To the rigth you will see a green button named "Code", and clicking it will show a popup. Choose the last option: "Download ZIP". This will download the demo for you. When the file is downloaded, open it and drag the "SEAL-WinDemo-main" folder to your desktop.
If you open the folder, you will see inside:
- This explanation document: README.md
- CONFIG.bat
- Before you can use SEAL, you need to set it up.
- Double click this one and follow the steps.
- (Windows will show a warning, click the underlined "more info" and then the "run anyways")
- My advise: Unless you know what you are doing, choose for a remote signer.
- SEAL.bat
- Drag the image you want to seal onto this. You can optionally enter a comment for that file.
- The resulting singed file will appear in the same folder as these scripts.
- SHOW.bat
- Simply drag any image or file you want to inspect on top of this.
- It will show the contents of a SEAL record if there is one.
- a folder named "internals".
- Can mostly be ignored, but remember, inside here your secret key is stored!
- So do NOT let anyone copy it. (And make a backup of it if you use the demo for important things)
This is a demonstration setup for using the Secure Evidence Attribution Label. SEAL is an open solution for assigning attribution with authentication to media. It can be easily applied to pictures, audio files, videos, documents and other file formats.
Quick start guide:
- Extract the SEALtool_demo folder in the zip file to your desktop.
- Double click CONFIG.bat and follow the instructions.
- To seal a file, drag it to SEAL.bat.
- To inspect a file, drag it to SHOW.bat
Note 1: It may take a few minutes before newly added local signatures becomes valid. Note 2: If you delete a private key, it's lost and can't be used again. Make backups! Note 3: This is a demo, usage in production environments is at your own risk!
Relevant links:
- SEAL specification: https://github.com/hackerfactor/SEAL
- Implementation: https://github.com/hackerfactor/SEAL-C
- This demo itself: https://github.com/named-dodo/SEAL-WinDemo
- A remote signer: https://signmydata.com/
- Discord: https://discord.gg/TVkJwM6Bcx