Digital Authentication for Personal IdentityDigital Authentication for Personal IdentityDigital Authentication for Personal Identity

Frequently asked questions

Frequently Asked Questions

Everything you need to know about DAPI certification: what it is, how it works,
what you receive, and how to use it for legal protection and identity defense.

Is DAPI a biometric database?

No. DAPI is not a biometric database and does not create, maintain, or operate any public
identity registry. The fundamental design principle is to generate verifiable forensic evidence while
minimizing data exposure and unnecessary retention. It provides no APIs, no integrations and no banking services.

What DAPI does: Creates a private certification package with cryptographic hashes
and timestamps proving that specific identity files existed at a specific moment in time.

DAPI does not store searchable biometric templates, facial recognition profiles, or voice prints.
The certification process generates SHA-256 hashes (digital fingerprints) of your files, but these
hashes cannot be reverse-engineered to reconstruct your original biometric data.

After certification delivery and the secure deletion protocol (48 hours for workstation files,
30 days for email communications), only non-reversible cryptographic hashes, timestamp certificates,
and basic metadata remain in DAPI’s records—not your biometric files in any form.

Is my DAPI certification public or searchable online?

No. DAPI is private by design. No public profile is created, no information is indexed
by search engines, and nothing about your certification is made searchable or visible online.

Complete privacy: Your certified materials, certificate, and all related documentation
are delivered exclusively to you via secure private channels. Only you possess the evidence package,
and only you decide when and how to use it.

This privacy-first approach is fundamentally different from public verification platforms or identity
registries that create searchable profiles or verification badges. DAPI provides forensic evidence
without exposure—the certification exists to strengthen your defensive position when needed,
not to publish your identity online.

The only public-facing element is the timestamp verification tool, which allows independent verification
that your timestamp certificate was issued by a qualified provider and has not been tampered with.
This verification process does not reveal any personal information—it only confirms the mathematical
validity of the timestamp itself.

Are my files stored after certification?

DAPI is designed with strict data minimization principles. Your biometric files are used to produce
the certification package and are not kept longer than necessary for delivery and
quality verification.

Deletion timeline:

  • Workstation files: Your identity files are permanently deleted from the certification
    workstation within 48 hours using 7-pass DoD 5220.22-M overwrite standard, making recovery impossible.
  • Email communications: Emails containing your files are deleted from mail servers
    within 30 days after certification delivery.
  • Deletion confirmation: You receive written confirmation that the deletion protocol
    has been completed, with timestamp logging for verification.

What IS retained permanently: Only cryptographic hashes (SHA-256 fingerprints that
cannot be reverse-engineered), timestamp certificates, basic metadata (name, DAPI code, certification
date), and delivery receipts. These elements are necessary to maintain the verifiability and legal
value of your issued certification.

This approach ensures that DAPI can provide ongoing verification support if needed (for example, if a
court requests authentication of your certificate years later), while your actual biometric files do not
remain in any recoverable form after the deletion protocol is completed.

Is DAPI an automated or AI-based service?

No. DAPI is a manual, expert-supervised certification process. It is not an automated
platform, it does not use AI-based identity validation, and it does not rely on algorithmic processing
of your biometric data.

Every certification is personally handled by a forensic expert with 24 years of
experience in digital forensics and legal evidence preparation. No bulk processing, no automated
verification algorithms, no AI analysis.

Why manual processing matters:

  • Quality control: Human expert review catches issues that automated systems miss
    (file corruption, inconsistencies, quality problems).
  • Legitimacy verification: Personal assessment helps identify and prevent fraudulent
    certification requests or misuse attempts.
  • Legal robustness: Expert supervision and declaration strengthen evidentiary value
    compared to automated certifications that lack human oversight.
  • Privacy protection: Manual processing on encrypted offline workstations provides
    stronger security than cloud-based automated platforms.

This controlled, expert-supervised approach is slower and more labor-intensive than automated services,
but it provides significantly higher quality and legal reliability for the certification package.

Can DAPI help with deepfakes or impersonation?

Yes. DAPI does not prevent deepfakes or impersonation from occurring, but it provides
verifiable proof of integrity and anteriority that can significantly support your defensive position
when misuse happens.

How DAPI addresses deepfake and impersonation abuse:

  • Establishes authentic baseline: Your certified photos, voice recordings, and
    identity documents serve as the verified reference for comparison with fake content.
  • Proves temporal anteriority: The qualified timestamp demonstrates that your
    authentic materials existed before the fake content appeared—critical for disputes
    where “who copied whom” is contested.
  • Enables forensic comparison: Technical experts can analyze differences between
    your certified authentic materials and disputed deepfake content to identify AI-generated artifacts,
    manipulation traces, or synthetic patterns.
  • Strengthens platform reports: Providing cryptographically certified proof of your
    authentic identity significantly accelerates platform takedown response compared to unverified claims.
  • Supports legal action: The certification package provides structured evidence
    for criminal complaints, civil proceedings, GDPR enforcement, and cease-and-desist letters.

