Verifier · browser-only
Check whether a signed PDF is genuine.
Drop any signed PDF below — FreeSign, DocuSign, Adobe Sign, or anything else. We'll tell you who signed it, whether it has been changed since, and when it was signed. The file never leaves your browser.
Works on PDFs signed by any standard provider, not just FreeSign. Adobe Reader's green/yellow icon is a separate question about local trust settings — we explain that in the result panel.
No signed PDF on hand? Try a sample: sealed-good.pdf (drop it back here — expect 4 green ✓) · sealed-tampered.pdf (one byte flipped in the signed region — expect CMS & OTS to fail; chain & TST stay green)
Signature details
- Signer name
- —
- Signer email
- —
- Signing time
- —
- Document SHA-256
- —
- CMS profile
- —
- Signature algorithm
- —
- Issuer
- —
The signature matches the document cryptographic signature · CMS PKCS#7 / RFC 5652
Pending…
Details
The signer's identity certificate checks out certificate chain · X.509 leaf → CA
Pending…
Details
The signing time is provable trusted timestamp · RFC 3161
Pending…
Details
Independent public timestamp on the Bitcoin ledger OpenTimestamps Bitcoin anchor · FreeSign bonus
Pending…
Details
The signing-ceremony evidence is embedded and intact FreeSign evidence record · CMS unsignedAttribute 1.3.6.1.4.1.65834.1.2
Pending…
Details
The evidence record is an unsigned CMS attribute — it could be stripped or altered without breaking the seal. Its integrity is self-contained: it carries a signed canonical payload and the browser's public key, so this check re-verifies that signature independently. The evidence is trusted because of that signature, not because it sits inside the CMS.
Will Adobe Reader show a green check? Adobe Reader AATL trust-list membership
Drop a PDF above and this tile will report on the specific signer.
Audit trail
FreeSign keeps an append-only, hash-chained audit log for every envelope — each event commits to the one before it. This check fetches that chain and re-computes every link in your browser; it does not trust FreeSign's own verdict. Unlike the signature checks above, this one needs the FreeSign service to be online — the audit log lives in FreeSign's database, not inside the PDF.
What a green chain verdict means — and what it doesn't. A valid chain proves the log is internally consistent and untouched by anyone without write access to FreeSign's database. The chain is not signed and not anchored outside that database, so it does not, on its own, prove the timeline against the FreeSign operator. The document's authoritative tamper-evidence does not rely on this chain: it comes from the CMS signature, the RFC 3161 timestamp, and the OpenTimestamps/Bitcoin anchor verified above.
Sign a PDF without uploading it
The verifier on this page is the read-only counterpart of FreeSign's signing flow — both run entirely in your browser, both never see your PDF.
Sign a PDF now →