Secure Media

In an era where digital content is easily manipulated, the need for authenticity and trust in media sharing has never been more critical. Secure Media offers a groundbreaking solution that empowers users to capture, share, and verify photos and videos with confidence. Leveraging advanced encryption techniques, each piece of media is embedded with a Secure Web Token (JWT), ensuring that it remains unaltered and authentic from the moment it is captured.

With the added capability of including location information and date timestamps, Secure Media provides a comprehensive framework for validating the context of shared content. This innovative approach not only enhances user trust but also helps combat scams, fraud, and identity theft across various platforms, including e-commerce, social media, and online services.

Whether you are a traveler documenting your adventures, a freelance photographer sharing your portfolio, or a consumer verifying product authenticity before making a purchase, Secure Media equips you with the capability needed to ensure the integrity of your visual content. By prioritizing security and transparency, Secure Media transforms the way we interact with digital media, making it a reliable resource for individuals and businesses alike.

Key Features of Secure Media

Authenticity Verification

Ensure that all captured photos and videos are genuine and have not been altered. Secure Media uses advanced encryption methods to create a tamper-proof record of your media, providing peace of mind when sharing content.

Location and Timestamp Tracking

Every media comes with embedded location information and date timestamps, giving context to when and where the content was captured. This feature adds an extra layer of credibility, especially for reporting purposes

Easy Verification Process

Recipients of the media can quickly verify its authenticity using the same mobile application. This streamlined process fosters trust and confidence in shared content, whether for personal or professional use.

User Identity Validation

The secure media includes an email hash of the user who captured the content, allowing recipients to verify the identity of the media creator. This feature is particularly useful in preventing scams and ensuring genuine interactions.

Flexible Usage

Secure Media can be utilized across various scenarios—from personal photography and social media sharing to professional applications like journalism, legal documentation, and event verification.

Cost-Effective Solution

While users can access basic features for free, a low annual fee provides extended benefits and unlimited media verification, making Secure Media an affordable option for individuals and businesses alike.



How Does It Work?

Step 1: Download and install HexaEight Authenticator Mobile App
Step 2: Register for a Mail Vault and verify your Identity.
Step 3: Use the phone camera to capture your photo or video within the app.
Step 4: Your media is automatically stamped with a Secure Web Token, embedding location, date, and identity information.
Step 5: Share your secure media with your friends or collogues who can easily verify the authenticity of the shared media by just opening the photo or video using HexaEight Authenticator app.

Where to Use?

Preventing Deepfakes for Celebrities and Prominent Persons

Celebrities and prominent persons are frequently targeted by deep-fakes videos or photos manipulated to impersonate them or create false narratives. Secure Media provides a robust solution to this growing problem. By using Secure Media, celebrities can capture and share authenticated photos and videos, ensuring that the media cannot be altered or faked.

Each piece of media captured is stamped with a Secure Web Token (JWT), along with location information and a timestamp, ensuring that the content is verifiable. Fans, media outlets, and business partners can trust that the media originated from the celebrity and has not been tampered with.

In situations where false content could harm their reputation or brand, celebrities can provide indisputable proof of authenticity by leveraging Secure Media. Whether sharing content on social media, sending media to news outlets, or releasing behind-the-scenes footage, Secure Media helps ensure that the content is genuine, protecting public figures from the damaging effects of deep-fakes and unauthorized manipulations.

Verifiable ID Photos For Preventing Online Scams

Users can capture real-time selfies or short videos on their mobile phones as part of profile verification for platforms like social media, dating apps, or job portals. This technique can also be used to prevent scams where others steal profile pictures (such as on WhatsApp or Instagram) to pose as someone else and request money. With Secure Media, the photos or videos remain authentic and unaltered, giving confidence in the originality of the user’s profile image. Additionally, location information and date timestamps are embedded, providing proof of when and where the media was taken. To further verify someone's identity, users can request the other party’s email address to ensure they are the original owner of the media, preventing identity theft and other scams that rely on forged identities.

