails.

You can show who had it first, who had it next, and when.

Receiver-signoff

Freelancer / Solo Creator

You sent it. They tapped Sign. Acknowledgment is now clear.

No one can honestly say they never received that same file.

How this applies right now

Use all three together to reduce non-payment, “wrong version,” and “never received” claims.

You finish the work and sign the original with Face ID.
You send that same file. They tap Sign to confirm acknowledgment.
Each handoff is saved in order, so custody is clear.
If there is a dispute later, one record settles it quickly.

Fraud + cash-flow reality

Why authorship and custody save money

Real reported figures, mapped to day-to-day operations

For owner-led teams and operating businesses, disputes are rarely just legal risk. They are cash-flow delays, rework time, and margin loss. Premium reduces this by combining creator-proof, custody continuity, and receiver-signoff into one verifiable record.

5%

Estimated revenue lost to occupational fraud each year

Even a small share of disputed payouts, rework, or chargebacks can erase margin fast for freelancers and owner-led teams.

Source: ACFE Fraud Week 2024
$145,000

Median loss per occupational fraud case

Independent proof of authorship, custody, and acceptance helps reduce high-cost dispute escalations before they become full losses.

Source: ACFE 2024 Key Findings
$16.6B

Internet crime losses reported in 2024

Business Email Compromise alone reached $2.77B in reported losses, which reinforces the need for verifiable transaction evidence.

Source: FBI IC3 2024 Report
56%

Small businesses report outstanding unpaid invoices

Average unpaid balance was $17,500 and invoices took 45.6 days to get paid, so faster dispute resolution directly protects cash flow.

Source: Intuit QuickBooks 2025 Research
Independent operators

Use creator-proof to defend delivered work, custody to show handoff history, and receiver-signoff to speed up payment release.

Operating teams

Replace scattered email trails with one verifiable transaction continuity record, reducing time spent on “who sent what” disputes.

Scaled organizations

Keep acceptance and custody evidence audit-ready so finance, legal, and ops can resolve issues faster with lower write-off risk.

AI fake reality

Receiz is a category, not a feature.

Built for the AI-authenticity era, not pre-AI assumptions

AI-generated content makes “looks real” insufficient. The durable standard now is process proof: who authored the content, how custody moved, and who acknowledged that exact content.

Category definition

Receiz defines Verified: a digital file that remains independently verifiable online and offline, is bound to passkey-backed authorship and receiver-signoff, and carries append-only custody continuity.

This is not another detector, signer, or dashboard log. It is foundational proof infrastructure for modern digital operations.

Synthetic content is cheap to produce

AI can generate convincing files, messages, and documents fast, so visual plausibility is no longer enough.

Single-signal proof breaks easily

A timestamp alone, a signature alone, or a portal log alone is usually not enough when disputes escalate.

Future disputes will be continuity disputes

The winning record will be the one that proves authorship, custody, and recipient acknowledgment together.

Email threads, screenshots, and PDFs

Weak
What it tries to prove

Shows that something was sent or shared.

Where it breaks

Easy to edit, forward out of context, or dispute as a representation instead of an original.

Receiz advantage

Receiz binds creator-proof, custody, and receiver-signoff to one verifiable file.

Best fit

Basic communication history only.

Cloud timestamps and file metadata

Weak
What it tries to prove

Shows file activity in a storage system.

Where it breaks

Not enough by itself to prove recipient acceptance or full handoff continuity across parties.

Receiz advantage

Receiz adds explicit acceptance evidence and append-only custody events beyond storage metadata.

Best fit

Internal file operations.

E-signature platforms

Partial
What it tries to prove

Good for formal document signing workflows.

Where it breaks

Often document-centric; less suited to ongoing custody continuity and operational record handoffs.

Receiz advantage

Receiz is built for recurring operational proof with coordinated authorship + custody + acknowledgment.

Best fit

Contract execution moments.

Watermarks and branded exports

Weak
What it tries to prove

Adds visible branding or origin hints.

Where it breaks

Visual markers can be copied, cropped, or faked; they do not prove recipient signoff or custody timeline.

Receiz advantage

Receiz verifies the original by exact bytes and tracks who signed and when.

Best fit

Deterrence, not high-confidence proof.

Hash-only timestamping

Partial
What it tries to prove

Proves some data existed at a point in time.

Where it breaks

Does not inherently prove human authorship identity, recipient acknowledgment, or business context.

Receiz advantage

Receiz layers business-readable context and signer identity workflows on top of integrity proof.

Best fit

Existence proof baseline.

AI detectors and deepfake scoring

Weak
What it tries to prove

Estimates whether content looks synthetic.

Where it breaks

Probabilistic and contested; not a robust acceptance or authorship record for settlement disputes.

Receiz advantage

Receiz is evidence-of-process, not just detection-of-content.

Best fit

Triage signals, not final proof.

Portal logs / ERP audit entries

Partial
What it tries to prove

Shows internal system actions.

Where it breaks

Hard to share externally and often not portable as independent evidence across counterparties.

Receiz advantage

Receiz produces portable proof files that travel outside your stack and still verify.

Best fit

Internal operational tracking.

Receiz category: Verified

Strong
What it tries to prove

Defines a new primitive: digital files that verify online/offline, with passkey-backed authorship, custody continuity, and receiver acknowledgment.

