Frequently Asked Questions
Everything you need to know about DAPI services: identity certification (DAPI-IDS),
certified publications (DAPI-PUB), legal protection and defense against deepfakes and impersonation.
📋 Quick Navigation
🔐 DAPI-IDS (Private Certification)
- What is DAPI-IDS?
- Is DAPI a biometric database?
- Is the certification public or searchable?
- Are files kept after certification?
- Does DAPI use AI or automated processing?
- What files are required for DAPI-IDS?
- How long does certification take?
- What do I receive with DAPI-IDS?
- Can I reuse the certification?
- Can I update certified files?
🌐 DAPI-PUB (Certified Publication)
- What is DAPI-PUB?
- Difference between DAPI-IDS and DAPI-PUB?
- What exactly is published?
- Are personal documents published?
- Can I control or remove a publication?
- Who needs DAPI-PUB?
- Can I request DAPI-PUB without DAPI-IDS?
⚖️ Legal Use and Applications
- Is certification legally admissible?
- How does DAPI help against deepfakes?
- How do I use DAPI for takedown requests?
- What is DAPI-PUB legally used for?
- Can I use DAPI in court?
- How do I work with law enforcement?
👥 Who and When
- Who should use DAPI?
- When to request certification?
- What to do in emergencies?
- Is DAPI available for minors?
💼 Process and Support
🔐 DAPI-IDS (Private Certification)
Completely private forensic identity certification
What is DAPI-IDS?
DAPI-IDS (Digital Authentication for Personal Identity – Identity Documentation Service) is a completely private and confidential forensic identity certification service.
Main function: Create a private evidential package that cryptographically certifies
your authentic identity through documents, photos, voice, and video, without any public exposure.
Distinctive features of DAPI-IDS:
- Completely private: No public profile, no indexing, no online searchability
- Certified forensic evidence: SHA-256 hashes and eIDAS qualified timestamps
- Complete evidential package: Professional certificate with expert declaration
- Flexible use: Usable in court, for platform reports, complaints, cease and desist letters
- Total control: Only you decide when, where, and how to use the certification
Is DAPI a biometric database?
No. DAPI-IDS is not a biometric database and does not create, maintain, or manage any public identity registry or facial recognition system.
What DAPI-IDS does: Creates a private certification package with cryptographic hashes
and timestamps that prove specific identity files existed at a specific moment in time.
What DAPI-IDS does NOT do:
- Does not archive searchable biometric templates
- Does not maintain facial recognition profiles
- Does not store voice prints in recoverable form
- Does not create comparison or matching databases
- Does not allow searches or queries on biometric data
Is my DAPI-IDS certification public or searchable online?
No. DAPI-IDS is private by design. No public profile is created, no information is indexed by search engines, and nothing about your certification is made searchable or visible online.
Complete privacy: Your certified materials, certificate, and all
related documentation are delivered exclusively to you via secure private channels.
Only you possess the evidential package, and only you decide when and how to use it.
This privacy-first approach is fundamentally different from public verification platforms
or identity registries that create searchable profiles or verification badges. DAPI-IDS provides
forensic evidence without exposure—the certification exists to strengthen your defensive
position when needed, not to publish your identity online.
The only public element: The timestamp verification tool,
which allows independent verification that your timestamp certificate was issued
by a qualified provider and has not been tampered with. This verification process reveals no
personal information—it only confirms the mathematical validity of the timestamp itself.
Are my files kept after DAPI-IDS certification?
DAPI-IDS is designed with strict data minimization principles. Your biometric files are used to produce the certification package and are not kept longer than necessary for delivery and quality verification. DAPI-IDS deletion protocol:- Original files: Permanently deleted with secure deletion that makes recovery impossible
- Email communications: Emails containing your files are deleted from mail servers within 30 days of certification delivery (except for technical/legal retention obligations limited to delivery metadata)
- Temporary backups: Deleted following the same protocol as original files
What IS permanently retained: Only irreversible cryptographic hashes
(SHA-256 fingerprints), timestamp certificates, essential metadata (name, DAPI code,
certification date), and delivery receipts. These elements are necessary to maintain
the verifiability and legal value of your issued certification.
This approach ensures that DAPI can provide ongoing verification support if needed
(e.g., if a court requires authentication of your certificate years later), while
your actual biometric files do not remain in any recoverable form after completion
of the deletion protocol.
Does DAPI use artificial intelligence or automated processing?
No. DAPI-IDS is a manual certification process supervised by forensic experts. It is not an automated platform, does not use AI-based identity validation, and does not rely on algorithmic processing of your biometric data.
Each certification is personally handled by a forensic expert with experience
in legal evidence preparation. No mass processing, no automated verification algorithms, no AI analysis.
Why manual processing is fundamental:
- Superior quality control: Expert human review detects issues that automated systems miss (file corruption, inconsistencies, quality problems)
- Legitimacy verification: Personal assessment helps identify and prevent fraudulent certification requests or misuse attempts
- Legal robustness: Expert supervision and declaration strengthen evidential value compared to automated certifications lacking human oversight
- Customization: Each case can be evaluated in its specifics and needs
- Professional responsibility: A human expert assumes professional responsibility for the certification
What files are required for DAPI-IDS certification?
DAPI-IDS certification is based on identity-related files that establish your biometric and documentary baseline (by “baseline” or “biometric baseline” we mean a set of certified reference files and not a searchable biometric profile). These files create a comprehensive forensic reference point for your identity. Required files for standard DAPI-IDS:- 📄 Identity Document (mandatory): Valid government-issued ID—passport, national identity card, or driver’s license. Must be current and not expired. High-quality PDF or JPG format. This file remains ALWAYS private and is never published under any circumstances.
