Click on any pixel to place your mark and leave your story
Witness the creation of a cryptographic proof.
> Hashing public inputs...
Creating a unique fingerprint of your inputs.
> Constructing Groth16 proof object...
Assembling the proof with cryptographic randomness.
> Encoding proof to Base64...
Packaging the final proof for transmission.
> ✓ Proof Generated & Stored.