Core Capabilities
Six forensic-grade subsystems working in concert to ensure evidence integrity from upload to courtroom.
WORM Storage
MinIO Object Lock with compliance-mode retention. Evidence is physically immutable for 7 years. Not even root can delete it.
SHA-256 Hash Chains
Every evidence upload extends a linked hash chain. Tampering with one entry breaks all subsequent entries — blockchain-grade integrity.
AI Transcription
faster-whisper with VAD and word-level timestamps. GPU-accelerated speech-to-text with 97%+ accuracy on forensic recordings.
Speaker Diarization
pyannote.audio identifies and labels individual speakers. Know who said what and when — critical for interrogation recordings.
Threat Intelligence
spaCy NER pipeline extracts names, locations, organizations, and threat indicators from transcripts automatically.
PostgreSQL + Full-Text
Async PostgreSQL with tsvector triggers, GIN index, 8 normalized tables, and Alembic-managed migrations.
Upload & Analyze
Drag and drop audio evidence for instant chain-of-custody registration and AI analysis.
Drag & drop audio files here
or click to browse • WAV, MP3, M4A, OGG, FLAC • Max 50MB
Uploading...
Transcript
Upload and analyze a file to see the transcript here.
Architecture
A layered, pattern-driven backend built for forensic-grade reliability.
The Vision
In a world where digital evidence is the backbone of justice, Resonix ensures it can never be questioned.
$500K Problem, $0 Solution
Enterprise forensic audio tools cost half a million dollars. Resonix brings the same cryptographic guarantees to organizations of any size — open source, auditable, free.
SEC 17a-4 Compliant
WORM storage meets SEC and FINRA retention mandates. Seven-year immutable retention backed by Object Lock — not a checkbox, an architectural guarantee.
Upload to Courtroom
Every step is logged, hashed, and verifiable. Chain-of-custody that holds up under cross-examination. AI transcription with speaker identification for instant intelligence.
Live Health
Real-time backend status fetched from the API.
API Server
Checking...WORM Storage
Checking...Database
Checking...Chain Integrity
Checking...Security Posture
Defense-in-depth against real-world attack vectors.
MIME validation from actual file bytes. Rejects renamed executables.
SHA-256 re-hash on every verify. Any bit change = completely different hash.
Object Lock (WORM) prevents deletion for 7 years. Even root cannot bypass.
Immutable hash chain — modifying one entry breaks all subsequent entries.
The Man Behind The Armor
Security-obsessed systems engineer who believes evidence integrity isn’t optional — it’s architectural. They told me forensic tools cost half a million dollars. I said, “Fine. I’ll build my own.” Resonix was born from that stubborn refusal to accept the status quo — built from scratch with production-grade infrastructure, zero compromises, and the conviction that cryptographic primitives shouldn’t cost more than the justice they protect.
“With great power there must also come great responsibility.”— Stan Lee
Get In Touch
Got questions, feedback, or just want to talk forensic audio? The line is open.
Connect
Find me across the web. PRs welcome, issues encouraged.
“The measure of a man is not how much he suffers in the test, but how he comes out at the end.”— Neal Shusterman