Hardware fingerprints
Bind every capture to the device that took it with secure attestation data protected on-chain.
Upload a capture, Melon checks its hardware fingerprint, firmware, and EXIF against a staked Proof of Capture contract, then hands you a tamper-proof receipt.
Staked security
0.01 ETH
Every verifier locks capital before issuing proofs.
Latency
< 6s
Average verification time end-to-end.
Capture Confirmed
Device ID
SONY-A7RV-118
Firmware
v2.4.6
Timestamp
2025·09·12 18:22 UTC
Image hash
0x9f2b...a61c
Why Melon
Bind every capture to the device that took it with secure attestation data protected on-chain.
Upload a photo and receive cryptographic validation in seconds—no manual review required.
Spot stripping, edits, and recycled metadata instantly with our integrity heuristics.
Share verifiable proof metadata with marketplaces, newsrooms, or legal workflows.
Verification flow
We distilled the experience into a cinematic progression inspired by your reference: generous spacing, rich gradients, and tactile cards that lead the eye through each action.
Next up
Build the verification modal that appears when the user clicks “Verify a photo”.
Hook it into your Proof of Capture contract to read and write proof metadata on-chain.
Select the original image directly from your camera roll or device storage.
Device attestations, firmware version, and nonce are checked against the Proof of Capture contract.
Get a human-friendly card plus raw JSON proof for any downstream system.
Ready when you are
The landing page now mirrors the minimalist, glassy aesthetic from the reference. From here, we can wire the CTA to your upload + verification flow, connect wallets, and surface on-chain proof cards.