Skip to content
Krellix

01Why defensible

Defensibility is a specific, testable claim.

Anyone can write a tool that exports email. Defensibility means the export can survive a motion to compel, a Rule 901 authenticity challenge, and a hostile cross-examination about chain of custody. That requires three things — cryptographic hashing, RFC 3161 timestamping, and a human-legible manifest — combined in a way any reviewer can re-verify on their own.

SHA-256 + MD5RFC 3161 timestampFRE 901 / 902(14)Sedona Conference aligned

02The three pillars

Every defensibility argument rests on three things, not one.

01

Integrity

A hash proves a specific byte sequence existed. If even one bit of a collected file changed after Krellix wrote it — accidentally or otherwise — the hash stops matching. A reviewer can run a one-line command and get a yes/no on every file in the export.

SHA-256 · MD5

02

Authenticity of time

A third-party timestamp proves the collection existed by a specific moment. Without it, the collection's timestamps are metadata your adversary can claim was fabricated. With it, the claim becomes a forgery allegation against DigiCert.

RFC 3161 · TSA signature

03

Chain of custody

A manifest records who the operator was, who the custodian was, what tenant the collection was pulled from, what query produced the results, and what counts came back. Combined with the hash and timestamp, it tells the entire authentication story on a single page.

ChainOfCustody.json

03Hashing

Two hashes per file, because opposing counsel's expert will demand both.

SHA-256 is the modern cryptographic standard. MD5 is legacy — it's no longer collision-resistant, but most eDiscovery tooling from the 2010s still treats an MD5 match as the primary deduplication signal. Krellix writes both because the review platform your reviewer uses may insist on one or the other, and having both is cheaper than re-collecting.

What the hash proves

  • The file written to disk was not altered between collection and delivery — any tampering breaks the match.
  • The same file, collected twice, produces the same hash. Deduplication across the review set is exact, not approximate.
  • Matching hashes with opposing counsel's copy establishes that both sides are reviewing the same byte-level material.
  • Under Federal Rule of Evidence 902(14), a certified copy of an electronic record authenticated by a cryptographic hash is self-authenticating.

The hash files Krellix writes are plain text, in the standardsha256sum/md5sumformat. Any reviewer with a Linux or macOS terminal can runsha256sum -c Hashes.sha256.txtand get a pass/fail on every file in the export.

04RFC 3161 timestamping

When you collected it, signed by a third party.

A file hash proves that a specific byte sequence existed. A RFC 3161 timestamp proves that specific byte sequence existed by a specific moment. Without a third-party timestamp, every timestamp in a collection is just metadata your opposing counsel can argue was forged. With one, the argument becomes a claim against DigiCert's public signing key.

01

Hash the manifest

Krellix SHA-256 hashes ChainOfCustody.json after it finishes the collection. The hash, not the file itself, is what gets sent to the TSA — so no collection contents leave your machine.

02

Send a TSQ, receive a TSR

Krellix wraps the hash in a TimeStampReq (RFC 3161 section 3.2) and POSTs it to a public Time Stamp Authority. The response is a TimeStampResp signed by the TSA's private key. The response embeds the hash, the exact UTC time the TSA received the request, and the TSA certificate chain.

03

Store the TSR next to the manifest

The .tsr file is stored in 07_TimestampMaterials alongside the TSA public certificate and re-verification instructions. Any reviewer with OpenSSL can re-validate the chain themselves — no Krellix required.

04

Failover path

DigiCert is the default TSA. If the DigiCert TSA is unavailable at collection time, Krellix automatically falls back to Sectigo, then GlobalSign — all three are WebTrust-audited commercial TSAs. The TSA used is recorded in the manifest so verification knows which public key to validate against.

05The artifact itself

Here's what an actual Krellix manifest looks like.

This is an excerpt. The real file is longer — one entry per collected file — but every Krellix manifest has this shape. Opposing counsel or an expert reviewer can read it without special tooling, and it tells them exactly who collected what, from whom, when, and under what query.

06 · Legal framework

What the rules actually require.

Krellix's output is shaped by these four sources. Your jurisdiction may have additional rules — Krellix doesn't relieve you of the obligation to check.

FRE 901(a)

Authenticating evidence

The proponent must produce evidence sufficient to support a finding that the item is what the proponent claims. For a digital collection, that means you can explain where it came from, who collected it, how it was preserved, and demonstrate that it hasn't been altered. The Krellix manifest and hash manifest answer those four questions in writing.

FRE 902(14)

Self-authentication by hash

Added in 2017. Certified electronic data authenticated by a cryptographic hash is self-authenticating if the process is described by a qualified person. This is the specific rule that makes SHA-256 admissible without additional foundation witnesses for the hash itself — you still need the foundation for the collection process, but the integrity proof is automatic.

FRCP 26(f) + 34

Discovery and preservation

The meet-and-confer obligation requires parties to discuss preservation at the outset. Producing a defensibly-collected set — one with hashes and a chain-of-custody manifest — preempts fights over form and completeness. The Sedona Conference commentaries recommend this approach specifically for avoiding motions to compel re-production.

RFC 3161

Time-Stamp Protocol

The IETF standard for public-key timestamping. A TSA signs a hash of your data together with a trusted timestamp, producing a token any third party can verify against the TSA's certificate chain. Krellix uses DigiCert, Sectigo, and GlobalSign — all WebTrust-audited public TSAs whose timestamps are accepted by Adobe Reader, OpenSSL, and every major forensics tool.

Disclosure

Krellix is software, not legal advice.

The product produces artifacts that are widely accepted as defensible — industry-standard hashes and a public TSA timestamp, with documentation a third party can verify. Whether any specific collection is admissible in any specific matter depends on jurisdiction, opposing counsel, the judge, the scope of the hold, and facts about the custodian that Krellix can't know. We do not guarantee admissibility. If you're on a matter with real stakes, a qualified attorney should review your preservation plan before collection. That's true with or without Krellix.

Questions about fit? Read about the founder or email sales.

Next step

Ready to collect your first defensible export?

Download the 14-day trial. No credit card, no sales call — just the real build on your machine. If it doesn't hold up under a motion to compel, don't pay.