RESONIX
0%
R E S O
    N I X
    FORENSIC AUDIO INTELLIGENCE

    Cryptographic chain-of-custody, WORM-locked storage, and AI-powered audio intelligence. Built for evidence that must never be questioned.

    0-bit SHA INTEGRITY
    0 API ENDPOINTS
    0+ TESTS PASSING
    // ENTERING THE SYSTEM

    Core Capabilities

    6 forensic-grade subsystems — scroll to explore

    SCROLL TO EXPLORE
    // CORE CAPABILITIES

    Core Capabilities

    Six forensic-grade subsystems working in concert to ensure evidence integrity from upload to courtroom.

    01

    WORM Storage

    MinIO Object Lock with compliance-mode retention. Evidence is physically immutable for 7 years. Not even root can delete it.

    MinIO • S3-Compatible • Object Lock
    02

    SHA-256 Hash Chains

    Every evidence upload extends a linked hash chain. Tampering with one entry breaks all subsequent entries — blockchain-grade integrity.

    SHA-256 • Chain-of-Custody • Tamper-Evident
    03

    AI Transcription

    faster-whisper with VAD and word-level timestamps. GPU-accelerated speech-to-text with 97%+ accuracy on forensic recordings.

    faster-whisper • CTranslate2 • GPU
    04

    Speaker Diarization

    pyannote.audio identifies and labels individual speakers. Know who said what and when — critical for interrogation recordings.

    pyannote • Speaker ID • Clustering
    05

    Threat Intelligence

    spaCy NER pipeline extracts names, locations, organizations, and threat indicators from transcripts automatically.

    spaCy • NER • Real-time Alerts
    06

    PostgreSQL + Full-Text

    Async PostgreSQL with tsvector triggers, GIN index, 8 normalized tables, and Alembic-managed migrations.

    SQLAlchemy 2.0 • asyncpg
    SIGNAL INTEGRITY VERIFIED
    // EVIDENCE UPLOAD

    Upload & Analyze

    Drag and drop audio evidence for instant chain-of-custody registration and AI analysis.

    Drag & drop audio files here

    or click to browse • WAV, MP3, M4A, OGG, FLAC • Max 50MB

    // SYSTEM DESIGN

    Architecture

    A layered, pattern-driven backend built for forensic-grade reliability.

    API Layer
    FastAPI14 Endpoints • Rate Limiting
    Intelligence Layer
    faster-whisperGPU STT
    pyannoteDiarization
    spaCy NERThreats
    Task Queue
    CeleryGPU/CPU Routing
    RedisBroker • AOF
    Core Layer
    AudioHandlerFacade
    HashEngineSHA-256
    ValidatorMIME
    Storage Layer
    MinIOWORM • Object Lock
    PostgreSQLFull-Text • 8 Tables
    Facade
    Repository
    Factory
    Strategy
    // WHY RESONIX

    The Vision

    In a world where digital evidence is the backbone of justice, Resonix ensures it can never be questioned.

    $500K Problem, $0 Solution

    Enterprise forensic audio tools cost half a million dollars. Resonix brings the same cryptographic guarantees to organizations of any size — open source, auditable, free.

    SEC 17a-4 Compliant

    WORM storage meets SEC and FINRA retention mandates. Seven-year immutable retention backed by Object Lock — not a checkbox, an architectural guarantee.

    Upload to Courtroom

    Every step is logged, hashed, and verifiable. Chain-of-custody that holds up under cross-examination. AI transcription with speaker identification for instant intelligence.

    7 Year Retention
    97% STT Accuracy
    0 Single Points of Failure
    // SYSTEM STATUS

    Live Health

    Real-time backend status fetched from the API.

    API Server

    Checking...

    WORM Storage

    Checking...

    Database

    Checking...

    Chain Integrity

    Checking...
    // THREAT MODEL

    Security Posture

    Defense-in-depth against real-world attack vectors.

    Malware UploadMITIGATED

    MIME validation from actual file bytes. Rejects renamed executables.

    Evidence TamperingMITIGATED

    SHA-256 re-hash on every verify. Any bit change = completely different hash.

    Unauthorized DeletionMITIGATED

    Object Lock (WORM) prevents deletion for 7 years. Even root cannot bypass.

    Insider ThreatMITIGATED

    Immutable hash chain — modifying one entry breaks all subsequent entries.

    // ORIGIN STORY

    The Man Behind The Armor

    Soham Saha

    Soham Saha

    @spyder0010

    Security-obsessed systems engineer who believes evidence integrity isn’t optional — it’s architectural. They told me forensic tools cost half a million dollars. I said, “Fine. I’ll build my own.” Resonix was born from that stubborn refusal to accept the status quo — built from scratch with production-grade infrastructure, zero compromises, and the conviction that cryptographic primitives shouldn’t cost more than the justice they protect.

    Full-stack Python — FastAPI, asyncio, SQLAlchemy 2.0
    Infrastructure — Docker, MinIO (4-disk erasure), PostgreSQL, Redis
    AI/ML Pipeline — faster-whisper, pyannote diarization, spaCy NER
    Security — WORM storage, SHA-256 hash chains, HMAC, Object Lock
    PythonFastAPIPostgreSQLDockerMinIORedisCeleryspaCyWhisperGSAP
    “With great power there must also come great responsibility.”— Stan Lee
    // OPEN CHANNEL

    Get In Touch

    Got questions, feedback, or just want to talk forensic audio? The line is open.

    Connect

    Find me across the web. PRs welcome, issues encouraged.

    “The measure of a man is not how much he suffers in the test, but how he comes out at the end.”
    — Neal Shusterman