What is DAPI and how it works

01 / UNDERSTANDING DAPI

What it is, what it isn’t, and why it matters more than ever today

The Problem DAPI Solves

In 2025, deepfake videos increased by 900%.
And new AI tools in 2026 can clone your face, voice, and identity in minutes.
When abuse occurs, the most critical challenge is proving
who you actually were before the fake content appeared.

DAPI (Digital Authentication for Personal Identity)
is a controlled certification process that creates
verifiable forensic evidence of your authentic identity at
a specific point in time, with legal value and complete privacy flexibility.

Before DAPINo proof of authentic identity
DAPI CertificationForensic baseline established
If Abuse OccursPriority proof available

What DAPI Is

  • Forensic certification with dual modes

    Generates cryptographic evidence of your identity (always private) with optional public certification of your online content

  • Legally-oriented documentation

    Designed for takedown requests, legal proceedings, and law enforcement collaboration

  • Expert-supervised process

    Manual handling by forensic expert with 24 years of experience, no automation, no AI processing

  • Zero-database architecture

    Files deleted within 48 hours; only cryptographic hashes retained (non-reversible)

  • eIDAS-compliant timestamps

    Qualified time proof with legal value throughout the EU and internationally recognized standards

What DAPI Is Not

  • Not a biometric database

    We don’t store, catalog, or search your biometric data

  • Does not expose private identity data

    Your identity baseline remains always private. Only certified publications (if you choose this option) have public listings

  • Not an automated platform

    No algorithms, no AI validation, no mass processing—every certification is personally supervised

  • Not a KYC service

    DAPI creates forensic evidence for personal legal protection, not corporate identity verification

  • Not a content removal guarantee

    We provide evidence to strengthen your position; we cannot control platform decisions

🌍

International Legal Recognition with FEDIS

DAPI certificates (both pathways) include FEDIS (Forensic Evidence Declaration & Integrity Statement)—an
expert declaration methodology that extends legal recognition beyond the European Union.

How it works: The complete DAPI certificate package (with all cryptographic hashes,
timestamps, and technical documentation) is digitally signed with a qualified electronic signature by the
forensic expert. This expert declaration transforms the evidence package into a sworn technical statement with enhanced admissibility.

✓ Legal jurisdictions where FEDIS-certified evidence is admissible:

  • European Union (automatic recognition via eIDAS + technical expertise)
  • United States (Federal Rules of Evidence 702, 901, 902)
  • United Kingdom (Expert Evidence under Civil Procedure Rules)
  • Canada (Expert Opinion Evidence)
  • Australia (Evidence Act 1995, Expert Opinion)
  • Other common law jurisdictions with equivalent expert witness frameworks

Learn more about FEDIS methodology:

FEDIS Technical Documentation →

02 / TYPES OF EVIDENCE

Priority, integrity, and identity consistency

Why DAPI Matters More Than Ever Today

When deepfakes, voice cloning, or impersonation occur,
platforms and authorities ask the same question:

“How do we know that this is the real you and that is the fake?”

Without pre-existing certified evidence, proving authenticity becomes
nearly impossible. DAPI creates that proof before you need it.

📅

Proof of Priority

Proves that your authentic identity materials existed
at a specific date and time—before fake content appeared.

✓ Available in both DAPI pathways

🔒

Proof of Integrity

Cryptographic hashes ensure that certified files
have not been altered since certification—any modification produces a completely different hash.

✓ Available in both DAPI pathways

Identity Consistency

Establishes a consistent baseline of your appearance,
voice, and identity documents for verification and comparison purposes.

✓ Available in both DAPI pathways

🔗

Content Authenticity Proof

Cryptographically links your verified identity to specific
content you’ve published online, with instant public verification.

✓ Only with DAPI-PUB (Public Certification of Identity and Content)

03 / WHAT YOU CERTIFY

The files that establish your biometric baseline and (optionally) your online content

What You Certify with DAPI

DAPI certification is based on identity-related files that establish your authentic biometric baseline.
With DAPI-PUB (Public Certification of Identity and Content) pathway, you can also certify your published online content.

Identity Baseline (Both Pathways)

📄

Identity Document

Valid government-issued ID (passport, national ID card, driver’s license)

  • High-quality PDF or JPG
  • Clear and readable text and photo
  • Current and not expired
  • Private file—used only for certification
📷

Face Photograph

Front-facing photo that establishes your authentic appearance

  • Frontal pose, natural lighting
  • No sunglasses or obstructions
  • Neutral background preferred
  • High resolution (min 1280x720px)
🎤

Voice Recording

Audio sample that certifies your authentic vocal characteristics

  • 30-60 seconds duration
  • Reading of provided standard text
  • Clear audio quality (MP3/WAV)
  • Quiet environment, no background noise
🎬

Verification Video

Brief video for advanced authentication (optional but strongly recommended)

  • 10-15 seconds, MP4 format
  • Looking at camera, face centered
  • Slight side-to-side head movement (left/right)
  • Provides strongest proof against deepfakes

Optional but Recommended

Technical Processing: Each file is processed to generate
a SHA-256 cryptographic hash (fingerprint), which is then certified
with an eIDAS-compliant qualified timestamp. This creates legally admissible evidence
that cannot be forged or backdated.

📢 Certified Publications (Publications Pathway Only)

Beyond your private identity baseline, you can certify specific content you’ve published online,
creating verifiable public proof of the connection between your identity and that content.

What You Can Certify:

🎥 YouTube/TikTok Videos

Video URL + key screenshots

📱 Social Media Posts

Facebook, Instagram, LinkedIn, X

📝 Articles and Blogs

Full URL + forensic capture

🎨 Creative Works

Images, designs, online portfolio

📄 Public Documents

White papers, research, publications

🎙️ Podcasts and Audio

Episode URL + specific timestamps

What You Get for Each Publication:

  • Public verification listing at verify-dapi.com/[your-identifier]/
  • Dedicated PDF certificate with hash, timestamp, and verification link
  • Custom DAPI badge (SVG format) to embed in content
  • Scannable QR code for instant verification from smartphone
  • Badge HTML embed codes ready for websites and social media

📍 See a Live Example

Discover what publicly verifiable certified publications look like:


🔍 View Example Profile

04 / HOW THE PROCESS WORKS

Three controlled steps from request to certified delivery

How DAPI Works

Core Principle: No public uploading of identity data. No permanent storage.
No automation. Every step is controlled, private, and expert-supervised.

1

Request and Pathway Selection

Submit a certification request through our website.
No files are uploaded at this stage.

What Happens:
  • Complete the contact form with basic information
  • Indicate whether you want DAPI-IDS (Private Identity Baseline Certification) or DAPI-PUB (Public Certification of Identity and Content)
  • System generates a unique DAPI code (e.g., DAPI-7F3A9C)
  • Confirmation email sent with your code and next steps
  • We contact you within 24-48 hours via secure private channel
Security Features:
  • No biometric data collected at this stage
  • Operational contact email never published on website
  • All communications reference only your DAPI code
  • Human verification of legitimate use case

2

Manual Certification Preparation

Your files are vetted and processed using
forensic methodology developed over 24 years of experience.

Identity File Handling (Both Pathways):
  • Submit files via secure private channel
  • Files are downloaded locally
  • Antivirus scanning and integrity verification
  • Personal review by forensic expert, no automated processing
📢 If You Chose DAPI-PUB (Public Certification of Identity and Content):
  • Provide URLs or files of content to be publicly certified
  • We perform certified forensic captures of online content
  • Create separate hashes for each publication
  • Generate public verification listings on verify-dapi.com
  • Create custom badges and QR codes for each content piece
Certification Process:
  • Hash Generation: SHA-256 cryptographic fingerprint created for each file
  • Timestamp Application: eIDAS qualified timestamp applied (RFC 3161 standard)
  • Documentation Creation: Complete certificate with technical report and legal guidance
  • Quality Control: Expert verification of all elements before delivery

3

Certified Delivery and Secure Deletion

You receive complete documentation designed for immediate legal use.
Original identity files are then permanently deleted.

