Understand how DAPI-SM Anti-Deepfake document verification works
Every DAPI-SM Anti-Deepfake document generated contains three key elements that guarantee its authenticity and temporal integrity:
a7f3c8e1-4b2d-4c9a-8f6e-1d3a5b7c9e0f
What it is:
A unique identifier randomly generated according to UUID version 4 standard. Each document has a different, unrepeatable UUID.
What it's for:
2026-01-29T14:30:45.123Z
What it is:
The exact date and time (in ISO 8601 format) when the document was generated, expressed in UTC (Coordinated Universal Time).
What it's for:
๐ก Important: The timestamp is generated by the user's device. For legally certified timestamps, a qualified timestamping service is required such as DAPI Certification.
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
What it is:
A unique "digital signature" of 64 hexadecimal characters generated by applying the SHA-256 algorithm to document content (UUID + timestamp + personal data).
What it's for:
โ ๏ธ Warning: Even a minimal change to content (e.g., changing one letter) generates a completely different hash.
Open the PDF and verify it contains:
Document ID: a7f3c8e1-4b2d-4c9a-8f6e-1d3a5b7c9e0f Timestamp UTC: 2026-01-29T14:30:45.123Z SHA-256 Hash: e3b0c44298fc1c149afbf4c8996fb92427ae41...
The timestamp must be in ISO 8601 format with UTC timezone (ending with "Z"):
2026-01-29T14:30:45.123Z
2025-12-15T08:22:10.000Z
29/01/2026 14:30
2026-01-29 14:30:45
The main value of the document is proving it existed BEFORE a certain event.
To verify the document hasn't been altered, you can recalculate the hash and compare it with the one in the PDF.
๐ก Note: This verification is complex and requires technical skills. For most users, checking the presence and format of the three elements is sufficient.
The document does not verify you are really who you say you are. Anyone can enter any name and generate a document.
For identity certification:
A forensic authentication service is needed such as DAPI-IDS which verifies identity documents and creates a certified biometric baseline.
The document only proves that you declared preventive refusal. It does not analyze or prove that a specific deepfake is fake.
For deepfake analysis:
Specialized forensic tools are needed that analyze images/videos and detect AI manipulations.
This document is an informal preventive declaration. It has value as proof of intent, but is not a legal forensic certification.
For full legal value:
A qualified eIDAS timestamp and forensic certification from authorized entity such as DAPI-IDS Digital Identity Certification is needed.
The timestamp comes from the user's device clock, not from a certified server. Theoretically it could be manipulated.
For certified timestamp:
Qualified eIDAS timestamping services are needed that issue timestamps legally recognized in court.
Publishing the document on social media publicly demonstrates you declared preventive refusal. It may discourage potential malicious actors.
If someone publishes a deepfake of you, you can prove you had already declared refusal before it happened.
When filing a police report, the document proves you were aware of the risk and had taken precautions.
Generating the document is an opportunity to reflect on digital risks and adopt safer online behaviors.
This tool
Complete service
Technically yes, but any modification would invalidate the SHA-256 hash. If someone recalculates the hash and it doesn't match the one indicated in the document, it's clear it was altered.
No, the document has no expiration. The timestamp proves when it was generated and this information remains valid indefinitely.
Yes, you can generate as many documents as you want. Each document will have different UUID and hash. It's advisable to keep the first one generated as a temporal baseline.
The document proves your preventive intention and can support a report, but does not substitute legal action. If you're a deepfake victim, you still need to file a police report.
It can be presented as supporting element, but doesn't have the same evidentiary value as a professional forensic certification with qualified eIDAS timestamp.
You can recalculate the content hash using online tools (search "SHA-256 calculator")
or from terminal with command sha256sum (Linux/Mac) or
certutil -hashfile filename SHA256 (Windows).
Don't wait for it to happen. Create your timestamped preventive declaration now.
โ๏ธ Legal Notice: This guide is for informational and educational purposes. Technical information is simplified for accessibility. For professional forensic verification, consult a certified digital forensics expert.