Attribution-First File Protection

Distribute files.
Know who leaks them.

DGR embeds collusion-resistant forensic watermarks directly into AI model weights, PDFs, and documents. When a file leaks, we attribute it to the exact partner โ€” even if multiple partners colluded.

Differential spread-spectrum watermarking, canary tokens that phone home on open, real-time threat scoring, tamper-evident evidence chains, automated DMCA, and a live forensic lab โ€” all in one platform.

Six layers that work together

Each layer solves a different part of the leak problem. Together they produce legally-admissible attribution evidence.

๐Ÿ”ฌ

Differential Watermarking

Every partner download gets a mathematically unique 128-bit LSB signature across 131,072 float32 positions. Spread-spectrum coded โ€” resists averaging by up to ~32 colluders.

All plans
๐Ÿ•ฏ๏ธ

Canary Tokens

Every file carries an invisible phone-home token. The moment a partner opens it โ€” anywhere โ€” you get an alert with their IP and timestamp. Before any re-download attempt.

All plans
๐Ÿ›ก๏ธ

Threat Intelligence

Every download scored in real time: Tor (+60), impossible travel (+45), datacenter (+20), automation (+40). High-risk downloads auto-corrupted. Critical scores hard-blocked.

All plans
โ›“๏ธ

Tamper-Evident Chain

Every event chained via HMAC-SHA256. Retroactive tampering is detectable. Export as a signed JSON package for legal proceedings.

AI Lab+
๐Ÿฏ

Honeypot Files

Deploy decoy high-value files that look legitimate. When accessed, fire an instant alert identifying insider threats and external adversaries before real files are touched.

Team+
โš–๏ธ

Automated DMCA

Monitor HuggingFace, GitHub, and Telegram for leaked files. One-click DMCA generation, automated takedown filing, and status tracking. Integrated with forensic evidence export.

AI Lab+
๐ŸŒ

Geo-Fencing

Per-file country allowlists and blocklists. Compliance presets (GDPR, OFAC). Real-time country detection on every download. Override per-partner for exceptions.

Team+
๐Ÿ•ต๏ธ

Forensic Lab

Upload a suspected leaked file and extract embedded watermarks in seconds. Get attribution with confidence scores, evidence report, and pre-filled legal documents.

AI Lab+

From upload to attribution

1

Upload & configure

Upload any file โ€” AI model checkpoints, PDFs, code, datasets. Set download limits, expiration windows, geo-fences, device allowlists, and approval workflows. AES-256-GCM encryption at rest.

2

Grant partner access

Generate a unique access link per partner. Each partner receives their own differential watermark signature, canary token, and forensic envelope. Links are email-verified with OTP.

3

Threat assessment on download

Before serving any file, DGR scores the request against Tor exit lists, geo-velocity, datacenter IP ranges, and download frequency. Suspicious requests receive corrupted files or are blocked.

4

Canary fires on open

When a partner opens the file anywhere, the embedded canary token pings DGR. You see the IP, timestamp, and user agent โ€” even before any re-download attempt.

5

Forensic Lab attribution

Submit a leak URL or upload the suspected file to the Forensic Lab. DGR extracts the differential watermark, correlates against partner signatures, and returns an attribution with confidence score.

6

Automated DMCA + evidence

One click generates a signed evidence package, pre-fills a DMCA notice, and files the takedown request automatically. Track status in real time. Export for legal proceedings.

Real-time risk scoring

Every download attempt is scored before any file is served. No client software required.

What gets scored

Six independent risk factors evaluated in under 200ms per request using live IP intelligence.

+60Tor exit node โ€” known anonymization infrastructure
+45Impossible travel โ€” two locations physically unreachable in elapsed time
+40Automated tool โ€” curl, wget, python-requests, go-http user agents
+25VPN / proxy โ€” commercial or residential proxy detected
+20Datacenter IP โ€” cloud hosting / server ASN
+35Download velocity โ€” 5+ attempts within 10 minutes

What happens at each threshold

Scores map to automatic actions โ€” no manual review required for standard cases.

0โ€“34Allow โ€” serve watermarked file normally
35โ€“59Alert โ€” serve file but send real-time email alert to account owner
60โ€“79Corrupt โ€” serve binary-corrupted file silently
80โ€“100Block โ€” hard 403 with THREAT_BLOCKED code, logged to evidence chain
All threat decisions are logged in the tamper-evident evidence chain with the full risk factor breakdown.
128-bit
Partner signature per download
~32
Colluders resisted before attribution degrades
AES-256
Encryption at rest, per-file keys
0
Client software required by recipients

Protection at every scale

All plans include differential watermarking, canary tokens, and threat scoring. Higher tiers unlock forensic analytics, geo-fencing, honeypots, and automated DMCA workflows.

Free forever
Sandbox
$0
No credit card required
For researchers sharing checkpoints with a small circle of trusted partners.
  • โœ“ Up to 25 partner downloads
  • โœ“ Differential forensic watermarking
  • โœ“ Canary token embedding
  • โœ“ Real-time threat scoring
  • โœ“ Silent corruption on duplicate device
  • โœ“ 100 GB storage ยท 20 GB max file
  • โœ• Evidence export & analytics
  • โœ• Forensic Lab
  • โœ• Leak attribution workflow
Start free
AI Lab
$29
per month
For teams distributing proprietary checkpoints to research partners or clients.
  • โœ“ Up to 250 partner downloads
  • โœ“ Everything in Sandbox
  • โœ“ Forensic analytics dashboard
  • โœ“ Forensic Lab (upload & extract)
  • โœ“ Tamper-evident evidence chain
  • โœ“ Leak attribution workflow
  • โœ“ Automated DMCA filing
  • โœ“ Real-time email security alerts
  • โœ“ 750 GB storage ยท 60 GB max file
  • โœ• Geo-fencing & honeypots
Start AI Lab โ†’
Teams
Team
$79
per month
Shared workspaces, advanced partner controls, geo-fencing, and honeypot traps.
  • โœ“ Up to 1,000 partner downloads
  • โœ“ Everything in AI Lab
  • โœ“ ๐ŸŒ Geo-fencing (per-file countries)
  • โœ“ ๐Ÿฏ Honeypot file system
  • โœ“ Partner Intelligence scores
  • โœ“ Shared team workspaces
  • โœ“ Device allowlists
  • โœ“ Partner approval queues
  • โœ“ 1.5 TB storage ยท 100 GB max file
Start Team โ†’
Enterprise
Business
$199
per month
Full compliance, governance, API automation, and advanced legal tooling.
  • โœ“ Up to 2,000 partner downloads
  • โœ“ Everything in Team
  • โœ“ SSO & team access controls
  • โœ“ Approval workflows
  • โœ“ Immutable audit logs
  • โœ“ Compliance attestation export
  • โœ“ Legal hold management
  • โœ“ API keys for automation
  • โœ“ 3 TB storage ยท 150 GB max file
Get started โ†’

โš ๏ธ Honest threat model

DGR is designed for attribution and deterrence, not absolute prevention. No server-side system can stop a determined adversary from photographing their screen, using a hardware capture device, or exfiltrating via a compromised endpoint after authorized access is granted. DGR maximizes the probability that leaks are attributed (forensic watermark + canary correlation), increases the legal strength of that attribution (HMAC-signed evidence chain), and deters casual unauthorized redistribution (silent corruption, threat scoring, geo-fencing, honeypots). It is an attribution-first distribution engine โ€” not a DRM system.