Verify online content
Check if a piece of content was likely AI-generated and see provenance & ownership signals.
- Combine watermark detectors, content credentials (C2PA), and model forensic signals.
- Ownership via signed attestations (passkeys), device-bound keys, or platform proofs.
- Zero-retention demo: analysis runs in-browser.
Reference architecture
Pluggable signals, identity attestations, zero-retention by default.
- C2PA / Content Credentials extraction
- Platform-issued attestations (creator handles, device keys)
- Signature verification & chain of custody
- Watermark detectors (vendor-specific, open)
- Model forensics (stylometry, spectral, edit distance)
- Cross-modal heuristics (audio/video/text)
- Passkey-backed signing for creators
- Axiam face sign-in as identity oracle
- Dispute workflows & human review
Digital ID
Create a DID, verify identity with Axiam Face Sign-In, and sign your content.
—
About VeriTrust
Building trust in the digital age through verifiable content and identity.
Our Mission
To provide cutting-edge tools that enable individuals and organizations to verify the authenticity of digital content, protect intellectual property, and establish trusted digital identities in an era of AI-generated media.
Our Vision
A world where digital content can be trusted, creators are properly attributed, and identity verification is seamless, secure, and privacy-preserving for everyone.
Core Principles
Privacy First
Zero-retention by default. Your data stays in your browser.
Open Standards
Built on W3C DIDs, C2PA, and open cryptographic protocols.
User Empowerment
You control your identity and content verification.
Technology Stack
Security & Cryptography
- • WebCrypto API (ECDSA P-256)
- • SHA-256 fingerprinting
- • JWK (JSON Web Keys)
- • Client-side key generation
Identity & Standards
- • W3C Decentralized Identifiers (DIDs)
- • C2PA Content Credentials
- • Passkey integration
- • Biometric authentication (Axiam)
AI Detection
- • Watermark detection algorithms
- • Model forensic analysis
- • Metadata extraction
- • Multi-modal verification
Privacy & Storage
- • Browser LocalStorage
- • Zero server retention
- • Client-side processing
- • Encrypted key storage
Education
Research, whitepapers, and technical notes.
Ask VeriTrust
We'd love to hear from you.