Rewriting History is Over:
How Rolling Timestamps Make Video Footage Tamper-Proof

Imagine a world where every second of a surveillance camera feed is cryptographically sealed the moment it's recorded. Where footage from a city intersection, a government building, or a jail cell carries built-in mathematical proof of exactly when it was captured — and whether even a single frame has been altered since.

Now imagine that this proof doesn't depend on any single company, government, or institution to maintain it. It's anchored to the most secure, decentralized computing network ever created. No one can tamper with it. No one can erase it. No one can rewrite what happened.

This isn't a thought experiment. It's working technology. And it changes the fundamental equation of trust in digital records.

We Have a Problem: The Past Has Edit Access

Black and white photos comparing one of Stalin's deputies who was deleted from history.

Altering the past is not a new problem. For example, when someone fell out of favor with the Soviet regime, they would get wiped from history.
Source: https://www.hoover.org/research/inside-stalins-darkroom

We live in an era where digital records can be altered without leaving a trace. A video file can be edited frame by frame. A database entry can be rewritten. A government document can be modified and re-dated. The tools to do this are widely available, increasingly sophisticated, and — with the rise of generative AI — getting better every day.

This isn't hypothetical. Deepfake technology has advanced to the point where researchers estimate the vast majority of synthetic media is now used for misinformation and fraud. Courts around the world are grappling with a new reality: digital evidence that looks authentic may not be. The burden of proving that a recording hasn't been tampered with is falling squarely on whoever presents it.

But the problem goes deeper than courtrooms. When digital records can be quietly altered, the incentive structure of institutional accountability breaks down. If surveillance footage can be edited before an investigation begins, the footage loses its purpose.

If public records can be silently modified, transparency becomes meaningless. If data integrity depends entirely on trusting the people who control the servers, then integrity has a single point of failure.

The uncomfortable truth is this: in a purely digital world, the ability to alter the past is the ability to control the present.

This isn't a new fear. George Orwell described it with chilling clarity decades ago. What's new is that the tools to do it are now trivially accessible, and the tools to detect it are locked in an arms race they may not win.

Detection is necessary. But it's not sufficient. What we actually need is prevention — a way to make alteration mathematically provable by anyone, not just forensically detectable by experts.

What If We Didn't Have to Trust Anyone?

The concept of a timestamp is simple: it's proof that a piece of data existed in a specific state at a specific point in time. Notaries have been doing this with physical documents for centuries. In the digital world, the equivalent is a cryptographic hash — a unique mathematical fingerprint of a file — anchored to a time-stamped record that can't be changed after the fact.

The question is: anchored to what?

Traditional digital timestamps rely on certificate authorities — centralized entities that vouch for the time and integrity of a record. This works, until the authority itself is compromised, coerced, or simply makes a mistake. It's trust layered on top of trust, all the way down.

"It's turtles all the way down."

Bitcoin changed this equation. When a cryptographic hash is embedded in the Bitcoin blockchain, it's secured by the same proof-of-work mechanism that protects trillions of dollars in value. It can't be altered without harnessing more specialized computing power than any entity has ever assembled. The timestamp doesn't depend on trusting any company, any government, or any single point of failure. It depends on math.

The OpenTimestamps protocol, which has been in production for nearly a decade, makes this process efficient and scalable. Rather than requiring a separate Bitcoin transaction for every file, it aggregates thousands of timestamps into a single transaction using a Merkle tree structure. The result: any file can be timestamped on the Bitcoin blockchain and the proof can be independently verified by anyone with access to a Bitcoin node.

At Simple Proof, we've spent the past three years turning this protocol into practical solutions for institutions that can't afford to have their records questioned. We've worked with governments, election authorities, and public agencies to timestamp documents, certifications, and official records — creating an unbroken chain of integrity that anyone can audit.

But until now, there's been a limitation: you could only timestamp files that already existed. A document, a PDF, a signed contract — you'd create the file, then timestamp it. The proof begins at the moment of stamping.

What about data that's still being created?

Introducing Rolling Timestamps: Integrity at the Speed of Data

This is the breakthrough we've been building toward. We call the concept rolling timestamps — the ability to continuously timestamp streaming data as it's being generated, not after the fact.

Here's how it works in practice: as a video stream flows from a camera, the system continuously computes cryptographic hashes at regular intervals — every few seconds, or at whatever frequency the use case demands. Each hash captures the state of the video up to that exact moment. These hashes are then submitted to the Bitcoin blockchain through the OpenTimestamps protocol, creating an unbroken chain of proofs that correspond to specific points in the video's timeline.