- 📷 Facial Photograph (mandatory): Frontal photo establishing your authentic appearance. Requirements: frontal pose, natural lighting, no sunglasses or obstructions, neutral background preferred, minimum resolution 1280x720px
- 🎤 Voice Recording (mandatory): 30-60 second audio sample certifying your authentic vocal characteristics. We will provide standard text to read. Requirements: clear audio quality (MP3 or WAV format), recorded in quiet environment without background noise
- 🎥 Verification Video (optional but strongly recommended): 10-15 second video for enhanced authentication. Requirements: looking at camera with centered face, slight lateral head movement (left/right), MP4 format. This provides the strongest evidence against deepfake manipulation
Why these specific files? This combination covers the three main vectors
of identity abuse: facial appearance (deepfake videos, fake photos), voice (cloning scams,
audio manipulation), and documentary identity (impersonation, profile cloning). The verification
video adds depth perception and movement that significantly increase difficulty for deepfake generation.
You will receive detailed technical specifications and clear instructions before file submission.
If you have questions about file preparation, DAPI support will guide you during the
secure communication phase.
How long does the DAPI-IDS certification process take?
Processing times vary depending on current workload and case complexity. DAPI-IDS uses expert-supervised manual certification rather than automated processing, which means quality takes priority over speed. Typical timelines (standard processing):- Day 0: You submit certification request via website
- Day 1-2: We contact you via secure private channel with unique DAPI code and detailed instructions for file submission
- Day 2-3: You submit files via secure channel; expert processes certification (hash generation, timestamp application, certificate creation, quality control)
- Day 3-4: Certificate package is delivered via secure email (PEC for traceability and delivery receipts)
Urgent processing available: For urgent cases requiring immediate defensive action
(ongoing deepfakes, legal emergencies, urgent takedowns), urgent delivery is available
in 3-6 hours with surcharge. Contact DAPI support to request priority processing.
After submitting your initial request, you will receive a personalized timeline estimate based
on current workload and your case’s specific requirements. We maintain direct communication
during the process so you always know the current status.
What do I receive after DAPI-IDS certification?
You receive a complete forensic evidential package designed for immediate use in legal proceedings, platform disputes, and defensive contexts. The package is professionally formatted and includes everything needed to prove authenticity and temporal precedence. The complete DAPI-IDS certification package includes:- 📋 Official DAPI Certificate (PDF, 6 pages): Professionally formatted document with DAPI logo, unique certificate number, your name, certification date, timestamp seal, complete list of certified files with SHA-256 hashes, technical specifications, forensic methodology explanation, legal use guide, verification instructions, and expert declaration with digital signature
- 🔐 SHA-256 Cryptographic Hashes: Unique digital fingerprints for each certified file (identity document, photo, voice, video). These hashes enable independent verification that your files match the certified originals
- ⏰ Qualified Timestamp Certificate: RFC 3161 compliant timestamp from eIDAS qualified provider (.tsr file format). Provides legally recognized temporal proof that can be independently verified using public validation tools
- 📊 Complete Technical Documentation: Chain of custody report detailing applied forensic standards (ISO/IEC 27037), file handling procedures, hash generation methodology, timestamp application process, and verification protocols
- ⚖️ Legal Use Guide: Practical instructions for using the certificate in platform takedowns, GDPR complaints, criminal reports, civil proceedings, and law enforcement collaboration—including specific templates and recommended language
- ✅ Verification Instructions: Quick guide to independently confirm file integrity using provided hashes, enabling third parties (lawyers, courts, platforms) to verify authenticity without DAPI Team involvement
❗ Critical: Always keep your original files! The DAPI-IDS certificate contains
only cryptographic hashes, not the files themselves. To effectively use the certification, you must
present both the certificate and your original files so third parties can verify that
the hashes match. Without the original files, the certificate alone cannot prove authenticity.
Keep them in a safe place!
Can I reuse the same DAPI-IDS certification for multiple disputes?
Yes, absolutely. A single DAPI-IDS certification can be reused as baseline evidence against multiple abuses involving your identity materials. You don’t need separate certifications for each incident—the same certified baseline remains valid to prove your authentic identity regardless of how many times it’s misused. Typical multiple-use scenarios for DAPI-IDS:- Fake profiles across different platforms: If someone creates fake accounts using your photos on Instagram, Facebook, LinkedIn, TikTok, and dating sites, a single DAPI-IDS certificate supports takedown requests on all platforms simultaneously
- Ongoing impersonation: If impersonation persists over time with new fake accounts appearing after previous ones are removed, the same certificate continues to provide authentic proof
- Different types of abuse of the same material: The certification can support both platform reports and legal actions simultaneously (e.g., Instagram takedown request + police report + civil lawsuit + GDPR complaint)
- Cross-border disputes: One certificate supports actions in multiple jurisdictions (eIDAS timestamps have EU-wide recognition and SHA-256 hashing is internationally accepted)
- Abuse evolution: From social media impersonation to deepfake videos, from voice cloning to BEC scams—the same baseline certification protects you
Economic advantage: Pay once for DAPI-IDS certification and you can
use it repeatedly for all future incidents involving your certified materials.
No additional cost for multiple use.
Temporal limitation: The certification must refer to the same certified files
and the same identity baseline. If your appearance changes significantly (major weight change,
cosmetic surgery, significant aging) or your identity document expires and is renewed,
consider updating your certification to maintain optimal effectiveness.
Can I update or replace my DAPI-IDS certified files later?
