Detecting counterfeit crypto wallets and protecting your security. 🛡️ 1/8
Veracity Protocol is the new security standard for physical objects that allows anyone to verify an item’s identity, authenticity, detect anomalies, and check for tampering. 2/8
With the goal of providing customers with a way to authenticate their purchases, we teamed up with @Trezor to protect their wallets. 3/8
We focused on the Batch Protection of Trezor’s two available hardware wallets — Trezor One and Trezor Model T. We trained our algorithm to understand the characteristics of their authentic wallets and created a tamper-proof Physical Code™. 4/8
We developed an end-user iOS application which employs this algorithm and allows customers to verify their device’s authenticity and if the hardware has been tampered with. 📱 5/8
The customer initiates the verification process, and the augmented reality (AR) guidance leads them to the correct point of verification. Photos are taken and uploaded automatically, and all the customer has to do is wait for the verification result. ✔️ 6/8
What sets Veracity Protocol apart from existing solutions is that we protect the product as is — without chips, markers, or other embedded elements. All we need is the product and the smartphone app. 👍 7/8
You can follow @VeracityProtocl.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: