How verification works

We analyze your files for watermarks and authenticity signatures across multiple layers:
  • C2PA Metadata: Industry-standard content credentials and provenance
  • Invisible Watermarks: Hidden ownership data embedded in the content itself
  • Quantum Signatures: Post-quantum cryptographic proof of authenticity
  • Tamper Detection: Analysis to identify any unauthorized modifications
Content Credentials are still rolling out, so the content you choose to inspect may not have information to view.
ZRY | The Trust Layer for Digital Media