Login Sign Up

Verify online content

Check if a piece of content was likely AI-generated and see provenance & ownership signals.

Beta Client-side demo
How it works
  • Combine watermark detectors, content credentials (C2PA), and model forensic signals.
  • Ownership via signed attestations (passkeys), device-bound keys, or platform proofs.
  • Zero-retention demo: analysis runs in-browser.
Results will appear here after verification.

Reference architecture

Pluggable signals, identity attestations, zero-retention by default.

1) Provenance
  • C2PA / Content Credentials extraction
  • Platform-issued attestations (creator handles, device keys)
  • Signature verification & chain of custody
2) AI-ness
  • Watermark detectors (vendor-specific, open)
  • Model forensics (stylometry, spectral, edit distance)
  • Cross-modal heuristics (audio/video/text)
3) Ownership
  • Passkey-backed signing for creators
  • Axiam face sign-in as identity oracle
  • Dispute workflows & human review

Digital ID

Create a DID, verify identity with Axiam Face Sign-In, and sign your content.

Handle
@your.handle
Axiam Face Sign-In
Not signed in
Axiam widget mounts here. Using mocked flow for demo.
DID
— (none yet)
Public Key (JWK)
Generate a signature tag bound to your DID (and Axiam subject if verified).

About VeriTrust

Building trust in the digital age through verifiable content and identity.

Our Mission

To provide cutting-edge tools that enable individuals and organizations to verify the authenticity of digital content, protect intellectual property, and establish trusted digital identities in an era of AI-generated media.

Our Vision

A world where digital content can be trusted, creators are properly attributed, and identity verification is seamless, secure, and privacy-preserving for everyone.

Core Principles

🔒

Privacy First

Zero-retention by default. Your data stays in your browser.

🔓

Open Standards

Built on W3C DIDs, C2PA, and open cryptographic protocols.

User Empowerment

You control your identity and content verification.

Technology Stack

Security & Cryptography

  • • WebCrypto API (ECDSA P-256)
  • • SHA-256 fingerprinting
  • • JWK (JSON Web Keys)
  • • Client-side key generation

Identity & Standards

  • • W3C Decentralized Identifiers (DIDs)
  • • C2PA Content Credentials
  • • Passkey integration
  • • Biometric authentication (Axiam)

AI Detection

  • • Watermark detection algorithms
  • • Model forensic analysis
  • • Metadata extraction
  • • Multi-modal verification

Privacy & Storage

  • • Browser LocalStorage
  • • Zero server retention
  • • Client-side processing
  • • Encrypted key storage

Education

Research, whitepapers, and technical notes.

Loading…

Ask VeriTrust

We'd love to hear from you.

Email
hello@veritrust.example
Security
security@veritrust.example
Support
24/7 Available