Veracium — Why we are building this
Never before has it been so easy to spread truth. And never before has it been so easy to make truth unrecognisable.
The autocrats of the 21st century need neither state broadcasting nor physical force. They need only uncertainty. When the first reaction to every video is "Is this real?", democracy is already weakened — not because a lie was believed, but because the truth can no longer be believed.
"The goal is not to make people believe something false. The goal is to make them believe nothing at all."
Russia's "Firehose of Falsehood", China's information blockade over Tibet and Xinjiang, the AfD's amplification of fake news in Germany, the Trump movement's systematic delegitimisation of institutions — this is no longer propaganda in the old sense. This is epistemic terrorism. The weapon is not the lie. The weapon is exhaustion.
In 2024 and 2025, AI-generated video and audio crossed the threshold of indistinguishability. A fabricated live address from a head of state declaring war is now technically feasible, producible within hours, distributed globally within minutes. Fact-checks reach less than 10 % of the original audience.
Why Veracium
Forensic analysis, fact-checks, platform moderation — every existing approach operates reactively, after distribution. Veracium operates preventively, at the point of origin. This is not a difference in quality. It is a fundamental difference in approach.
- Verification at capture time, not after distribution. GPS-bound, cryptographically hashed, tamper-evident — produced by the device at the moment of recording, not reconstructed afterward by an analyst.
- Decentralisation as a design commitment. Any verification infrastructure controlled by a central authority can be politically captured. Veracium's post-Launch roadmap is an open protocol with multi-node consensus and no single gatekeeper — including not Veracium itself.
- Privacy-first. Server stores no standing GPS, no surveillance footprint on multimedia journalists. Verification proves what was captured, not who is being watched.*
- Truth has no ideology. Veracium verifies authenticity — not correctness, not moral acceptability, not political appropriateness. What people do with verified reality remains their decision.
What makes Veracium different
The verification-tooling space splits into two camps, and Veracium's edge sits in the gap between them.
- Capture-authenticity players — Truepic, Sealed, Adobe C2PA, Numbers Protocol. They prove "this file was created on a real device at time T." They say nothing about who, why, for whom, or under what assignment.
- Detection players — Sensity, Reality Defender, Hive, Microsoft Video Authenticator. They prove "this pixel stream looks AI-generated." Reactive, post-hoc, no capture-time anchor.
Veracium's differentiation is structural, not a better detection model:
- Job-bound provenance. Truepic can say "real iPhone, real location." Veracium can say "real device + KYC-verified multimedia journalist who accepted a specific Tier-N organisation's assignment, within the permitted geo-scope, with an immutable status log."
- Blind-intermediary architecture. Competitors bind identity to the file. Veracium decouples it structurally — the editor receives verified material without the Journalist's identity. This is simultaneously the defence against reverse-assignment attacks, the #1 item in our threat model.
- Privacy-by-design as an architectural property, not a policy. The server holds no data trail that could reveal a Journalist. Identity-bound C2PA manifests cannot offer this without breaking their model.
- Tiered verification + cool-down + jitter as structural defence against "assignment-as-weapon" — an attack the other players don't model at all.
The window
AI-generated content will reach a quality threshold within 12–18 months that makes retrospective verification practically impossible. The EU AI Act and the Digital Services Act are being finalised now. Platforms are still open to standards now. In three years, those doors will be closed.
What we ask
- From media organisations: join the Closed Pilot as an early editor or as an architecture-review partner.
- From policy-makers: write verification standards into the regulatory processes underway. Use the window.
- From engineers and investors: the most important technological challenges of our time are not the most profitable. Investments in epistemic infrastructure are investments in the foundation upon which all other values rest.
- From citizens: verification is not a luxury for experts. It is a democratic basic competence.
Democracy does not need a perfect solution. It needs enough trust in enough people.
We are building that infrastructure. Now.
Current platform status and shipping features: Features →. Full technical architecture: Security →.