Yes. If your identity document changes (renewal, new passport) or you want to update your baseline materials due to significant appearance changes, you can request a new DAPI-IDS certification. This creates a new verifiable reference point for the updated file set. When to consider updating DAPI-IDS certification:- Identity document expiration: Your certified ID has expired or been renewed (new passport, renewed identity card)
- Significant physical appearance changes: Major weight change (±15kg), complete beard growth or removal, significant cosmetic procedures, aging effects over 5+ years
- Permanent vocal changes: Medical conditions affecting voice, throat surgical procedures, aging-related vocal changes
- Enhanced protection: Original certification didn’t include verification video, but now you want maximum protection against deepfake videos
- Legal name change: Marriage, divorce, or other official name change that makes previous documents obsolete
- Each certification is independent with its own unique DAPI code, timestamp, and certificate
- Your previous certification remains valid for its original time period
- Updating creates an additional reference point rather than invalidating the previous one
- You can present both certifications if needed (e.g., “this is how I looked in 2023 and how I look today in 2026”)
Best practice for long-term protection: Consider updating
DAPI-IDS certification every 3-5 years or when identity documents are renewed, maintaining
a current authenticated baseline as your appearance naturally changes over time.
Renewal discount: Existing users updating their certification
receive a 20% discount from the standard rate. Contact us for details.
🌐 DAPI-PUB (Certified Publication)
Public verifiable evidence for takedowns and legal actions
What is DAPI-PUB?
DAPI-PUB (Digital Authentication for Personal Identity – Public Evidence) is the certified publication service that creates publicly verifiable evidence from an existing DAPI-IDS certification.
Main function: Make specific certified files publicly accessible
and verifiable by third parties (platforms, courts, law enforcement) to accelerate takedowns,
reports, and legal actions, while always keeping personal documents private.
Distinctive features of DAPI-PUB:
- Controlled public evidence: Only files you authorize are published
- Unique verification URL: Each publication has a permanent, verifiable link
- Sensitive document protection: Identity documents are NEVER published
- Takedown acceleration: Platforms verify immediately without email exchanges
- Opposable proof: Usable in legal proceedings as public evidence
- Permanent traceability: Evidence remains verifiable over time
What is the difference between DAPI-IDS and DAPI-PUB?
| Feature | 🔐 DAPI-IDS | 🌐 DAPI-PUB |
|---|---|---|
| Visibility | Completely private | Publicly verifiable |
| Access | Only you possess the certificate | Anyone with URL can verify |
| Published files | None (private package) | Only authorized ones (photo, video, audio) |
| ID Documents | Certified but private | NEVER published |
| Primary use | Private forensic evidence for courts | Fast platform takedowns |
| Verification speed | Requires document exchange | Instant verification via URL |
| Requirement | Fundamental base service | Requires existing DAPI-IDS |
| Control | Total control over use and distribution | Permanent (not modifiable) |
In summary: DAPI-IDS is private forensic certification for legal and defensive use.
DAPI-PUB is public evidence to accelerate takedowns and make proof opposable without having to
share private documents. DAPI-IDS is the foundation, DAPI-PUB is the optional public accelerator.
What exactly is published in DAPI-PUB?
Only the files you expressly authorize for publication are published, along with related cryptographic verification references. Elements publishable in DAPI-PUB:- ✅ Link to certified file
- ✅ Cryptographic hashes (SHA-256): Digital fingerprints for integrity verification
- ✅ Downloadable .tsr file link: eIDAS timestamp. The timestamp file (.tsr) is made publicly accessible exclusively to allow independent verification of certification authenticity. The file contains no personal data, does not allow reconstruction of certified contents, and cannot be reused on other files.
- ✅ DAPI Code: Unique certification identifier
- ✅ Certified name: Name associated with certification
- ✅ Certification date: When certification was issued
❌ NEVER published in DAPI-PUB:
How a DAPI-PUB publication looks:
The public page displays authorized files alongside their cryptographic hashes, with verification
buttons that allow anyone to confirm that displayed files exactly match those certified in the
original timestamp. It also includes clear instructions on how third parties can independently
verify authenticity.
No additional data is made public beyond what is strictly necessary to enable
evidence verification and facilitate platform takedowns.
- Identity documents (passport, identity card, driver’s license)
- Information not explicitly authorized
- Sensitive data not necessary for verification
- Addresses or personal contacts
Are my personal identity documents made public with DAPI-PUB?
No. Never. Under no circumstances.
ABSOLUTE GUARANTEE: Identity documents
(identity card, passport, driver’s license) are NEVER published
with DAPI-PUB, not even if explicitly requested.
Sensitive document protection:
- Identity documents remain always confidential and are used exclusively for internal DAPI-IDS certification purposes
- Even if you request DAPI-PUB publication of all certified files, the operator automatically excludes identity documents from publication
- The cryptographic hash of the ID document is included in the private DAPI-IDS certification, but is not publicly exposed in DAPI-PUB
- This protection is locked at the system level and cannot be bypassed even upon explicit request
Can I control, modify, or remove a DAPI-PUB publication?
DAPI-PUB publications are created as permanent evidential proofs. Once issued, public certifications cannot be modified in their contents to preserve evidential integrity. Characteristics of DAPI-PUB permanence:- Content immutability: Published files, hashes, and timestamps cannot be altered after publication
- Permanent URL: The publication link remains stable over time to allow lasting references in legal proceedings and reports
- Availability guarantee: Publication remains accessible to ensure third parties can verify evidence even years later
- Evidential integrity: Non-modifiability ensures evidence cannot be contested as “altered subsequently”
Removal in exceptional circumstances: In extraordinary documented situations
(judicial authority orders, motivated requests from specific legal proceedings,
victim protection needs), DAPI may evaluate interventions on publication access modality,
always respecting evidential integrity.