The result is a companion file — an OTS Log — that runs alongside the video. From this log, you can extract a specific proof corresponding to any moment in the stream: a particular byte position, a Unix timestamp, a specific frame, etc. If even a single bit of the video is altered after the fact, the hash won't match, and the tampering becomes mathematically provable.

This isn't a watermark that can be stripped. It's not metadata that can be edited. It's a cryptographic commitment anchored to the most immutable ledger in existence.

You can see this working right now at rolling.simpleproof.com. The demo shows a live video feed alongside the rolling timestamps being generated in real time. Each entry in the OTS Log represents a cryptographic snapshot of the video at that exact moment, ready to be verified against the Bitcoin blockchain.

Live viewer screen showing a digital clock displaying a demo of Rolling Timestamps.

Simple Proof's rolling timestamp for video demo: every few seconds, a new cryptographic proof is generated and sent to the Bitcoin blockchain as the video is streamed. Visit rolling.simpleproof.com

Why This Matters Now

The timing of this technology isn't coincidental. Several converging forces make rolling timestamps not just useful, but urgent:

  • The deepfake crisis is accelerating. AI-generated video has reached a level of sophistication where trained professionals struggle to distinguish real from synthetic. Detection tools are improving, but they're playing defense in a game where the offense has a structural advantage: it's always easier to create a convincing fake than to prove one. Rolling timestamps flip the paradigm. Instead of trying to prove a video is fake after it surfaces, institutions can prove their footage is authentic from the moment of capture.
  • Legal standards are evolving. Courts in multiple jurisdictions are establishing new frameworks for the admissibility of digital evidence, with growing emphasis on cryptographic proof of integrity and chain of custody. In the U.S., Federal Rules of Evidence 902(13) and 902(14) already allow self-authentication of records generated by reliable electronic systems — a framework well suited to blockchain-based timestamps. Institutions that adopt this technology now will be ahead of the curve as these standards mature.
  • Public trust in institutions is fragile. Whether it's law enforcement agencies, government archives, or electoral systems, public confidence depends on the belief that records haven't been tampered with. Cryptographic timestamps don't ask citizens to trust an institution's word — they provide independently verifiable proof. This is what transparency looks like when it's backed by math instead of trust.
  • Surveillance infrastructure is growing, but accountability isn't keeping up. Cities and governments worldwide are investing heavily in camera networks for public safety. But footage without provable integrity is footage that can be questioned, challenged, or dismissed. Rolling timestamps give surveillance data the same kind of chain-of-custody assurance that physical evidence has long required.

Beyond Video: A New Category of Data Integrity

While video surveillance is the most vivid application, rolling timestamps work for any streaming data. Security logs, IoT sensor feeds, financial transaction records, scientific instrument data — anything that's generated continuously and needs provable integrity.

Consider a data center monitoring its own infrastructure. Every access log, every temperature reading, every network event can be continuously timestamped. If an incident occurs, the logs carry built-in proof that they haven't been altered retroactively to cover someone's tracks.

Or consider election systems. We've already worked with election authorities to timestamp official results on the Bitcoin blockchain — proving that published outcomes haven't been altered after the fact. Rolling timestamps could take this further, providing continuous integrity verification of the audit logs and tabulation records that election management systems generate throughout the counting process.

The pattern is the same everywhere: wherever data integrity matters, and wherever the people controlling the data shouldn't be the only ones who can verify it, rolling timestamps provide an answer.

All digital information should be timestamped in an immutable manner. For example: documents, data, secrets, voting records, surveillance footage... as it happens.

The World Is Moving

We're not the only ones who see the urgency. Governments around the world are beginning to recognize that digital record integrity is a national security issue, a public trust issue, and a practical governance issue.

We're actively working with public institutions in multiple countries to deploy these solutions. The conversations have moved well beyond theory — they're about procurement timelines, integration requirements, and deployment schedules.

The technology is ready. The protocol is open. The need is obvious. What's been missing is the bridge between the cryptographic infrastructure and the institutions that need it most.

That's what Simple Proof builds.

Where History Can't Be Rewritten

For most of human history, the victors wrote the record. Documents were burned, archives were sealed, testimony was suppressed. In the digital age, the mechanics changed but the vulnerability remained: whoever controls the servers controls the past.

We believe that's ending. Not because people in power have suddenly become more honest — but because a mathematical tool now exists that makes altering records provable, regardless of who holds the data.

Rolling timestamps are the next step in that progression. They extend the guarantee from files that already exist to data that's still being created. They make it possible to protect the integrity of a video stream, a security log, or a sensor feed from the very first byte.

The past should be a matter of record, not a matter of convenience. If you're an institution that holds data the public depends on, the question isn't whether you'll need this technology. It's whether you'll adopt it before your credibility is tested.

Simple Proof — because history shouldn't have an edit button. Visit simpleproof.com →