How it works

The Content Authenticity Initiative (CAI) is a group working together to fight misinformation and add a layer of tamper-evident provenance to all types of digital content, starting with photos, video, and documents. We’re creating a solution for digital content provenance through open-source development, cross-industry collaboration, and interoperability of tools. Our work is fully compliant with the technical specifications released by the Coalition for Content Provenance and Authenticity (C2PA).

Learn more below about our secure workflow, following a piece of content from capture to edit to publish or sharing on social media below. 

 
 
 
 
 

1. Creation

We use cryptographic asset hashing to provide verifiable, tamper-evident signatures that the image and metadata hasn’t been unknowingly altered. At creation, choose what information to attach to the content being created. Throughout this process, the creator of content can choose to preserve attribution or to remain anonymous. Privacy and security of photojournalists and other creators are of the utmost consideration in our work.

 
 

 
 
 

2. Editing

Using tools like Photoshop, secure capture metadata will be preserved and amended with history data of any alterations to content. 

 
 

 
 
 

3. Publishing and sharing

Through partnerships with news organizations, see secure capture information and any relevant content edits preserved through the publishing process, through integration with publishers’ CMS. When content is shared on social networks, the product flow will preserve CAI metadata.  

 
 

 
 
 

4. Viewing

As a consumer of digital content, anyone can view historical information about content with CAI metadata through the Verify site.

 
 

Explore our Frequently Asked Questions or browse case study examples.