Best practice: Before requesting DAPI-PUB, carefully evaluate which files
to authorize for publication, as the decision is permanent. If in doubt,
consult DAPI support who will help you decide the optimal strategy for your case.
Alternative for doubtful cases: You can start with DAPI-IDS certification alone
(private) and request DAPI-PUB later only if and when it becomes necessary to accelerate
takedowns or provide public evidence.
Who needs DAPI-PUB?
DAPI-PUB is particularly useful when the primary goal is accelerating platform takedowns or making evidence opposable without exchanging private documents. Ideal situations for DAPI-PUB:- Mass impersonation across platforms: Fake profiles on Instagram, Facebook, TikTok, LinkedIn—DAPI-PUB provides an instant verification URL that dramatically accelerates takedown requests
- Deepfakes in public circulation: Fake videos or audio published online— DAPI-PUB public evidence immediately demonstrates which content is authentic
- Public disputes: When you must publicly demonstrate your authentic identity against accusations that you are the fake
- Collaboration with journalists: For fact-checking and reporting that must quickly verify your identity
- Proceedings with public entities: When authorities, law enforcement, or institutions must verify quickly without handling private document exchanges
- Proactive prevention: Public figures wanting an “official verification page” to cite preventively
- Legal cases where evidence is presented only in court
- Situations where privacy has absolute priority
- Preventive protection without abuse currently ongoing
- Direct collaboration with individual platforms via private channels
Recommended strategy: Always start with DAPI-IDS (private certification).
Request DAPI-PUB only if you need to protect online content.
Can I request DAPI-PUB without having DAPI-IDS?
No. DAPI-PUB necessarily requires an existing and valid DAPI-IDS certification. Why DAPI-IDS is a mandatory prerequisite:- Quality control: Manual review performed in DAPI-IDS ensures that DAPI-PUB files belong to the same person and are appropriate before any publication
- Traceability: Each DAPI-PUB is linked to the unique DAPI code generated in the original IDS certification
- Phase 1 – DAPI-IDS: Request and obtain complete private forensic certification of your identity files
- Phase 2 – DAPI-PUB (optional): If and when public evidence becomes necessary, request certified publication specifying which files you authorize for publication
Two-phase process advantage: Obtain complete private forensic protection
first, then strategically decide if and when to make specific evidence public.
This flexibility allows you to adapt strategy to situation evolution.
Combined package available: If you know from the start you’ll need
both private certification and public publication, you can request both services
simultaneously with a combined discount. Contact us for details.
⚖️ Legal Use and Applications
How to use DAPI in legal proceedings and reports
Is DAPI certification legally admissible in court?
Yes. DAPI is specifically designed to produce an evidential package that meets forensic standards recognized in legal proceedings. Legal components of DAPI certification:- Cryptographic hashes (SHA-256): Universally recognized industry standard that proves file integrity with mathematical certainty. Widely recognized in all modern legal systems
- Qualified timestamps (eIDAS compliant): RFC 3161 timestamps from qualified providers recognized in all EU jurisdictions. Thanks to FEDIS, usable as technical evidential element in European Union, United States, United Kingdom, Canada, Australia, and other jurisdictions with equivalent legal frameworks
- Forensic methodology (ISO/IEC 27037): Industry standard procedures for digital evidence handling that meet technical requirements for evidential admissibility
- Chain of custody documentation: Complete record of what was received, how it was processed, and when it was delivered, enabling third-party expert verification of the certification process
- Forensic expert declaration: Declaration signed by expert with professional credentials, methodology explanation, and professional attestation. Expert can be cited as technical witness if needed
- Criminal complaints for impersonation, identity theft, deepfakes, defamation
- Civil lawsuits for damages from identity abuse, privacy violations
- GDPR proceedings for right to erasure (Art. 17) and rectification (Art. 16)
- Cease and desist letters for unauthorized identity use
- Custody disputes where fabricated evidence is contested
- Disciplinary or employment litigation proceedings
Important: While DAPI provides technically sound and forensically valid evidence,
legal effectiveness depends on your specific case, jurisdiction, and how evidence is presented.
DAPI certification is an evidential tool that significantly strengthens your
position, but results depend on case-specific facts and legal circumstances.
For complex disputes, always consult legal counsel who can integrate the DAPI package
into a comprehensive legal strategy and present it effectively in court.
Expert support available: If needed, the forensic expert who performed
the certification can provide supplementary expert reports, methodology clarifications, or technical
testimony to strengthen admissibility and evidential assessment. Contact us for details.
How does DAPI help against deepfakes and impersonation?
DAPI doesn’t prevent deepfakes or impersonations from occurring, but provides verifiable evidence of integrity and temporal precedence that decisively supports your defensive position when abuse occurs. How DAPI-IDS addresses deepfakes and impersonation:- Establishes certified authentic baseline: Your certified photos, videos, voice recordings, and documents serve as mathematically verified reference for comparison with fake content
- Proves temporal precedence: Qualified timestamp demonstrates that your authentic materials existed before fake content appeared—critical element for disputes where “who copied whom” or “who is original” is contested
- Enables technical forensic comparison: Experts can analyze differences between your certified authentic materials and contested deepfake content to identify AI-generated artifacts, manipulation traces, biometric inconsistencies, or synthetic patterns
- Strengthens platform reports: Providing cryptographically certified evidence of your authentic identity dramatically accelerates platform takedown response compared to unverified claims or simple “screenshots”
- Supports immediate legal action: Certification package provides structured, forensically valid evidence for criminal complaints, civil proceedings, GDPR enforcement, and cease and desist letters—without having to “prove who you are” each time
- Reverses burden of proof: With DAPI certification, you have the certified proof. Anyone accusing you of being “the fake” must now prove that your qualified-timestamp certified evidence is false—practically impossible
- Deepfake videos: Your certified video shows natural movement and 3D depth that deepfake videos struggle to replicate perfectly. Forensic comparison can identify AI artifacts
- Voice cloning: Your certified voice recording captures unique acoustic characteristics (prosody, timbre, cadence) that can be compared with cloned audio
- Manipulated photos/face-swaps: Your SHA-256 certified photo proves mathematically which image is the authentic original
- Fake profiles/impersonation: Your certified documents and materials demonstrate that you are the legitimate identity owner
Fundamental best practice: Obtain DAPI certification BEFORE
problems occur. Proactive certification eliminates the challenge of proving authenticity
after abuse has already started, when establishing “who is real and who is fake” becomes immensely
more difficult. With preventive DAPI, you already have timestamped proof that cannot be contested.
Technical support for deepfake analysis: If needed, we can connect you
with forensic experts specializing in technical deepfake analysis for supplementary expert reports
comparing your certified materials with contested content.
How do I use DAPI for platform takedown requests?
DAPI certification package can be attached to takedown requests and abuse reports as structured supporting evidence. While it doesn’t guarantee content removal (platforms have discretion in moderation decisions), it decisively strengthens your position with verifiable evidence. Optimal strategy for takedowns with DAPI-IDS (private certification):- Identify specific violation: Fake profile, unauthorized image use, impersonation, deepfake video, voice cloning, or other identity abuse
- Locate official reporting mechanism: Each platform has specific procedures (Instagram, Facebook, LinkedIn, TikTok, Twitter/X, YouTube, OnlyFans, dating sites, etc.)
- Submit complete report: Use platform’s official form providing all required details
- Attach DAPI-IDS certificate: Include your certificate PDF as attachment showing cryptographically certified proof of authentic identity
- Make explicit reference in text: Write clearly: “Certified proof of authentic identity attached (DAPI-[your code]). Certificate includes SHA-256 hashes and eIDAS qualified timestamp that mathematically prove material authenticity and temporal precedence.”
- Provide original files if requested: If platform requests additional verification, provide your original files so they can independently verify that certificate hashes match exactly
- In report, provide DAPI-PUB URL: Instead of attaching documents, simply insert link to your certified publication
- Platform verifies instantly: Moderators can immediately see certified authentic photos/videos/audio without downloading files or manually verifying hashes
- Significant acceleration: Verification takes 30 seconds instead of days. DAPI-PUB completely eliminates delays due to “identity verification”
Typical impact reported by users: Providing DAPI certification with
takedown requests typically accelerates platform response,
because certified proof completely removes ambiguity about who is the legitimate identity owner.
With DAPI-PUB, response can arrive in faster times.
Recommended report template (text to include):
Subject: Urgent Takedown Request - Unauthorized Identity Use We report unauthorized use of our identity in [specific profile/content]. We have attached DAPI forensic certification (Code: DAPI-XXXXXX) that cryptographically proves the authenticity of our original materials through: - SHA-256 cryptographic hashes of authentic files - eIDAS qualified timestamp proving temporal precedence - Forensic expert declaration with ISO/IEC 27037 methodology [If DAPI-PUB] Evidence is publicly verifiable at: [DAPI-PUB URL] We request immediate removal of unauthorized content in compliance with your Terms of Service and applicable laws on identity protection and personal data. We remain available for any necessary additional verification.For GDPR-based takedown requests (right to erasure Art. 17): DAPI certificate serves as strong proof that you are the legitimate data subject, eliminating platforms’ common excuse that they “cannot verify your identity.” Forensic certification definitively resolves the identity verification problem that often slows GDPR requests.
What are DAPI-PUB Certified Publications legally used for?
DAPI-PUB certified publications serve to make evidence immediately verifiable by third parties without having to share private documentation or wait for email exchanges. Legal and practical applications of DAPI-PUB:- Accelerated platform reports: Moderation teams verify authenticity in seconds by clicking URL instead of requesting documents and waiting days
- Mass impersonation cases: A single URL can be provided to dozens of platforms simultaneously for coordinated takedowns
- Deepfakes in public circulation: When fake content is public, public evidence immediately counters disinformation
- Journalistic verification and fact-checking: Journalists and fact-checkers can quickly verify your identity for accurate reporting
- Support for legal demands: DAPI-PUB URL included in demand letter demonstrates immediate seriousness and validity of request
- Law enforcement proceedings: Investigators can verify autonomously without handling sensitive file exchanges
- Public disputes: When accused of being the fake, DAPI-PUB provides incontestable public proof of your authenticity
- Legal litigation with public evidence: URL can be cited in procedural documents as evidence accessible to opposing party and judge
Main function of DAPI-PUB: Reduce ambiguity, accelerate verifications,
and enable opposability to third parties without compromising confidentiality of personal
identity documents. It’s the bridge between privacy and public verifiability.
Impact difference vs DAPI-IDS:
- With DAPI-IDS only: “We send you our DAPI certificate as attachment, please verify it” → Requires recipient to download, open, read, and understand technical documentation → Days/weeks
- With DAPI-PUB: “Verify our authentic identity at this URL: [DAPI-PUB link]” → Recipient clicks and immediately sees certified materials → Minutes
How do we present DAPI in court?
DAPI certification can be presented in court as technical documentary evidence, typically accompanied by your lawyer’s testimony or supplementary technical expert report. Recommended procedure for using DAPI in court:- Consult your lawyer: Show DAPI certification package to your attorney who will evaluate how to integrate it into overall litigation strategy
- File as documentary evidence: DAPI certificate is filed as attachment to brief/pleading along with other evidential documents
- Keep original files: Bring certified original files on secure device to allow hash verification in court if requested
- Explain methodology to judge: Your lawyer explains that DAPI certificate uses recognized forensic standards (SHA-256, eIDAS, ISO 27037) to prove integrity and temporal precedence
- Supplementary expert report if needed: For complex technical cases, forensic expert who performed certification can provide supplementary expert report or technical testimony
- Independent verification: Court-appointed technical expert can independently verify hashes and timestamp following verification instructions included in certificate
- eIDAS qualified timestamp: Has full legal validity in EU (Regulation 910/2014) and growing international recognition
- SHA-256 cryptographic hashes: Universally accepted standard for digital integrity proof, used by law enforcement and courts worldwide
- ISO 27037 methodology: International standard for digital evidence management, recognized as forensic best practice
- Documented chain of custody: Complete traceability of certification process meeting evidential requirements
- Forensic expert declaration: Professional attestation with credentials strengthening technical reliability
Important: DAPI provides technical proof of authenticity and precedence,
but your overall factual reconstruction (what happened, who did what, what damages)
requires additional documentation and legal strategy. DAPI is a powerful evidential tool,
but must be integrated into a comprehensive defense well-constructed by your lawyer.
Expert support available: If your lawyer deems necessary testimony
from expert who performed certification, we can provide:
- Written supplementary expert report
- Methodology clarifications
- In-court technical testimony (if jurisdiction permits)
- Support to court-appointed technical expert for verification
How do we work with law enforcement using DAPI?
DAPI certification can be presented to law enforcement as documentary evidence supporting complaints for impersonation, identity theft, deepfakes, defamation, or other crimes. Procedure for presenting DAPI to law enforcement:- Prepare complaint: Gather all abuse evidence (key screenshots of fake profiles, links to deepfake content, received messages, testimonies)
- Include DAPI-IDS certificate: Bring complete certification package in paper and digital format when filing complaint
- Explain certification: Illustrate that DAPI provides cryptographic proof that your materials are authentic and temporally precede fake content
- Provide original files: Bring certified original files on USB so investigators can verify hash matches
- If available, provide DAPI-PUB: Certified publication URL allows investigators to verify quickly without handling sensitive files
- Offer technical support: Inform that forensic expert who performed certification is available for clarifications if needed
- Proof of precedence: Qualified timestamp unequivocally demonstrates that your materials existed before fake content
- Rapid identity verification: Investigators can immediately confirm you are legitimate identity owner
- Technically sound evidence: Forensic certification is more credible than simple claims or unverified screenshots
- Facilitates technical expert reports: If in-depth forensic deepfake analysis is needed, DAPI certificate provides authentic baseline for comparison
- Supports international requests: For cross-border cases, certification with internationally recognized standards facilitates law enforcement collaboration
Typical crimes DAPI supports complaints for:
Collaboration with specialized cyber police:
For cybercrimes, specialized cyber police units are appropriate authorities. DAPI
certification is particularly appreciated because it uses forensic methodologies their
experts immediately recognize as technically valid.
Investigative support available: If law enforcement needs
technical clarifications on certification or assistance interpreting forensic elements,
we are available to collaborate by providing:
- Impersonation (Art. 494 Italian Penal Code / equivalent statutes)
- Aggravated defamation (Art. 595 Italian Penal Code / equivalent statutes)
- Unlawful data processing (Art. 167 Privacy Code / GDPR violations)
- Revenge porn (Art. 612-ter Italian Penal Code / equivalent statutes)
- Extortion or fraud via false identity
- Harassment or stalking
- Detailed technical methodology explanations
- Supplementary documentation if requested
- Support for hash and timestamp verification
- Technical consultation if authorized by prosecutor
👥 Who and When
Who should use DAPI and when to request it
Who should use DAPI?
DAPI is designed for anyone wanting legally-oriented identity proof before misuse occurs. The service is particularly valuable for individuals whose identity exposure creates heightened risk of impersonation, deepfakes, or abuse. Main user categories:- Public figures and media professionals: Politicians, journalists, TV personalities, influencers, and anyone with public visibility vulnerable to reputation attacks timed for maximum damage. Deepfakes and impersonation can destroy careers in hours
- Executives and business leaders: CEOs, directors, CFOs, and decision-makers at risk of voice cloning for business email compromise (BEC) attacks, CEO fraud, or fake authorization scams that can cause millions in losses
- Content creators and influencers: YouTubers, streamers, podcasters, social media personalities whose image and voice are valuable targets for fake endorsements, impersonation scams, or compromising AI-generated content
- Professionals in sensitive sectors: Lawyers, doctors, psychologists, academics, financial advisors, or other professionals whose professional reputation and credibility critically depend on verified authentic identity
- Private individuals with security concerns: Anyone experiencing harassment, stalking, revenge porn, or threats and wanting defensive evidence ready before escalation to deepfakes or mass impersonation
- Domestic violence or abuse victims: People vulnerable to digital evidence manipulation in custody disputes, contentious divorces, or legal proceedings where opposing party might fabricate false evidence
- Families protecting minors: Parents seeking to protect children against AI-generated explicit content, grooming via false identities, impersonation cyberbullying, or custody disputes with fabricated evidence
- Political candidates and activists: Individuals exposed to disinformation campaigns, political deepfakes, or coordinated attacks during election periods or public controversies
- Witnesses in sensitive proceedings: People testifying in high-profile cases vulnerable to discrediting attempts via fake content
Fundamental principle: Proactive vs. reactive protection. DAPI is most effective
when obtained BEFORE abuse occurs. Once deepfakes or impersonation
is already happening, proving “who is real” becomes significantly more difficult, expensive, and stressful.