For Government Agencies and Law Enforcement

Law enforcement officers or government agencies can use the app to capture verified photos or videos of traffic violations or other offenses. This secure media can be used as indisputable evidence when issuing fines or penalties, ensuring that the recipient cannot dispute the authenticity of the violation captured on camera. The verified media can also include location data and timestamps, providing transparency and trust in the process while maintaining accountability for both officials and citizens.

Instant Reporting by Freelance Reporters

Freelance reporters can use their mobile phones to capture and send verified photos and videos to news channels for instant reporting. By ensuring the authenticity of the media through secure verification, reporters can provide timely and credible coverage of events, protests, or breaking news. The inclusion of location information and date timestamps allows news outlets to validate the context of the reports, enhancing the trustworthiness of the information shared with the public.

Proof of Product Condition in Peer-to-Peer Marketplaces

Sellers on platforms like Facebook Marketplace, eBay, or Craigslist can capture verified media of items they are selling. Buyers can rest assured that the product’s condition shown in the media is authentic, with location data and timestamps that provide context regarding when and where the item was photographed, reducing the likelihood of fraudulent listings and disputes over product quality during online transactions.

Verified Media for Freelance Photographers

Freelance photographers can use their mobile phones to capture photos for clients, ensuring that their work remains authentic and protected from tampering. They can share verified photos with clients or on platforms, including location information and timestamps to provide context about where and when the images were taken. This is especially important when dealing with high-value images or maintaining professional trust with clients.

Authentic Moments for Family Memories

Families can capture significant life moments in their life using mobile phones, knowing their memories will remain intact and unaltered. Secure media with location details and timestamps, ensures these cherished photos and videos can be shared authentically with loved ones, providing a clear remembrance of these memories 

Sharing Authentic Travel Experiences

Travelers can document their journeys using mobile phones, capturing photos and videos at destinations, events, or with friends. By sharing verified media that includes location details and timestamps, they can ensure the authenticity of their experiences, preventing doubts or accusations of sharing manipulated or fake content. This enhances the credibility of travel-related content on social platforms and allows viewers to see exactly when and where the content was created.

Verifiable Event Attendance

Event attendees at concerts, conferences, or festivals can use their mobile phones to capture photos or videos as proof of attendance. Verified media, complete with location data and timestamps, can be used for claiming event-based rewards, participating in promotions, or as evidence for work-related purposes, proving they were genuinely present and reducing the risk of fraudulent claims.

Verified Media for Educational Presentations and Demonstrations

Students can use their mobile phones to record videos or take photos of their presentations, science experiments, or demonstrations. By using the secure media feature, students can ensure that the captured content is authentic and has not been altered. The inclusion of location information and date timestamps allows them to share their work confidently with teachers and classmates, promoting integrity in the assessment process and verifying the context of their submissions.

Proof of Work Completion for Service Providers

Freelancers, contractors, and service providers can use their mobile phones to capture verified media of their completed work (e.g., home repairs, installations). This assures clients that the proof of work provided is authentic and hasn’t been manipulated. The addition of location information and timestamps provides context about where and when the work was done, minimizing potential disputes over service quality or completion.

The above is just a small list of use cases, but there are many more ways Secure Media can be used to protect and verify your content. Whether you're an individual, a business, or a public figure, the need for secure and authentic media has never been more vital. As digital interactions grow, so do the risks of manipulation and fraud. By incorporating Secure Media, you're not just protecting your content—you're building trust, credibility, and transparency with your audience. Explore how this powerful tool can safeguard your digital presence across a wide range of platforms and industries.

Get Started

Here are the steps to help you get started. View the above videos for clarity

Step 1 →

The first video will walk you through the steps to create your Email Vault and add a Generic Resource Token to your Mail Vault. This process is essential for verifying your identity.

Step 2 →

    In the second video, you will learn how to add a profile photo to your Mail Vault to for added benefits during media verification. Remember this step is optional.

