Demo 100% browser: all calculations happen in your browser. No file, text or data is transmitted or saved. This simulation faithfully reproduces the behaviour of the real system.
Want to try a real registry publication? Request a real demo access at info@informaticainazienda.it

The complete flow

From the DAPI certificate to publication in the EVIDE public registry. Click on each phase to learn more.

Verified DAPI identity Only people with a DAPI certificate can access OTP email Secure login DAPI number + OTP via verified email Evidentiary intake SHA-256 hash + verifiable UTC timestamp (RFC 3161 ready) FILE ZIP URL TEXT FEDIS request Client requests forensic certification quote Assessment + confirmation Admin sends quote with notes Client accepts or declines CWC code FEDIS issuance Documented chain of custody + FEDIS Files deleted after issuance EVIDE public registry EVIDE-YYYYMMDD-XXXX + SHA-256 hash Public and persistent independent verification Already probative without FEDIS: hash + timestamp defensible Escalation on demand: FEDIS even later Identity and access Evidentiary intake FEDIS workflow Registry

Try the simulation

Choose the evidence type, upload a file or enter text, and see the system in action. All in your browser.

1
Identity
2
Evidence
3
Intake
4
FEDIS
5
Quote
6
Issuance
7
Registry

Verified DAPI identity

In the real system, you log in with your 10-digit DAPI code. Your identity is verified by Informatica in Azienda before you receive the certificate.

In the real system this number is unique and certified.
Why is identity needed? The evidentiary value depends on the verified identity of the declarant. Without a certain identity, the hash is anonymous and difficult to defend in legal proceedings.