Certification creates your verified baseline that cannot be contested later.
Even if you don’t fit these categories, consider DAPI if:
- You have significant online presence
- You regularly share photos or videos publicly
- You’re involved in legal disputes or litigation
- You work in positions of trust or authority
- You fear someone might abuse your identity
When should we request DAPI certification?
The optimal answer is: as soon as possible, ideally before any abuse occurs. Ideal timing for proactive certification:- Before increasing public visibility: If you’re about to launch a campaign, appear in media, publish a book, run for public office—certify BEFORE
- At start of legal disputes: As soon as contentious divorce, custody dispute, civil lawsuit begins—certify immediately before opposing party can fabricate false evidence
- When receiving threats: If someone threatens to “ruin you,” “spread compromising content,” or “circulate material about you”—certify immediately
- Before reporting crimes or testifying: If you’re about to report someone, testify in important trial, or expose wrongdoing—preventively protect your identity
- When assuming high-profile positions: New appointments to executive roles, government positions, trust positions—certify at start of term
- Periodically for general protection: Even without immediate threats, certification every 3-5 years creates documented authentic baseline for future protection
- Deepfakes or impersonation already circulating and rapidly expanding
- Fake content actively damaging reputation
- Immediate evidence need for imminent legal proceedings
- Credible threats of imminent fake material distribution
- Emergency situations where every hour counts
Cost of waiting: The longer you wait after abuse starts, the more difficult
it becomes to establish truth. If you wait weeks or months, fake content spreads,
your reputation suffers damage, and establishing “who is original” requires costly legal battles.
Proactive certification costs a fraction of what “repair” costs afterward.
Preventive certification advantage:
- No urgency = lower costs (no urgent surcharge)
- Time to prepare optimal quality files
- Timestamp that precedes any future abuse
- Peace of mind knowing you’re protected
- Ability to act immediately if abuse occurs
What to do in emergency (deepfake or impersonation in progress)?
If you’re already experiencing active attack with deepfakes, impersonation, or identity abuse, act immediately following this emergency procedure: PHASE 1 – Immediate actions (within first hours):- Document everything: Take key screenshots of fake content, save URLs, record testimonies, collect received messages. Don’t delete anything
- Request urgent DAPI: Immediately contact DAPI support specifying “EMERGENCY – Urgent Processing Requested”. Provide brief situation description
- Start platform reports: While awaiting certification, start reporting fake content to platforms using their official mechanisms
- Alert your network: Inform trusted contacts, colleagues, family that fake content is circulating so they can help identify and report
- Receive certified package: Urgent processing delivers quickly
- Update all reports: Add DAPI certificate or DAPI-PUB URL to all reports already sent to platforms
- File law enforcement complaint: Go to specialized cyber police with complete DAPI package and all abuse documentation
- Consider immediate legal action: Urgently consult attorney to evaluate immediate demands, urgent motions, injunctive requests
- Monitor platform responses and follow up on takedowns
- Coordinate legal actions with your attorney
- Collaborate with law enforcement in investigations
- Implement additional security measures (privacy settings, monitoring)
- Consider public communication if appropriate
DAPI urgent processing: In emergency situations, we offer priority
processing with fast delivery. Surcharge applied. Contact us immediately
specifying “EMERGENCY” in subject to activate urgent protocol.
What NOT to do during emergency:
- ❌ Don’t directly confront whoever created fake content
- ❌ Don’t delete evidence thinking to “make problem disappear”
- ❌ Don’t wait “to see if it goes away on its own” (it doesn’t, it worsens)
- ❌ Don’t attempt technical counterattack actions or “hack back”
- ❌ Don’t ignore problem hoping “nobody will believe it”
- Cyber Police: National cyber crime reporting portals
- Data Protection Authority: For GDPR violations
- DAPI emergency support: Dedicated number/email for urgent cases
Is DAPI available for minors?
Yes, with parental/legal guardian authorization. We offer DAPI certification for minors specifically to protect children and adolescents against digital identity abuse. How DAPI works for minors:- Authorization required: Both parents (or legal guardians) must provide explicit written consent for certification
- Parent identity documents: Parents provide their own documents to verify consent legitimacy
- Enhanced privacy: Minors’ files receive additional protection with accelerated deletion (24 hours instead of 48)
- No publication: DAPI-PUB not available for minors. Only private DAPI-IDS certification for legal protection
- Parental control: Certificate delivered exclusively to parents who decide when and how to use it
- AI-generated explicit content: Pornographic deepfakes of minors are becoming tragically common. Preventive certification provides proof that minor’s authentic image is different
- Cyberbullying with impersonation: Fake accounts created to harass, defame, or socially isolate minor at school
- Online grooming: Predators cloning minor’s identity to approach other children or for blackmail
- Custody disputes: Conflicting parents who might fabricate false “evidence” to damage opposing party
- Identity theft: Fraudulent use of minor’s identity for accounts, scams, or illegal activities
Special minor protection: Minor certification follows
enhanced protection protocols. All files handled with maximum confidentiality and deleted
more quickly than adult certifications. No publicly accessible evidence is ever created.
