Fintech fraud prevention

Replace SMS OTP
with biometric proof

Verum gives fintech apps a single API call that returns a cryptographic, device-bound verification receipt. Phishing-proof. Post-quantum signed.

122% ↑fintech ATO attacks in 2024
1,055% ↑SIM swap fraud
SMS OTP phished in real time
// Step 1: create challenge
POST /api/vouch/challenge
{
"transaction_context": {
"amount": 2500,
"recipient": "James Chen"
}
}
// Response — verified receipt
{
"verified": true,
"pqc_signature": "ML-DSA-65..."
}
VerifiedPost-quantum signed
The problem

SMS OTP is broken. Fraud knows it.

The attacks have outpaced the authentication method.

1,055%
SIM swap fraud increase in 2024

Attackers port your number, receive your OTP, drain the account. Your SMS code is the attack surface.

122%
Rise in fintech account takeovers

Credential stuffing turns leaked databases into account takeover campaigns at industrial scale.

Real time
SMS OTP phished live

Adversary-in-the-middle proxies capture and replay OTPs before the user even notices.

Why Verum

Built for the attacks that are happening now

Designed around the threat model, not the convenience model.

Not phishable by design

WebAuthn assertions are cryptographically bound to your exact domain. A fake site gets a useless assertion that fails verification.

Post-quantum signed receipts

Every verification produces an ML-DSA signature — NIST FIPS 204 standardized, quantum-resistant — giving you immutable proof that survives cryptanalytic advances.

Zero PII on Verum servers

Biometric verification happens in the device's secure enclave. No biometric data, no passwords, no credentials ever reach Verum. Nothing to breach.

Pricing

Simple, usage-based pricing

Start free. Pay only when you scale.

Pilot

Free
up to 1,000 verifications/month
  • Full API access
  • WebAuthn + ML-DSA receipts
  • Signed receipt per verification
  • Developer docs + support
Request access
Design partner

Growth

$0.08/verification
above 1,000/month
  • Everything in Pilot
  • Unlimited verifications
  • Webhook delivery
  • Dedicated integration support
Request access

Significantly cheaper than SMS OTP at scale. No per-seat pricing.

Who it's for

Built for fintech teams

🏦

Neobanks

Add biometric step-up auth to high-value transfers without adding friction to everyday banking.

💳

Payment processors

Replace SMS OTP with phishing-resistant verification for transaction approval.

Crypto exchanges

Protect withdrawals and address changes with cryptographically-bound proof of presence.

📋

Lending & insurance

Collect biometrically-verified consent for loan agreements and policy changes.

🛒

Buy now, pay later

Verify user presence at checkout to reduce first-party fraud and chargebacks.

Get started

Stop losing money to fraud you could have prevented.

Every transaction that slips through costs you more than the fraud itself — chargebacks, dispute ops, regulatory scrutiny. Verum closes the gap in an afternoon.

Phishing-resistant — no shared secret to steal
Sub-second verification — zero user friction
Post-quantum signed receipt per transaction
REST API — two endpoints, one afternoon

WebAuthn W3C standard

NIST FIPS 204 ML-DSA

Zero PII stored

REST API

How it works

Two endpoints. One afternoon.

Drop biometric fraud prevention into any existing flow.

1

Call the challenge endpoint

Your backend calls the challenge endpoint with user ID and transaction context. Takes one line of code.

POST /api/vouch/challenge
2

Frontend prompts biometrics

Pass the WebAuthn options to the browser. The user authenticates with Face ID or fingerprint — no app, no account required.

3

Call the verify endpoint

Send the credential assertion and challenge ID. Verum verifies the WebAuthn response and signs the transaction context with ML-DSA.

4

Receive a signed receipt

A post-quantum cryptographic receipt tied to the user's biometric and the exact transaction — immutable evidence for disputes and audits.

POST /api/vouch/verify/{challenge_id}
FAQ

Frequently asked questions

What exactly does Verum verify?+

Verum verifies that the person holding the registered device — and who can authenticate with its biometric sensor — approved a specific transaction context. You send the context (amount, payee, action), and Verum returns a cryptographic receipt proving the user's biometric was presented for that exact context.

How is this different from WebAuthn I already have?+

Standard WebAuthn proves authentication. Verum adds a post-quantum ML-DSA signature over the transaction context — tying the biometric event to a specific payload. That receipt is your dispute-proof evidence, independently verifiable without calling Verum.

What is ML-DSA and why does it matter?+

ML-DSA (Module-Lattice-Based Digital Signature Algorithm) is a NIST-standardized post-quantum algorithm, finalized in FIPS 204. Unlike RSA or ECDSA, ML-DSA signatures remain secure against cryptanalytic attacks from quantum computers — ensuring your receipts hold up for years.

Is any biometric data stored by Verum?+

No. Biometric verification happens entirely within the hardware-backed secure enclave on the user's device. The biometric never leaves the device. Verum only sees the cryptographic assertion produced by the enclave.

How do I integrate?+

Two API calls: POST /api/vouch/challenge with your transaction context to start the flow, then POST /api/vouch/verify with the WebAuthn assertion and challenge ID to complete it. The verify response contains the ML-DSA signed receipt.

What regulations does this support?+

The biometric + cryptographic audit trail supports Strong Customer Authentication (SCA) under PSD2/PSD3, FFIEC guidance on layered security, and provides the documented evidence trail required under CFPB dispute resolution rules.