Step 3 ✔

    In the last video, you will learn how to use the default stock camera to capture a video or photo as well as how to verify the authenticity and integrity of existing shared media


NOTE: Remember that once you purchase, the yearly access to Secure Media and have received the confirmation email, you will need to delete your existing Email Login Token from your vault and create a new one for the feature to take effect, otherwise the media captured will still have the capability to get validated only for 24 hours

Frequently Asked Questions



1. What is Secure Media?

Secure Media is a feature that allows users to capture and share photos and videos with a built-in verification process. Each piece of media is stamped with a Secure Web Token, ensuring its authenticity and protecting it from tampering. This allows recipients to confidently trust the media they receive.



2. How does media verification work?

When a user captures a photo or video through HexaEight Authenticator mobile app, a Secure Web Token using HexaEight Signature technology is embedded as a JSON Web Token (JWT) in the media file. This ensures that the media remains unaltered and can be used by Recipients to verify the integrity of the media using the same mobile application.


3. How do I verify someone’s identity using their media?

To verify someone's identity, request verified media from the individual. The media will include an email hash associated with the user who captured it. By knowing their email address, you can verify their identity and ensure the media has not been tampered.


4. What happens after 24 hours to the media?

For users who have not purchased the annual plan for their email address, the integrity verification capability for media is available for only 24 hours after capture. After this period, the media will lose its integrity status as the verification stamp is no longer accessible.


5. Can I use this for professional purposes?

Yes, Secure Media is ideal for professional purposes. Freelance photographers, government agencies, and businesses can utilize this feature to capture authentic media, ensuring that it is protected and verifiable. This is especially valuable for evidence collection, media reporting, and online transactions.


6. Can I download the Signature Token and modify the media metadata?

Yes, users can download and store the Signature token and host it separately separately and ho. However, you will be responsible for your own privacy and usage since the Signature Token is no longer hosted on our platform. 


7. What are the supported devices and platforms?


Currently, Secure Media feature is currently supported on Android devices, with plans to release an iOS version soon. A web version is also being planned to allow users to capture videos or photos using their browser.


8. I transferred my media using Whatsapp and now the other person says that they are unable to verify the authenticity of the media

When sharing media through online platforms, most of them automatically compress the file to save space during transfer. This compression can alter the file, making it impossible to verify its authenticity. To avoid this, always share your media as a document file, which preserves the original quality and ensures that it remains unchanged. By doing so, the recipient will be able to verify the file’s authenticity, no matter which platform you use to send it.


9. Is an internet connection required for Secure Media?

Yes, an internet connection is required to enforce the integrity of any captured media. This connection is necessary to generate the Secure Web Token that will be embedded within the media. However, an offline capture feature , which will allow users to enforce media integrity later, is coming soon .


10. Are my photos and media transferred to your Platform?

NO, the media (photos or videos) remain exclusively on your phone. Only the Signature token is generated on our Platform and stamped on the media within the app. Your media is not transferred to any server, ensuring your data remains private with you.

11. I don't want to capture the location in y media. Can I turn it off?

Yes, before capturing your photo or video,  turn off the phone's location. This will prevent our app from capturing the location while stamping your media.  

Purchase Access To Secure Media

You can get access to Secure Media for just $24 per year. If you have any questions not answered here, feel free to visit our Support Page, where you can easily submit a ticket or contact our support team for further assistance.

To complete your purchase, you'll be redirected to our secure partner page. Please make sure to provide the same email address associated with your Mail Vault for a seamless experience.

Note that this is not a subscription model and does not auto-renew. After one year from the date of purchase, you will need to manually purchase access again and recreate your Email Digital Token. If you don't renew, any media captured after the expiration will revert to the free version, where authenticity can only be verified for 24 hours.

Privacy Policy

Terms of Use

© Copyright 2024 HexaEight - All Rights Reserved
HexaEight Trademark is held by HexaEight. Various trademarks are held by their respective owners.