Certifyd
Security & Trust

Your Identity Data Never Leaves Your Device

Certifyd is built on device-verified identity authentication. No central credential store. No biometric databases. No passwords to steal. Just provable, phishing-resistant identity.

How We Protect Data

Simple verification.
Every time.

1

Identity is bound to the user’s physical device via a secure biometric authentication

2

No passwords or credentials are stored on our servers — ever

3

Every verification creates an auditable, verifiably signed record

4

Audit trails are immutable and available for compliance at any time

Security Architecture

Built for zero trust.
Not just compliance.

Device-Verified Identity

Your identity is tied to your physical device through secure biometric authentications. It can’t be copied, phished, or stolen remotely. If someone doesn’t have the device, they can’t impersonate you.

No Central Credential Store

We don’t store passwords, biometrics, or credentials on our servers. There’s no database to breach. Verification credentials are linked to the user’s device and cannot be transferred.

End-to-End Verification

Every verification is a real-time, verified exchange between two devices. Both parties prove their identity to each other simultaneously. Replay attacks and interception are mathematically impossible.

Auditable Verification Trail

Every verification creates an immutable record: who verified whom, when, where, and under what authority. Records cannot be altered after creation. Ready for regulatory audits at any time.

Phishing Resistant by Design

secure biometric authentications are bound to the originating domain. They cannot be used on phishing sites or replayed in man-in-the-middle attacks. The verified protocol prevents spoofing at the protocol level.

Privacy by Default

We collect only what’s necessary. We don’t track behaviour, sell data, or build profiles. Verification data is minimised to the verified identity of identity — nothing more.

Compliance & Standards

Enterprise-grade
by design.

UK GDPR

Fully compliant with the UK General Data Protection Regulation. Data minimisation, purpose limitation, and user rights are built into the platform.

ICO Registered

Registered with the UK Information Commissioner’s Office as a data controller.

FIDO2 / WebAuthn

Built on the FIDO2 standard, the same protocol used by Google, Apple, and Microsoft for passwordless authentication.

Data Residency

Data is processed and stored within the United Kingdom and European Economic Area. No unexpected international transfers.

Security isn't a feature. It's the foundation.