be.
authentic.

In a world of AI, misinformation and duplicity, InkLink is an easy way to create, preserve, send and receive authentic information.

Get Started

INKLINK

Digital Proof Platform

Build trust. Share truth. Protect what's real.

THE PROBLEM

Is It Hard to Verify the Things That Matter? You’re Not Alone! Meet Emma...

Emma Johnson is a 32-year-old who works in tech and has just switched jobs and moved to San Francisco.

I was laid off from
my last company

I don't have access to
my awards & reviews

I want to rent
an apartment

Landlords want bank
statements which
seems invasive

It hasn’t been smooth.

My start date
was pushed back
by 2 months

It took the company 6
weeks to verify my college
degrees and employment

She cares about the environment and donates to charities.

I am a volunteer
lifeguard

I couldn't get a 50% discount
on my $1,000 wetsuit because I
couldn't prove it

I donated to
shadytrees.org

How can I know they
planted trees as promised?

She loves a deal and buys/sells secondhand goods.

I bought a
secondhand Hermes
Birkin handbag

It was fake!

Emma uses dating apps but hasn't been lucky in love.

His dating
profile said he
was single

After our 5th
date I found out he
was married!

Emma was a Division I college athlete.

I was a star
athlete in
college

I wish there was a way
to validate and share
my achievements

Skip Emma's Story

THE PROBLEM

Is It Hard to Verify the Things That Matter? You’re Not Alone! Meet Emma...

Emma Johnson is a 32-year-old who works in tech and has just switched jobs and moved to San Francisco.

I was laid off from
my last company

I don't have access to
my awards & reviews

I want to rent
an apartment

Landlords want bank
statements which
seems invasive

It hasn’t been smooth.

My start date
was pushed back
by 2 months

It took the company 6
weeks to verify my college
degrees and employment

She loves a deal and buys/sells secondhand goods.

I bought a
secondhand Hermes
Birkin handbag

It was fake!

Emma uses dating apps but hasn't been lucky in love.

His dating
profile said he
was single

After our 5th
date I found out he
was married!

Emma was a Division I college athlete.

I was a star
athlete in
college

I wish there was a way
to validate and share
my achievements

THE SOLUTION

Emma Created, Requested and Sent InkLink Proofs of Things That Matter to Her

Created for
her records

View Proof

View Proof

Sent to
landlords

View Proof

View Proof

Sent to
employer

View Proof

View Proof

Sent to retailer
for Discount

View Proof

View Proof

Received from
Shadytrees

View Proof

View Proof

Requested from
seller

View Proof

View Proof

Requested
from suitor

View Proof

View Proof

Created for
sharing on
social media

Learn More

View Proof

Anatomy of a Proof

The building blocks of a tamper-resistant proof that everyone can trust

Information

AI is used to extract pertinent information from source websites, documents, photos, videos, GPS data and NFC tags. This forms the basis of a proof and can include details like achievements, certifications, or transactions, which are summarized to support the proof.

Information

Provenance

A clear record of how the proof was generated, including all sources and navigation steps. Every step taken to create the proof is recorded to provide transparency and to ensure the information's authenticity and traceability.

Provenance

Privacy

Sensitive data is protected through redaction tools, enabling users to obscure information not relevant to the proof. Additionally, only cryptographic hashes are stored on the blockchain, ensuring personal data remains confidential.

Privacy

Identity

A users identity is verified through trusted sources for authenticity.  Users can share proofs using their social media handles and securely hash your full name, keeping your personal information private while ensuring your proof is verifiable and trustworthy.

Identity

Sharing

Proofs can be shared securely via customizable links, micro-sites, or APIs, allowing recipients to access verified information without compromising the original data.  Users control the information they want to share and the level of access they want to provide.

Sharing

Cryptography

A unique cryptographic hash of the information is created and stored on a blockchain. This process ensures that the proof is tamper-proof and can be independently verified without exposing the actual data.

Cryptography

How Emma Created an InkLink Proof

Proof of athletic achievement

1

Identify the Best Source of Information

Emma’s athletic accomplishments can be found in various places online. She chose to log in to her University Alumni Profile.

2

Go to Source of Information With Our Secure Browser

Emma logged in to University’s athletics website  securely with our virtual secure browser. It is completely safe with bank grade security.

3

Capture Essential Information

Emma captured a screenshot with key information from her Alumni Athletic Profile.

4

Safeguard Sensitive Data

Using InkLink's redaction tools Emma was able to black out sensitive data - easily hiding information not relevant to the proof.

5

Ensure Extracted Data Aligns With Your InkLink Profile

Credentials and verifications of ownership require matching PII for proof generation. You can link together PII from various sources.

Congrats! Proof is Created!

In a world of AI, misinformation and duplicity, InkLink is an easy way to create, preserve, send and receive authentic information.

Store in InkLink
Digital Trophy Case
or share on social
media

Upload an image,
Create AI art or
Choose an Artist’s
creation

Store in InkLink
Digital Trophy Case
or share on social
media

Upload an image,
Create AI art or
Choose an artist’s
creation

SEE INKLINK IN ACTION

Save Lives and The Environment!

Hurricane season has caused a critical blood shortage.

Commit to donating blood and InkLink will plant a tree on your behalf.

We'll provide proof of tree donation for every proof of scheduling blood donation appointment.

Let's Go

You'll be redirected to www.giveblood.me to schedule your blood donation.