Checkify is built to reduce data exposure by design: personal data stays on the user’s device, and businesses can verify trust without becoming long-term data custodians.
This page describes our security approach at a high level. Exact controls may vary by deployment and integration requirements.
Default to proofs (e.g., “Over 18”) rather than raw personal data. Users must explicitly consent to any data sharing.
Device-bound identities, biometric/PIN protection, and time-limited tokens reduce account takeover and replay risk.
Layered controls across device storage, cryptography, transport security, server protections, and auditability.
Businesses can request specific proofs (e.g., age threshold, residency, eligibility) and optionally request specific data points. Users see the full request and must explicitly consent before anything is shared. Checkify is designed to support proof-first flows to minimise data exposure.
Expiring requests, server verification, and signed payloads reduce the value of copied/forwarded codes.
Device-bound identity + biometric/PIN checks + short-lived tokens help prevent unauthorized access.
Proof-first flows and explicit consent reduce the likelihood of sensitive data being stored where it’s not needed.
Checkify is designed so personal data stays on the user’s device by default. Where server-side data is required for operational reasons (e.g., audit events, request references), we minimise personal data and focus on proofs and metadata.
Yes—businesses can request specific proofs and, if needed, specific data points. Users review every request and must explicitly consent before anything is shared.
Requests and responses are designed to be cryptographically verifiable, time-limited, and validated by the receiver. This makes tampering detectable and reduces replay value.
If you believe you’ve found a security vulnerability, please report it responsibly. We’ll review reports promptly and work with you to validate and remediate issues.
Don’t have a dedicated security email yet? Replace it with a monitored address you control.