top of page
Feature Graphic 1242x2208.jpg

Proof you can trust: introducing Inezze

​​​​​​​

In an era when “seeing” often isn’t “believing,” Inezze offers something rare: practical, portable proof. This is the story of why we built it, how it works, and why it matters to journalists, creators, institutions - and to anyone who wants their lens on reality to be trusted.

​​

The problem (put simply)

​​​

AI generated media, context stripped clips, and manipulated posts have made it harder than ever to know what’s real. Journalists spend hours cross-referencing sources. NGOs and investigators struggle to validate evidence under pressure. Everyday users can’t prove that what they captured is genuine—especially once it’s been reposted, compressed, or re-edited on social platforms.

Inezze’s belief is straightforward: trust should travel with the content. If you took the photo, others should be able to verify the authenticity of it—instantly, anywhere they encounter it.

​

What Is Inezze?

​​

Inezze is a capture-and-verification system for photos and videos that makes authenticity portable across devices, platforms, and workflows.

For consumers: a mobile app (iOS/Android) that captures photos and videos exactly as the camera saw them—no filters, no edits—then locks them down with a unique identifier and binds trustworthy device, date, time, location and content data (and the author’s identity if the author chooses to include it).

For professionals: a business suite including a secure portal, an API for automation, and a browser extension that enables instant verification on the open web and social media.

For cameras and drones manufacturers: a technical design that enables native, on-device verifiable media on modern cameras (e.g., models with the right hardware capabilities), so that proof begins at the shutter.

In other words, Inezze makes proof portable - from capture, to cloud, to any social platform where the content travels.

​

How Inezze works (human-first, technically sound)

​

1) Capture with integrity

 

  • Using the Inezze mobile app: capture only what the camera sees. No filters, enhancements, or edits. This ensures the “source of truth” is clean from the start.

  • Digitally “locking down” the photos/videos with a unique identifier at the time of capture: this unique identifier prevents tampering and proves that the file you’re verifying is exactly what was captured, not a later manipulation.

  • Trusted user, device, date/time, location and content data. The app ensures that these parameters are correct through multiple and trusted sources. It is up to the user to reveal his/her identity to the recipients.

 

Result: a signed, provenance-rich, original, durable proof of “who, how (which device was used), what, when, and where.”

​​

2) Share anywhere - with portable proof

Creators can:

​

  • share peer-to-peer (e.g., SD card, email, cloud drive), even offline-first when necessary.

  • publish to social media (Instagram, Telegram, TikTok, WeChat, websites, etc.) with Inezze’s unique identifier embedded in the shared version of the original image.

​

That unique identifier carries a link from the shared asset back to its original, signed version in Inezze’s cloud.

​

Result: anyone who sees the content - on any platform - can verify and view the original device used, image, date/time, location, and (optionally) author identity.

​​

3) Verify in seconds

​

  • Scan the unique identifier with the Inezze app to retrieve the original, “locked-down” image and its metadata.

  • Or, use the browser extension: right-click on a photo or video taken with Inezze to reveal the original and its provenance (how, what, when, where, and who, if provided).

  • Or, again, use the unique identifier as text: if the embedded unique identifier is undesirable in a layout, the unique identifier can be shared as text. Users can still look up and verify the original.

 

Result: Verification becomes a five second action, not a forensic investigation.

​​

Why journalists and newsrooms love this

​

  • Speed: monitoring Telegram for breaking events? With the browser extension, you can right-click and verify instantly - no need to run heavy forensics or triangulate metadata across tools.

  • Clarity in editing workflows: you can still apply editorial adjustments (like contrast or saturation) to your published photo. As long as the unique identifier is preserved, your audience can verify the unedited original.

  • Video compositing, clarified: suppose you publish a 90-second explainer that includes 10 seconds of on-the-ground Inezze footage. The segment can carry the unique identifier - your viewers can scan and verify the original 30-second clip immediately, with source time and location data.

​​

What makes Inezze different

​

  1. Verification that Travels Across Platforms: unlike approaches that require platform-level support, Inezze’s proof is portable. If the unique identifier QR code remains (or the unique ID is included in text), verification works anywhere the content is seen.

  2. Clean originals, not edit Logs: Inezze focuses on unaltered capture—no filters, no generative edits—to produce a reliable original. This avoids the user burden of reverse-reconstructing an “original” from a long chain of edits. You verify the source, not the history of transformations.

  3. Built for real journalism workflows: you can edit for publication (contrast, saturation, layout) without compromising verification. Readers can always scan and view the original as captured.

  4. Works in connectivity-challenged environments: a protester or eyewitness with no internet can still capture and later share the signed “locked-down” original (via SD card, email, or drive). Proof survives the journey.

  5. Enterprise-ready: with the business portal and API, organizations can ingest only true photos/videos (those captured with Inezze), invite sources globally, automate verification, and integrate provenance into content pipelines at scale.

