Pular para o conteúdo principal
Security

6 layers of protection

Every evidence certified by Lexato is protected by multiple layers of encryption, blockchain, and legal compliance — from registration to the courtroom.

01

Multi-Level Encryption

Three layers of cryptographic protection secure your evidence at every step of the process.

TLS 1.3

Most secure protocol available for data in transit

AES-256

Standard of governments and financial institutions for data at rest

ML-DSA-87

Post-quantum digital signature approved by NIST (FIPS 140-3)

02

Multi-Blockchain Registration

Every evidence is anchored simultaneously in three independent public blockchain networks.

Polygon

Primary network — SHA-256 hash registered on-chain

Arbitrum

Secondary network — redundancy and cross-verification

Optimism

Tertiary network — independent of Lexato for verification

03

Immutable Storage

Infrastructure designed to physically prevent any alteration or deletion of data.

Object Lock

Prevents deletion even by system administrators

Brazil

Servers located in Brazil — compliance with national legislation

Redundancy

Multiple copies in geographically distinct data centers

04

Digital Chain of Custody

Complete and inviolable tracking of every action on the evidence, from registration to access.

Auditing

Trail with IP, timestamp, and user identification

Tracking

Log of every view, download, and share

Art. 158-F CPP

Compliance with chain of custody under the Anti-Crime Package (Brazil)

05

Legal Compliance

Operation in full compliance with Brazilian data protection and digital evidence standards.

LGPD

Law 13.709/2018 — personal data protection

ISO 27037

Guidelines for identification and preservation of digital evidence

ICP-Brasil

RFC 3161 timestamp — public faith recognized nationally

06

Open Source Plugin

Total transparency. The plugin code is open and auditable by any expert.

GitHub

Public source code — auditable by forensic experts and developers

Transparency

No hidden dependencies — every line of code is verifiable

Community

Vulnerabilidades identificadas e corrigidas rapidamente

Certifications and Standards
AES-256
FIPS 140-3
ICP-Brasil
LGPD
ISO 27037
RFC 3161

Security without compromise

Protect your digital evidence with the most robust infrastructure in the market.