What You Receive (DAPI-IDS Private Identity Baseline Certification):
  • Official DAPI Certificate (PDF) – professionally formatted, digitally signed
  • Cryptographic Hashes – SHA-256 fingerprints of all certified files
  • Qualified Timestamp – eIDAS-compliant time proof
  • Technical Documentation – Verification methodology and chain of custody
  • Legal Use Guide – How to use the certificate for takedowns, complaints, legal proceedings
📢 If You Chose Certified Publications, You Also Receive:
  • Public profile page: verify-dapi.com/[your-identifier]/
  • Certificate for each publication: Separate PDF with specific hash and timestamp
  • Custom DAPI badges: SVG files to embed in your content
  • QR codes: For instant verification from smartphones
  • Embed codes: HTML ready for websites and social media
  • Badge usage instructions: Guide to maximize certification visibility
File Deletion (Critical Security Step):
  • Biometric identity files: Deleted within 48 hours
  • Email communications: Deleted from servers within 30 days
  • Publication retention: Only hashes are retained, never original content
Zero Retention Guarantee: Your biometric data does NOT remain in our systems in any
recoverable form after certification delivery. Public listings contain only cryptographic hashes
and metadata, never personal identity data.

05 / YOUR DAPI CERTIFICATE PACKAGE

Complete package designed for legal use and verification

Your DAPI Certificate Package

The complete certification package is designed to be immediately usable
for legal proceedings, platform disputes, and law enforcement collaboration.
Content varies based on the pathway chosen.

🔐

DAPI-IDS (Private Identity Baseline Certification)

📄

DAPI-IDS (Private Identity Baseline Certification)

Identity baseline forensic documentation

Certificate Contents (PDF)

  • 1: Cover and Identification

    DAPI logo, certificate number, your name, certification date, timestamp seal

  • 2: Technical Certification

    List of certified files with SHA-256 hashes

  • 3: Timestamp and Methodology

    Qualified timestamp details, applied forensic standards

  • 4: Legal Value and Usage

    Types of evidence provided, use cases, limitations, evidentiary explanation

  • 5: Verification and Preservation

    How to verify authenticity, importance of preserving original files, verification instructions

  • 6: Expert Declaration and Signature

    Forensic expert credentials, methodology statement, digital signature, contact information

📢

DAPI with DAPI-PUB (Public Certification of Identity and Content)

Includes everything in DAPI-IDS (Private Identity Baseline Certification) plus additional components for public verification of your content:

🌐 Public Profile Page

Dedicated URL: verify-dapi.com/[your-identifier]/

Lists all your certified publications with verification details, QR codes, and downloadable badges

📄 Per-Publication Certificates

Each certified content piece gets its own PDF certificate with specific hash, timestamp, DAPI number, and link to public listing

🛡️ Badges and Visual Assets

Custom DAPI badges (SVG), scannable QR codes, HTML embed codes to easily incorporate certification into your content

📋 Individual Verification Listings

Each publication has a dedicated page with title, description, certification date, screenshot/preview, and verification tools

📍 See What It Looks Like

Explore a real profile with certified publications:


🔍 View Example Profile

Technical Specifications (Both Pathways)

  • Hash Algorithm: SHA-256 (256-bit, cryptographically secure)
  • Timestamp Standard: RFC 3161 qualified timestamp
  • Timestamp Provider: eIDAS-compliant EU provider
  • Digital Signature: Qualified electronic signature
  • Document Format: PDF/A (long-term archival standard)
  • Verification: Hashes can be independently recalculated and compared

⚠️

Critical: You Must Preserve Your Original Files

The DAPI certificate contains ONLY cryptographic hashes (fingerprints)
of your files, not the files themselves. If you need to use the certificate
for legal purposes, you must present:

  1. The DAPI certificate (with hashes, timestamp, and digital signature)
  2. Your original files (document, photo, audio, video)

Third parties (courts, platforms, authorities) can then recalculate
the hashes of your files and verify they match the certified hashes, proving
the files are authentic and existed at the certification date.

Recommended preservation: Multiple backups (local + encrypted cloud),
offline storage (USB/external drive), never modify the original files.

06 / WHEN DAPI IS NEEDED

Real-world scenarios where forensic identity proof matters

When DAPI Is Useful

DAPI provides defensive evidence for a wide range of digital identity misuse scenarios, from everyday impersonation to sophisticated AI attacks, establishing the baseline for deepfake detection.
Once the deepfake exists, proving who is the real “you” becomes nearly impossible without pre-existing, preventive certification.
DAPI establishes your authentic baseline BEFORE abuse occurs, creating the only evidence that can distinguish the original from the fake with cryptographic certainty.

📋 Which Pathway to Choose?

DAPI-IDS (Private Identity Baseline Certification): Identity protection, deepfake defense, impersonation disputes
DAPI with Publications: Content creators, copyright, content anti-manipulation, public reputation protection

🎭

Fake Profiles and Impersonation

Someone creates social media accounts, dating profiles, or business
profiles using your name, photos, and personal information to scam
your contacts or damage your reputation.

DAPI proves: Your authentic appearance and identity,
strengthening platform takedown requests with time-stamped proof.

Recommended pathway: DAPI-IDS (Private Identity Baseline Certification sufficient for takedowns)

🎥

Deepfake Videos

AI-generated videos showing you making statements you never made,
appearing in compromising situations, or endorsing products/causes
without your consent.

DAPI proves: Your authentic facial characteristics
at a specific date, establishing the baseline for deepfake detection and disputes.

Recommended pathway: DAPI-IDS (Private Identity Baseline Certification) + consider DAPI-PUB (Public Certification of Identity and Content) if you’re a public figure

🔊

Voice Cloning Scams

Synthetic voice replicating yours used for phone scams targeting
family members, CEO fraud/BEC attacks, or fake audio messages
and authorizations.

DAPI proves: Authentic vocal characteristics,
providing comparison baseline for fraud investigations and legal action.

Recommended pathway: DAPI-IDS (Private Identity Baseline Certification)

📸

Unauthorized Image Use

Your photos used without permission in commercial advertising,
dating/escort services, defamatory websites, catfishing schemes,
or adult content platforms.

DAPI proves: Legitimate ownership and prior existence,
supporting copyright/personality rights claims and DMCA takedowns.

Recommended pathway: DAPI-IDS (Private Identity Baseline Certification) for personal use, Publications for professional use

🎨

Online Content Copyright Protection

Protect YouTube videos, social posts, articles, creative works from plagiarism,
unauthorized republication, or false attribution. Prove original authorship
with verifiable timestamp.

DAPI proves: Cryptographic link between your identity
and specific content, with instant public verification via QR code and badge.

Required pathway: DAPI with Certified Publications (provides public listings and per-content certificates)

📱

Content Creators and Influencers

Display DAPI badge on videos, posts, and content to deter theft.
Allow followers, brands, and partners to instantly verify authenticity
of your content via QR code.

DAPI proves: Visible badge + public listing create
visual deterrent and enable instant verification without involving DAPI.

Required pathway: DAPI with Certified Publications (maximum visibility and protection)

👨‍👩‍👧

Family and Minor Protection

Children vulnerable to fake accounts, AI-generated explicit content,
parental impersonation scams, grooming via false identities, or custody
disputes with fabricated evidence.

DAPI proves: Authentic appearance of minors (with parental consent),
protective evidence before abuse occurs, timeline proof for legal matters.

Recommended pathway: DAPI-IDS (Private Identity Baseline Certification – maximum privacy for minors)

💼

Professional Reputation Attacks

Executives, politicians, journalists, or public figures targeted
with deepfakes timed for maximum damage, fake scandals, or
voice-cloned statements causing stock market manipulation.

DAPI proves: Pre-existing authentic identity, enabling
rapid response with ready evidence for crisis management and legal action.

Recommended pathway: DAPI with Publications (certified public communications) + Private (defensive baseline)

DAPI’s Realistic Scope

What DAPI Can Do

  • ✓ Provide technical proof of your authentic identity
  • ✓ Establish temporal priority (you existed before the fake)
  • ✓ Strengthen takedown requests with verifiable evidence
  • ✓ Support criminal complaints and civil proceedings
  • ✓ Accelerate platform response times
  • ✓ Create admissible forensic documentation
  • ✓ Publications: Provide instant public verification (QR code, badge)
  • ✓ Publications: Protect copyright with public timestamps

