Every evidence certified by Lexato is protected by multiple layers of encryption, blockchain, and legal compliance — from registration to the courtroom.
Three layers of cryptographic protection secure your evidence at every step of the process.
Most secure protocol available for data in transit
Standard of governments and financial institutions for data at rest
Post-quantum digital signature approved by NIST (FIPS 140-3)
Every evidence is anchored simultaneously in three independent public blockchain networks.
Primary network — SHA-256 hash registered on-chain
Secondary network — redundancy and cross-verification
Tertiary network — independent of Lexato for verification
Infrastructure designed to physically prevent any alteration or deletion of data.
Prevents deletion even by system administrators
Servers located in Brazil — compliance with national legislation
Multiple copies in geographically distinct data centers
Complete and inviolable tracking of every action on the evidence, from registration to access.
Trail with IP, timestamp, and user identification
Log of every view, download, and share
Compliance with chain of custody under the Anti-Crime Package (Brazil)
Operation in full compliance with Brazilian data protection and digital evidence standards.
Law 13.709/2018 — personal data protection
Guidelines for identification and preservation of digital evidence
RFC 3161 timestamp — public faith recognized nationally
Total transparency. The application code is open and auditable by any expert.
Public source code — auditable by forensic experts and developers
No hidden dependencies — every line of code is verifiable
Vulnerabilities identified and fixed quickly
Learn about the practices, certifications and policies that ensure the protection of your data and digital evidence.
Compliance with leading international information security standards.
End-to-end cryptographic protection for data in transit and at rest.
Infrastructure hosted on cloud providers with enterprise-grade security certifications.
Robust authentication and granular permission controls to protect data access.
Complete tracking of all actions performed on the platform for auditing and compliance purposes.
Structured security incident response plan with continuous monitoring.
Clear data retention and deletion policies in compliance with LGPD.
Protect your digital evidence with cutting-edge encryption, blockchain, and legal compliance.