Best practice: Get DAPI certification before problems occur.
Proactive certification eliminates the challenge of proving authenticity after abuse has already
started, when establishing “who’s real and who’s fake” becomes much more difficult.

Can DAPI be used for takedown requests?

Yes. The DAPI certification package can be attached to takedown requests and abuse
reports as structured supporting evidence. While it does not guarantee content removal (platforms
have discretion in moderation decisions), it strengthens your position decisively with verifiable proof.

How to use DAPI for platform takedowns:

  • Identify the violation: Fake profile, unauthorized image use, impersonation,
    deepfake video, voice cloning, or other identity abuse.
  • File platform report: Use the platform’s official abuse reporting mechanism
    (Instagram, Facebook, LinkedIn, TikTok, Twitter/X, etc.).
  • Attach DAPI certificate: Include your certificate PDF as supporting evidence
    showing cryptographically certified proof of authentic identity.
  • Reference in report text: State clearly: “Certified proof of authentic identity
    attached (DAPI-[your code]). Certificate includes SHA-256 hashes and qualified timestamp.”
  • Provide originals if requested: If the platform asks for additional verification,
    supply your original files so they can verify the hashes match.

Typical impact: Users report that providing DAPI certification with takedown
requests typically accelerates platform response from weeks to days, because the certified evidence
removes ambiguity about who is the legitimate identity owner.

For GDPR-based takedown requests (right to erasure under Article 17), the DAPI certificate serves as
strong proof that you are the legitimate data subject, eliminating platforms’ common excuse that they
“cannot verify your identity.”

What files are required for DAPI certification?

DAPI certification is based on four identity-related files that establish your authentic biometric
and documentary baseline. These files create a comprehensive forensic reference point for your identity.

Required files (standard DAPI package):

  • Identity Document (required): Valid government-issued ID—passport, national ID
    card, or driver’s license. Must be current and unexpired. PDF or high-quality JPG format.
    This file is private and used only for certification—it will never be published.
  • Facial Photograph (required): Front-facing photo establishing your authentic
    appearance. Frontal pose, natural lighting, no sunglasses or obstructions, neutral background
    preferred, minimum 1280x720px resolution.
  • Voice Recording (required): 30-60 second audio sample certifying your authentic
    voice characteristics. You will be provided with standard text to read. Clear audio quality
    (MP3 or WAV format), recorded in quiet environment without background noise.
  • Verification Video (optional but strongly recommended): 10-15 second video
    for enhanced authentication. Looking at camera with face centered, gentle lateral head movement
    (left/right), MP4 format. This provides the strongest proof against deepfake manipulation.

Why these specific files? This combination covers the three primary vectors
of identity abuse: facial appearance (deepfake videos, fake photos), voice (cloning scams,
audio manipulation), and documentary identity (impersonation, profile cloning). The verification
video adds depth perception and movement that significantly increases difficulty for deepfake
generation.

You will receive detailed technical specifications and clear instructions before file submission.
If you have questions about file preparation, DAPI support will guide you through the process during
the secure communication phase.

Who should use DAPI?

DAPI is designed for anyone who wants legally-oriented identity proof before misuse happens.
The service is particularly valuable for individuals whose identity exposure creates higher risk
of impersonation, deepfakes, or abuse.

Primary user categories:

  • Public figures & professionals: Politicians, journalists, media personalities,
    and anyone with public visibility vulnerable to reputation attacks timed for maximum damage.
  • Executives & business leaders: CEOs, directors, and decision-makers at risk
    of voice cloning for business email compromise (BEC) attacks, CEO fraud, or fake authorization scams.
  • Content creators & influencers: YouTubers, streamers, social media personalities
    whose likeness and voice are valuable targets for fake endorsements or impersonation scams.
  • Private individuals with safety concerns: Anyone experiencing harassment,
    stalking, or threats who wants defensive proof ready before escalation occurs.
  • Families protecting minors: Parents seeking to protect children against
    AI-generated explicit content, grooming via fake identity, or custody disputes with fabricated evidence.
  • Professionals in sensitive fields: Lawyers, medical professionals, academics,
    or others whose professional reputation depends on verified authentic identity.

Proactive vs. reactive: DAPI is most effective when obtained before
abuse occurs. Once deepfakes or impersonation is already happening, proving “who’s real” becomes
significantly more difficult. Certification creates your verified baseline that cannot be contested later.

How long does the certification process take?

Processing time varies depending on current workload and case complexity. DAPI uses manual
expert-supervised certification rather than automated processing, which means quality takes
priority over speed.

Typical timeline (standard processing):

  • Day 0: You submit certification request through the website
  • Day 1-2: DAPI contacts you via secure private channel with unique DAPI code
    and instructions for file submission
  • Day 2-3: You send files via secure channel; expert processes certification
    (hash generation, timestamp application, certificate creation)
  • Day 3-4: Certificate package delivered via secure email (PEC for audit trail)
  • Day 5: File deletion protocol completed; confirmation sent

Expedited processing available: For urgent cases requiring immediate defensive
action, expedited 3-6 hour delivery is available with additional fee. Contact DAPI support to
request priority processing.