What DAPI Cannot Do

  • ✗ Prevent deepfakes from being created
  • ✗ Automatically remove fake content from the internet
  • ✗ Monitor the web for your impersonation
  • ✗ Guarantee specific legal outcomes
  • ✗ Control platform moderation decisions
  • ✗ Replace legal counsel or law enforcement

ℹ️

Complete Digital Identity Protection Ecosystem

DAPI provides defensive forensic evidence, but does not actively monitor or remove content.
For complete protection, combine DAPI with these complementary services:

🔐 Preventive Identity Certification

  • DAPI-IDS (Private Identity Baseline Certification): Forensic identity baseline (this service)

  • DAPI with Publications: Content protection with public verification (this service)
👁️ Active Monitoring and Detection

  • Continuous web monitoring:
    ReputationMonitoring.com

  • Deepfake and impersonation scanning on social media and platforms
🗑️ Removal and Takedown
📸 Abuse Evidence Certification

💡 Optimal strategy: DAPI certifies your authentic identity BEFORE abuse (preventive defense).
If abuse occurs, use CertifyWebContent to capture evidence, ReputationMonitoring to monitor
and remove fake content, and DAPI Publications to publicly protect your legitimate content.

DAPI’s value is defensive: It doesn’t control the internet,
but it drastically strengthens your position when you need to act.
Think of it as forensic insurance—proof you hope never to use,
but invaluable when you need it.

07 / HOW TO USE YOUR CERTIFICATE

Practical guide for legal and defensive use

How to Use Your DAPI Certificate

The DAPI certificate package is designed for immediate use in
defensive and legal contexts. Usage methods vary based on the pathway chosen.

🚨

Platform Reports and Takedowns

Use case: Fake profile, unauthorized image use, social media impersonation

With DAPI-IDS (Private Identity Baseline Certification):
  1. Submit standard platform abuse report (Instagram, Facebook, LinkedIn, etc.)
  2. Attach DAPI certificate PDF as supporting evidence
  3. Reference the certificate in text: “Certified proof of authentic identity attached (DAPI-[code])”
  4. If verification requested, provide original files + certificate for hash comparison
With DAPI Certified Publications:
  1. Follow the same steps as DAPI-IDS (Private Identity Baseline Certification)
  2. Additional advantage: Include link to your verify-dapi.com/[identifier]/ page in the report
  3. Platform can instantly verify your identity and authentic publications without further requests
  4. Further accelerates response times by eliminating need for document exchanges

Impact: Certified evidence typically accelerates platform response
from weeks to days. With Publications, instant verification can reduce times to hours.

⚖️

Legal Proceedings and Criminal Complaints

Use case: Deepfake defamation, identity theft, fraud, revenge porn

How to use DAPI (Both Pathways):
  1. Provide DAPI certificate to your attorney
  2. Include in formal complaints to law enforcement (Postal Police, FBI IC3, etc.)
  3. Present as exhibit in civil or criminal proceedings
  4. Use for cease-and-desist letters to prove legitimate identity claim
✨ Certified Publications Advantage:

If the case involves content you’ve published (e.g., manipulated videos, falsely attributed articles),
the public listing with timestamp provides immediate and verifiable proof of original authorship.

Legal value: eIDAS qualified timestamp and forensic methodology
provide evidentiary weight recognized by courts throughout the EU and many international jurisdictions including US, UK, Canada, and Australia.

🛡️

GDPR and Privacy Enforcement

Use case: Unauthorized data processing, right to erasure, personality rights violations

How to use DAPI (Both Pathways):
  1. Submit GDPR complaint to platform/website (Art. 17 – Right to erasure)
  2. Include DAPI certificate proving you are the legitimate data subject
  3. If ignored, escalate to Data Protection Authority (e.g., ICO in UK, CNIL in France)
  4. Reference certificate as proof of legitimate interest and identity

Advantage: Eliminates platform’s ability to claim they cannot
verify your identity; certified proof removes this excuse.

🔍

Deepfake Detection and Comparison

Use case: Contested video/audio authenticity, forensic analysis needed

How to use DAPI (Both Pathways):
  1. Provide DAPI certificate + original files to forensic expert or law enforcement
  2. Certified baseline enables technical comparison with contested content
  3. Facial/voice analysis can identify synthetic artifacts vs. authentic characteristics
  4. Timestamp proves your authentic materials predate fake content

Technical advantage: Certified baseline significantly improves
accuracy of deepfake detection tools and expert analysis.

