Prove who made the video. Even after the internet does its worst.
Deepfakes are everywhere. Metadata gets stripped on every upload. Attestik embeds cryptographic identity inside the video stream itself — so it survives re-encoding, re-muxing, and social platform processing. No plugins. No trust chain. Just math.
The Problem
Every existing solution breaks the moment someone shares your video.
How Attestik Works
Five layers of cryptographic binding, embedded at the codec level. No container dependency. No external service required at verification time.
Sign
Generate an Ed25519 keypair. Your entity ID is derived from your public key. Every video segment gets individually signed with your secret key.
120-800 bytes per segment. Orders of magnitude smaller than C2PA.
Bind
Content hashes at five levels (bitstream, codec, perceptual, spatial block grid, audio fingerprint) link your identity to the actual media. A hash chain links segments together.
L1-L3 detect global changes. L4 catches localized edits. L5 detects audio tampering.
Verify
Anyone can verify: extract the attestation, check the signature, and confirm the content binding. No API call needed — it's all in the stream.
Works offline. No phone-home. No trust chain to expire.
Who Needs This
Anyone who needs to prove a video is real, unaltered, and from who it claims.
Under the Hood
The technical details for developers and security teams.
5-Level Binding
L1 bitstream, L2 codec, L3 perceptual, L4 spatial block grid, L5 audio fingerprint. Each survives different transforms.
120-800 Bytes
Attestation frames are tiny. Embed identity in real-time streams with negligible bandwidth overhead.
Platform Resilient
Survives re-muxing, transcoding, and social upload. Identity travels inside the H.264/H.265 stream.
Ed25519 Signatures
Every segment individually signed. Hash chain links segments cryptographically. Offline verification.
Attestik vs. C2PA
C2PA stores provenance in the file container. Every platform in the delivery chain destroys it. Attestik binds identity to the content itself.
| Operation | C2PA | Attestik |
|---|---|---|
| Re-mux (MP4 to MKV) | Metadata destroyed | L1 bitstream hash matches |
| Transcode to 720p | Metadata destroyed | L3 perceptual hash + L4 block grid survive |
| Upload to social platform | Metadata destroyed | L3 pHash + L4/L5 survive re-encode |
| Strip SEI NAL units | Metadata destroyed | Identity signal deleted |
| CDN edge caching | Often stripped by CDN | Travels inside the stream |
Explore the Protocol
Interactive demos showcasing every layer of the Attestik protocol.
Attack Simulator
Run 4 real FFmpeg attacks and see which layers break
Layer Explorer
Interactive L1-L5 binding with runnable resilience matrix
L4 Spatial Detection
Block grid heatmap detecting face blur and localized edits
L5 Audio Fingerprint
Chromagram-based detection of spliced speech and removed audio
Tier Simulator
Interactive 4-tier classification with FRE 902(14) gating
Evidence Package
Full FRE 902(14) evidence export with cryptographic proof
Live Player
Video playback with per-segment verification and 9-state badges
Rights & DRM
13-type attestation chain with territory narrowing
Frame Inspector
Create, inspect, and verify COSE_Sign1 attestation frames
See it break. See it survive.
Upload a video, stamp it with your identity, then attack it — re-mux, transcode, simulate a social upload. Watch what happens to the attestation.
Try the Live Demo