We deployed C2PA signing for a client in advanced manufacturing. They were submitting a bid that involved extensively using video of an AI simulation for a new robotics system. The review committee was predictably wary of digital projections. So, we integrated C2PA's Content Credentials to bind a verifiable, tamper-evident manifest directly into the video file personally. This wasn't just a digital watermark but a cryptography derived audit trail. The reviewer could inspect the video file's metadata and quickly see the complete lineage - which AI models were used for the simulation, the raw data source and which engineering lead approved the final render. The questions about the video's integrity evaporated. Discussions focused on merits of the underlying system itself, trust and claim validation.