Artworks
Your collection is empty.
Trust Systems by charm.farm
Your collection is empty.
Drop an image here or browse to select one.
Your identity and signature will be cryptographically embedded.
A signed copy has been saved next to your original file.
Your tag is now linked to this artwork. To update the NFC chip with the artwork details, go to Tags, select the tag, and tap Update Tag.
Pin the original file to IPFS
The manifest includes an IPFS CID that points to the original file (not the sealed copy). You must pin that file to IPFS for the CID to resolve.
Original file path:
Import public certificates (.crt) from people you trust. Transfers can only be made to trusted contacts. You can also sign and verify text messages with your identity.
Name
—
Organization
—
Certificate
Public Key Fingerprint
—
Choose an identity.
Export a plain-text private-key backup for offline safekeeping. The file is not encrypted—store it securely.
Export the full encrypted vault (database, metadata, and copies of linked images) to a zip file for backup or moving to another machine.
Update your master password. You will need to unlock with the new password after changing.
Generate a CSR to have your identity cryptographically verified by charm.farm.
Import the PEM file signed by charm.farm.
Trust Systems lets you attach your identity to your artwork so anyone can verify it came from you. Seal means signed by this app: when you seal an image, Trust Systems embeds a signed C2PA manifest. An artwork can also be signed by any C2PA-compliant app; Seal specifically means done by Trust Systems. The manifest includes your name, title, and optionally a link to a physical NFC tag. The manifest travels with the file and cannot be removed without breaking the signature.
You can also write NFC tags (NTAG 424 DNA) so that when someone taps a tag on your artwork, their phone opens a verification URL with secure proof that the tap is authentic. The tag links the physical object to the sealed digital asset.
The underlying standard is C2PA (Coalition for Content Provenance and Authenticity). Sealed images can be verified by other C2PA tools and by this app’s Inspector.
Images live on your file system; the app stores metadata and links, not copies. Moving or deleting files outside the app can break those links.
Recommended order of operations for a complete artwork with physical tag:
filename_charmed.jpg) is saved next to the original.You can seal without a tag (digital-only) or bind/write tags without sealing (e.g. to prepare tags in advance). The workflow above is for the full physical + digital path.
There are two ways to connect an artwork and a tag. Each has a different effect on provenance strength.
Option 1: Link at seal time (strongest). When you seal an artwork, select a tag in the Tag dropdown. The physical link is embedded directly in the signed manifest inside the image file. Any C2PA verifier — this app, Adobe Content Credentials, or others — can see the connection between your artwork and tag. After sealing, go to Tags and click Update Tag to update the NFC chip with the artwork details.
Option 2: Link after sealing. In Tags, select an enrolled tag and use Link Artwork to assign a sealed artwork. This updates the NFC chip immediately so tapping the tag opens a link to your artwork. However, because the image was already sealed, the physical anchor is not inside the signed manifest. Trust Systems' Inspector will still show the link (from your vault records), but external C2PA verifiers will not.
For the strongest provenance — where the physical tag and digital artwork are cryptographically bound together in the manifest — use Option 1. Use Option 2 when you've already sealed and want to connect a tag afterward without re-sealing.
The sidebar has seven items:
At the bottom: Lock Vault clears the session.
_charmed suffix (e.g. filename_charmed.jpg). The Inspector shows a charm.farm badge for charmed assets.Cards show drafts and certified pieces with title, author, and status. The vault stores metadata and paths; files stay on disk. Click a card to load into Seal. Certified items have a manifest ID and IPFS CID (when sealed). Removing deletes only the record, not the file.
Drop or browse for an image. Fill Title and Author. Tag is optional — select a bound tag to embed the physical link directly in the signed manifest. This is the strongest way to connect your artwork and tag. Save as Draft stores without sealing. Seal Artwork creates a signed copy next to the original (e.g. filename_charmed.jpg for charm.farm identities). After sealing with a tag, go to Tags and click Update Tag to update the NFC chip.
If you seal without selecting a tag, you can still link one later from the Tags page using Link Artwork. See "Linking a Tag to an Artwork" above for the difference between these two approaches.
Manage NFC tags (NTAG 424 DNA). Hold a tag on the reader and click Rescan to detect it. For factory-default tags: set the verification URL (defaults to charm.farm/tap), then Bind Tag to personalize. For tags you control: Link Artwork assigns a sealed artwork and writes the NFC chip in one step. If already linked to an artwork, Update Tag updates the NFC chip with the artwork's CID and manifest ID. Release Tag gives up control and clears the artwork link. Claim Tag takes a released tag for your identity.
Drop or browse for a sealed image. The Inspector validates the manifest and shows a timeline (created, published, transferred). Status pills show C2PA validation (Success, Untrusted, Failure) and vault correlation (Match, Orphan). IPFS CID is shown when present. Transfer Asset is enabled after a successful verify.
Create profiles with name, organization, and country. The profile selector lists all; charm.farm ones are labeled (charm.farm). Use Set Active to switch. Export your public certificate to share. Export Private Key Backup saves a PEM for recovery—store securely. Under charm.farm Integration: generate a CSR, submit for approval, then import the signed chain to upgrade.