Procedure to request DAPI for minor:
- Complete request form specifying it’s for a minor
- Receive parental consent form to complete and sign
- Provide identity documents of both parents/guardians
- Provide minor’s identity document (if available) or birth certificate
- Proceed with minor’s file submission per received instructions
- Receive certification delivered to parents/guardians
- Recent facial photo of minor
- Minor’s identity document (if available)
- Brief video (optional but recommended)
- Voice recording (optional, recommended for adolescents)
- Minor has online presence (social media, YouTube, gaming)
- You’re facing divorce or custody dispute
- Minor has experienced cyberbullying or online harassment
- There are concerns about safety or grooming
- You want preventive protection for peace of mind
💼 Process and Support
How to request DAPI and available support
How do we request DAPI certification?
Starting the certification process is simple. Use the dedicated request page to submit initial information, and DAPI Team will guide you through secure next steps. DAPI certification request process:- Step 1 – Initial request: Visit request page and complete contact form with basic information (name, email, brief description of protection needs, any urgency)
- Step 2 – DAPI code generation: System automatically generates your unique DAPI code (e.g., DAPI-7F3A9C) and sends request confirmation email
- Step 3 – Secure communication: DAPI Team contacts you within 24-48 hours (or 1-2 hours if urgent) from secure private channel with personalized detailed instructions for file preparation and submission
- Step 4 – Submit certified files: Submit files via secure channel following specific instructions received in private communication
- Step 5 – Processing: Forensic expert processes certification (hash generation, timestamp application, certificate creation, quality control, expert declaration)
- Step 6 – Delivery: Complete package delivered via secure email (PEC) within estimated timeframe. You receive tracked delivery confirmation
- Request form: Primary and recommended method
- Direct email: For preliminary questions or complex cases
- Phone/WhatsApp: For urgent consultations or immediate clarifications
Response guarantee: We respond to all requests within 24-48 hours
(within 1-2 hours for cases marked urgent). If you don’t receive response, check
spam folder or contact us through alternative channel.
How much does DAPI certification cost?
DAPI pricing depends on requested service type and processing urgency. Surcharges:- Court expert support: Upon quote
- Existing certification update: -20% discount
- Renewal/update: 20% for users with existing certification
- Multiple certifications: Progressive discount for certifying multiple people (e.g., family unit, business team)
- Entities and organizations: Special rates for high volumes
- Bank transfer (preferred for traceability)
- Credit/debit cards (Visa, Mastercard, American Express)
- PayPal
- Invoicing with payment terms for companies/entities
How are sensitive files transmitted securely?
Security of your personal and sensitive files is top priority. We use multiple security protocols to ensure your documents remain confidential throughout the process. Security protocols for file transmission:- End-to-end encrypted channels: All files transmitted through channels with TLS/SSL encryption preventing interception during transit
- PEC (Certified Email): For official communications and final delivery, we use PEC providing legal value in terms of delivery receipts.
Important security: NEVER send identity documents or sensitive files
via normal unprotected email. Always await specific instructions from DAPI Team
on how to securely transmit files. Any request to send files via unsecure channels
should be considered suspicious.
Alternatives for users with special security needs:
- Physical delivery: For extremely sensitive cases, possible to deliver files on encrypted USB at our offices by appointment
- Corporate channels: For companies, we can use your secure file transfer systems if compliant with our standards
- European servers with full GDPR compliance for PEC data exchange
- Access limited to expert assigned to your case only
- Deletion of emails with personal data after delivery
- No permanent backup of biometric files
How do we verify DAPI certificate authenticity?
Independent verification of certificate authenticity is a fundamental DAPI feature. Anyone can verify a certificate is genuine and untempered. Available verification methods: 1. Cryptographic Hash Verification (verify file = certificate):- Free online tools: Use online SHA-256 calculators (e.g., md5file.com/calculator) to calculate received file hash
- Comparison: Compare calculated hash with that reported in DAPI certificate. If exactly matching, file is authentic and unmodified
- Command-line tools:
- Windows:
certutil -hashfile filename.jpg SHA256 - Mac/Linux:
shasum -a 256 filename.jpg
- Windows:
- TSA verification tool: Use qualified timestamp provider’s public verification service (link provided in certificate)
- Upload .tsr file: Upload timestamp file (.tsr) included in DAPI package
- Verification result: Service confirms:
- Timestamp is genuine and issued by qualified provider
- Exact date and time of certification
- Timestamp has not been tampered
- Provider certificate is valid
- Digital signature: PDF certificate is digitally signed. Adobe Reader or other PDF readers show validation icon
- Signature verification: Click signature icon to see details:
- Who signed (DAPI forensic expert)
- When it was signed
- If document was modified after signature
- DAPI registry: Each DAPI code is unique
- Online verification: If available on site, you can enter DAPI-PUB code in online verification tool to confirm it exists and is valid
- Direct contact: You can always contact DAPI support to confirm certificate authenticity by providing code
Complete verification in 3 steps:
Why independent verification is important:
- Calculate SHA-256 of file → must match certificate
- Verify .tsr timestamp → must be valid and untempered
- Check PDF digital signature → must be valid and unmodified
- Opposable proof: Third parties (courts, platforms, investigators) can verify autonomously without depending on DAPI
- Transparency: Verification process is public and mathematically certain, not based on “blind trust”
- Permanence: Even 10 years later, anyone can verify certificate is genuine using same tools
- Contestation resistance: Impossible to claim certificate is “fake” when cryptographic verification is mathematically certain
Still Have Questions?
If you haven’t found the answer you’re looking for, we’re here to help. Contact us with your specific questions about the certification process, technical requirements, or how DAPI can address your particular protection needs.