
A Practical, Bipartisan Solution for Content Authentication
Anyone's voice and likeness can be stolen easily, from the telephone or online.
- Fake robocalls used the President's voice to suppress voters
- Scammers stole millions by impersonating executives on video calls
- Children's voices are cloned to trick parents
- Doctors' likenesses used to spread dangerous medical advice
A Straightforward Solution
Three CA Bills and an open source patent that work like a spam filter.

Let’s not wait to prevent a catastrophic deepfake.

What Is My Digital Identity?
Definition and Protection
Your digital identity is a comprehensive digital representation of you. It goes beyond just a 3D scan. It includes:
- Likeness: Photos, videos, and images capturing your face, body, and appearance.
- Voice: Audio recordings, voice messages, and any sound that captures the unique qualities of your speech.
- Movement: Videos or performance (motion) captures that represent how you move and behave physically.
- Biometric Data: Fingerprints, facial recognition data, retina scans, and other unique biological markers.

Why Protecting Digital Identity Matters
In the era of artificial intelligence and deepfake technology, the protection of your digital identity is crucial. Misuse of your digital identity can lead to:
- Fraud and Impersonation: Unauthorized use of your digital identity can lead to fraud, such as someone using your voice or likeness to deceive others.
- Privacy Violations: Unapproved use of your biometric data can result in severe privacy breaches.
- Reputational Damage: Deepfakes can create misleading or damaging representations of you, affecting personal and professional relationships.
- Financial Loss: Unauthorized use of your digital identity can lead to financial exploitation, such as using your likeness in advertisements without compensation.
Provenance: Ensuring Authenticity and Accountability
Provenance data is like an invisible watermark for your digital identity. It includes metadata that tracks the creation, modification, and ownership of digital content. This data is essential for:
- Verifying Authenticity: Ensuring that the digital content genuinely represents you and hasn’t been tampered with.
- Preventing Misuse: Allowing authorities to track and stop unauthorized use of your digital identity.
- Protecting Rights: Ensuring that you maintain control over how your digital identity is used and are compensated fairly for its use.