​​

The Business suite (for newsrooms, NGOs, platforms, and brands)

 

  • Inezze mobile app (Pro use): same trusted capture, signing, and metadata binding as consumer, with pro controls.

  • Inezze business portal: a secure, OneDrive/Sharepoint/GoogleDrive/GoogleDrive/-like environment to collect, store, and verify only true photos/videos (captured with Inezze). Invite contributors worldwide and centralize your proof-of-origin assets.

  • Inezze API: build automation and verification into your systems - ingestion filters, bulk verification, workflow triggers, and auditable provenance records.

  • Inezze browser extension: monitor platforms like Telegram or Instagram and verify with a right-click. Save hours when tracking breaking events.

​​

Cameras and drones manufacturers integration

 

Inezze provides a technical design for camera OEMs (e.g., Canon, Sony) to support native, in-camera signing and verification. Modern bodies like the Canon R5 already include the required hardware capabilities—what’s left is manufacturer software enablement to generate Inezze verifiable media at the hardware level.

 

A note on C2PA: why we differ and how Inezze complements it

 

The C2PA (Coalition for Content Provenance and Authenticity) is driving an important standard for attaching provenance and edit histories. Inezze’s approach is different in a few key ways:

 

  • Platform Independence: C2PA workflows often require platform support for end-user verification. Inezze works across any platform as long as the unique identifier survives with the content.

  • No edit chains: C2PA can represent AI edits and transformations via a detailed log. Inezze does not allow edits at capture and focuses on verifying the original, which is often what editors and investigators need fastest.

  • Designed for newsroom practicality: you can edit for publication while preserving a direct path back to the original source with Inezze’s unique identifier. Readers and verifiers can confirm the unaltered capture in seconds.

Both approaches aim to increase trust. Inezze prioritizes speed, simplicity, and platform independence for field reality and newsroom workflows.

​

Limitations (transparent by design, and temporary)

​

  • Advanced GPS Spoofing: while Inezze actively ensures correct time and a high confidence GPS, military-grade GPS spoofing can still deceive location. For most civilian contexts, the signal remains trustworthy, but this is an open threat we’re continually working to mitigate and a solution to prohibit spoofing will be launched in a future release.

  • Realistic Staging: Inezze detects photos-of-photos and videos-of-screens. However, staged re-enactments (e.g., sets, actors, replicas) may still appear “real” to the camera. Like any provenance system, Inezze proves what the camera captured, not whether the scene itself was staged.

We believe trust requires candor. These are known gaps we will keep addressing with research, partnerships, and product updates.

​

Privacy and control

​

You control what you share: authors can choose whether to attach identity.

Proof without exposure: verifiers can confirm the original and its metadata without forcing the author to expose more than they intended to share publicly.

Flexible presentation: use the unique identifier overlay when appropriate, or share the unique ID as text to keep layouts clean while maintaining verifiability.

​​

For users: why download Inezze

​

  • Capture truth as it happened: no filters, no edits—just reality, signed.

  • Prove it anywhere: post to your favorite platforms. If your unique identifier is there, your proof is there.

  • Help others trust you: whether you’re a citizen reporter, journalist, creator, traveller, or seller, Inezze makes your audience confident in what they see.

​

For organizations: why integrate Inezze

​

  • Faster verification, fewer false leads: right-click verification on the open web; instant validation inside your portal and via API.

  • Provenance at ingest: accept only genuine, signed assets from field sources.

  • Compliance and auditability: maintain an authoritative record of what, when, and where, with minimal workflow friction.

  • SDK/API extensions: automate checks, trigger reviews, and enrich your CMS or DAM with reliable authenticity signals.

​

Frequently Asked Questions

​

Q: What if someone crops or re-edits the photo/video?

A: As long as the unique identifier remains (or is included in text), anyone can scan or look up the original and verify the unedited capture. If edits strip the unique identifier entirely, you can still verify the original file if it’s shared directly.

 

Q: What if someone screenshoots or re-records content?

A: Inezze detects photos-of-photos and videos-of-screens at capture time. If you’re verifying a third party repost, scanning the Inezze unique identifier takes you back to the original signed asset, not the derivative.

 

Q: What if I publish a montage or documentary edit?

A: You can include the Inezze unique identifier for the relevant segment(s). Viewers can verify each original clip independently.

 

Q: Can I keep my identity private?

A: Yes. Author identity is optional. You decide what to disclose.

 

Q: Does it work offline?

A: Yes, for capture. You can capture and sign offline, then share later via SD, email, message or drive. Verification requires reaching the original (via the unique identifier) when online.

 

Q: Is this compatible with C2PA?

A: Yes, it aligns with C2PA principles and integrates smoothly into C2PA workflows, while adding our unique focus on clean originals and fast, platform-independent, field-ready verification.

 

Final Word

 

Inezze is built for a simple promise: if you captured it, you can prove it - quickly, clearly, and anywhere it’s seen. In a world flooded with synthetic noise, that promise isn’t just a feature. It’s a foundation.

Ready to make trust portable? Let’s begin !

bottom of page