After you submit your initial request, you will receive a personalized timeline estimate based on
current workload and your specific case requirements. DAPI maintains direct communication throughout
the process so you always know the current status.

What do I receive after certification?

You receive a complete forensic evidence package designed for immediate use in legal proceedings,
platform disputes, and defensive contexts. The package is professionally formatted and includes
everything needed to prove authenticity and temporal anteriority.

Complete DAPI certification package includes:

  • Official DAPI Certificate (PDF, 6 pages): Professionally formatted document
    with DAPI logo, certificate number, your name, certification date, timestamp seal, list of
    certified files with SHA-256 hashes, technical specifications, forensic methodology explanation,
    legal usage guidance, verification instructions, and expert declaration with digital signature.
  • SHA-256 Cryptographic Hashes: Unique digital fingerprints for each certified
    file (identity document, photo, voice, video). These hashes allow independent verification
    that your files match the certified originals.
  • Qualified Timestamp Certificate: RFC 3161 compliant timestamp from eIDAS-qualified
    provider (.tsr file format). Provides legally recognized temporal proof that can be independently
    verified using public validation tools.
  • Technical Documentation: Complete chain of custody report detailing forensic
    standards applied, file handling procedures, hash generation methodology, timestamp application
    process, and verification protocols.
  • Legal Usage Guide: Practical instructions for using the certificate in
    platform takedowns, GDPR complaints, criminal reports, civil proceedings, and law enforcement
    collaboration—including specific templates and recommended language.
  • Verification Instructions: Step-by-step guidance for independently confirming
    file integrity using the provided hashes, enabling third parties to verify authenticity without
    DAPI’s involvement.

Critical: Preserve your original files! The certificate contains only
cryptographic hashes—not the files themselves. To use the certification, you must present
both the certificate and your original files so third parties can verify the hashes match.
Without original files, the certificate alone cannot prove authenticity.

Can the same certification be used for multiple disputes?

Yes. A single DAPI certification can be reused as baseline proof against multiple
abuses involving your identity materials. You do not need separate certifications for each incident—
the same certified baseline remains valid for proving your authentic identity regardless of how many
times it’s misused.

Multiple use scenarios:

  • Multiple fake profiles: If someone creates fake accounts on Instagram, Facebook,
    LinkedIn, and dating sites using your photos, one DAPI certificate supports takedown requests
    across all platforms.
  • Ongoing impersonation: If impersonation continues over time with new fake accounts
    appearing after previous ones are removed, the same certificate continues to provide proof.
  • Different abuse types: The certification can support both platform reports AND
    legal actions simultaneously (for example, Instagram takedown request + police report + civil lawsuit).
  • Cross-border disputes: One certificate supports actions in multiple jurisdictions
    (eIDAS timestamps have EU-wide recognition, and SHA-256 hashing is internationally accepted).

Limitation: The certification must relate to the certified files and the same
identity baseline. If your appearance changes significantly (major weight change, cosmetic surgery,
aging) or your identity document expires, consider updating your certification for continued
effectiveness.

Can I update or replace my certified files later?

Yes. If your identity document changes (renewal, new passport) or you want to
refresh your baseline materials due to significant appearance changes, you can request a new certification.
This creates a new verifiable reference point for the updated file set.

When to consider updating your certification:

  • Identity document expiration: Your certified ID has expired or been renewed
  • Significant appearance changes: Major weight change, facial hair growth/removal,
    cosmetic procedures, aging effects over several years
  • Voice changes: Medical conditions, surgical procedures, or aging affecting voice
    characteristics
  • Enhanced protection: Original certification didn’t include verification video,
    but you now want maximum deepfake protection

Each certification is independent with its own DAPI code, timestamp, and certificate. Your previous
certification remains valid for its original timeframe—updating creates an additional reference point
rather than invalidating the previous one.

Best practice for long-term protection: Consider updating certification every
3-5 years or when identity documents renew, maintaining current authenticated baseline as your
appearance naturally changes over time.

How do I request a DAPI certification?

Starting the certification process is straightforward. Use the dedicated request page to submit
your initial information, and DAPI will guide you through secure next steps.

Certification request process:

  • Step 1: Visit the request page and complete the contact form with basic information
    (name, email, brief description of your protection needs)
  • Step 2: System generates your unique DAPI code (e.g., DAPI-7F3A9C) and sends
    confirmation email
  • Step 3: DAPI contacts you within 24-48 hours from secure private channel with
    detailed instructions for file preparation and submission
  • Step 4: You send files via secure channel (specific instructions provided in
    private communication)
  • Step 5: Expert processes certification and delivers complete package within
    estimated timeframe

Questions before requesting? If you have specific questions about your situation,
technical requirements, pricing, or the certification process, you can contact DAPI support before
submitting a formal request. All communications are private and confidential.

Still Have Questions?

If you didn’t find the answer you’re looking for, we’re here to help. Contact DAPI support
with your specific questions about the certification process, technical requirements, or how
DAPI can address your particular protection needs.

DAPI: Digital Authentication for Personal Identity

DAPI: Digital Authentication for Personal Identity