📢

Copyright Protection and Content Anti-Manipulation

Publications Only

Use case: Content theft, plagiarism, unauthorized republication, video/article manipulation

How to use DAPI Certified Publications:
  1. Prevention: Display DAPI badge on videos, posts, articles as visual deterrent against theft
  2. Public Verification: Followers, clients, partners can scan QR code to instantly verify authenticity
  3. DMCA Takedown: Submit per-publication certificate with takedown, including link to verify-dapi.com listing
  4. Priority Proof: Public timestamp proves your content predates infringing copies
  5. Copyright Disputes: Public listing serves as immediate proof of original authorship
💡 Practical Example:

A content creator finds their video reuploaded without permission. Instead of weeks of back-and-forth emails,
they send a DMCA report with the publication certificate and verify-dapi.com link. The platform
instantly verifies original authorship via QR code and removes the infringing copy within 24-48 hours.

Unique advantage: Visible badge on original content deters theft
before it happens. When it does happen, instant verification drastically accelerates resolution.

General Best Practices

  • Store certificate + originals together:
    Archive the DAPI certificate and original files in the same secure location for easy access
  • Act promptly:
    Submit reports/complaints as soon as abuse is discovered; temporal proximity strengthens the case
  • Document everything:
    Make certified forensic captures of fake content since screenshots are weak evidence with no effective legal value, save URLs, record dates, combine with DAPI proof for strongest position
  • With Publications: Maximize badge visibility:
    Embed DAPI badge in videos (watermark), social posts (bio/description), articles (footer), online portfolio
  • With Publications: Promote verification:
    Include phrase like “This content is DAPI-certified – scan QR code to verify” to educate your audience
  • Seek legal counsel:
    DAPI provides technical evidence, but attorney guidance ensures optimal legal strategy
  • Multiple use allowed:
    One certificate can support multiple actions; no need to recertify for each incident
  • Update if needed:
    If identity document expires or appearance changes significantly, consider updated certification

08 / THE CORE PRINCIPLE OF DAPI

Proving who you were before, not who you are now

The Core Principle of DAPI

DAPI serves to prove what your real identity was before any abuse, cloning, or impersonation occurred.

This temporal distinction is fundamental. When abuse occurs, the problem is not proving who you are today, but proving that your authentic identity existed before fake, manipulated, or falsely attributed content appeared. The THREE CORE PRINCIPLES OF DAPI:

  • Certain and verifiable temporal proof
    DAPI creates temporal proof prior to abuse, based on cryptographic hashes and qualified timestamps, with legal value and independent verifiability.
  • Drastic reduction in legal time and costs
    Having a certified baseline enables immediate action, avoiding lengthy preliminary disputes and significantly reducing time and costs of legal actions or takedown requests.
  • Reputation protection and prevention of erroneous evaluations
    DAPI eliminates the ambiguity that often leads to wrong judgments by public opinion, media, or platforms, protecting the person’s reputation before damage becomes irreversible.

📢 With DAPI-PUB : Proactive Public Protection

Beyond the defensive baseline, Certified Publications add a layer of proactive public protection:
the visible badge and instant verification deter content theft before it happens,
and when it does happen, drastically accelerate resolution by immediately showing who the original author is.

Without DAPI
Fake content appears

No proof of authentic identity

Platform skeptical

Weeks / months to resolve
With DAPI-IDS (Private Identity Baseline Certification)
DAPI certified (before abuse)

Fake content appears

Immediate proof available

Rapid takedown / legal action
WITH DAPI-PUB (Public Certification of Identity and Content – Proactive Protection)
Content published with DAPI badge

Visible badge deters theft

If copied: instant QR verification

Removal in hours, not weeks

Choose Your DAPI Certification Pathway

Protect your identity with private forensic certification, or add public verification for your online content.
Don’t wait for deepfakes or impersonation to occur—certify today.

🛡️ Zero database • 48h deletion • Expert-supervised • Legal value • Choose your privacy level

DAPI: Digital Authentication for Personal Identity

DAPI: Digital Authentication for Personal Identity