Where it breaks

Requires teams to treat proof as core operational infrastructure, not optional afterthought.

Receiz advantage

Unifies integrity, identity, acceptance, and custody into one portable record that stands outside any single portal or vendor dashboard.

Best fit

High-stakes delivery, payment, transfer, settlement, and audit workflows.

Bottom line
  • AI makes content easier to fake, so proof must be process-based, not appearance-based.
  • Receiz introduces a category-level primitive for original digital proof, online and offline.
  • Passkey-backed authorship + receiver-signoff + custody continuity is the new operational baseline.
  • That baseline reduces dispute time, protects cash flow, and lowers write-off risk across industries.

Government + institutions

Pressing record-integrity problems and how Receiz handles them

8 high-risk sectors

This is the practical layer: where records fail, how fraud allegations form, and how a verifiable file with passkey-backed authorship, receiver signoff, and custody continuity reduces ambiguity.

Select sector
Election Administration

Election trust fails when record handoffs are unclear. Receiz secures the records around the process.

Receiz does not replace voting machines or tabulation. It secures custody and signoff records around them.

Election fraud claims after missing handoff proof

Where it breaks

Ballot, seal, media, and results records move across teams with fragmented logs and no shared continuity record.

Receiz method

Each transfer record is signed by sender and receiver with append-only custody continuity on the exact original.

Operational result

Allegations can be reviewed against one verifiable record set instead of conflicting screenshots and emails.

Result packet disputes between precinct and county

Where it breaks

Time, sender, and packet integrity are hard to prove when records are copied across systems.

Receiz method

Receiz binds the original packet hash, signer identity, and transfer timeline into one portable file.

Operational result

Faster reconciliation and stronger confidence in transmission integrity.

Observer and incident log disagreements

Where it breaks

Manual logs can be edited or disputed after the fact.

Receiz method

Incident records are authored, received, and custody-tracked as immutable originals.

Operational result

Clearer audit review and reduced ambiguity in post-election incident handling.

Buyer FAQ

Questions buyers ask before upgrading

Clear answers by category so you can decide fast.

Plan & Access
What does Free include?

Free includes public verification, Public Twin, website embeds, scheduling, communications, payments, basic Archive/Received views, and saved defaults.

Do I need Business for Public Twin, calendar, communications, or payments?

No. Those public surfaces stay open on Free. Business adds the business tools around them: custom domain connection, routing, payment controls, staff workflows, and analytics.

What changes when I upgrade?

Premium adds authorship and custody controls: owner and receiver passkey signing, co-signers, claim threads, private visibility controls, AssetSeal custody, and verified-owned profile showcase. Business adds guided custom domain connection, routing, payment controls, team handoff, business blocks, and analytics. Pro includes Business and adds WireProof, API/webhooks, structured claims, batch issuance, delegated issuers, and org archive/export. Enterprise is where white-label and org governance begin. Verification remains free.

Does upgrading change old originals?

No. Existing originals stay valid. Upgrade affects what you can attach and do on new or updated records.

How do Premium, Business, and Pro differ?

Premium is proof control: authorship, signatures, claim continuity, provenance, and custody. Business adds the customer-facing operations layer: domain control, routing, payment controls, staffing, and analytics. Pro is the automation tier: it includes Business, then adds WireProof, API/webhooks, structured claims, batch issuance, delegated issuers, and org archive/export.

Can I start on Premium or Business and move up later?

Yes. Upgrades are additive. You can start with Premium for proof control, move to Business when inbound demand becomes real operations, and move to Pro when you need automation. Existing originals, signatures, and archive history remain intact.

Where does white-label start?

White-label does not start in Business. Business keeps a Receiz trust mark on the surface. White-label starts at Enterprise.

How fast does access update after checkout?

Access syncs automatically after successful checkout and session refresh.

Signing & Anti-Fraud
Do recipients need a paid plan to sign?

No. Recipients only need the invite magic link and a supported passkey device/browser to complete signing.

If a recipient has no account, can they still sign?

Yes. Clicking the invite magic link creates their account automatically (if needed), signs them in, and opens the original.

Can I send to multiple recipients in one shot?

Yes. Send comma-separated emails; one request supports up to 100 invited signers.

Do I need to sign first before sending invites?

Yes. Owner signature happens first, then receiver invites become available for that exact sealed file.

What does owner authorship prove?

It proves your account signed the exact original hash with a passkey ceremony at a specific time.

What does receiver sign-off prove?

It proves the counterparty acknowledged that same exact original, not a changed screenshot or rewritten payload.

What evidence do I get after someone signs?

You get signer metadata, PBI receipt hash, signed timestamp, and a downloadable signed original in your dashboard.

Verification & Privacy
Does verification become paywalled if I upgrade?

No. Verification stays public and free. Paid tiers add proof control, business operations, and automation, but they do not paywall verification.

Are screenshots valid for verification?

No. Verification is for originals. Screenshots and altered copies fail by design.

Do I need an account to verify?

No. Anyone can verify publicly without a paid plan.

Can I keep records private?

Yes. Premium supports private saved originals and private custody event access while preserving public verification behavior.

Billing
Can I cancel any time?

Yes. Monthly and yearly plans can be managed from billing; cancellation does not remove already issued originals.