AI video is getting better and more common
Face swaps, cloned voices, and generated scenes now blend into normal social feeds. As image and video models improve, small cheating becomes easier and harder to spot.
RealRec is a camera app for verifiable media. It blocks imports, keeps an immutable source, and attaches a source reference to every export.
Why this is needed
Face swaps, cloned voices, and generated scenes now blend into normal social feeds. As image and video models improve, small cheating becomes easier and harder to spot.
Trust is social currency. A physique photo, a skate trick clip, or a Paris trip post only has value if people can know it is real. If viewers suspect AI fabrication, the post loses meaning, so quick access to the original source becomes critical.
How verification works
Every step keeps a direct reference from shared media back to the immutable source, so viewers can compare what changed and what did not.
Record only inside RealRec
You can capture media in the app, but you can never import existing files.
Original source is locked
Because capture is contained in the app, RealRec stores the true original and prevents user manipulation of that source file.
Export embeds source reference, source goes live
When exporting, RealRec overlays a small watermark with an ID and QR code. At the same time, it uploads the original capture to the source server.
Viewer scans QR to open source page
On social media, people can screenshot the content and scan the QR to open the URL with the original source and capture properties.
Only a few checks are usually enough
Not everyone needs to verify every post. If a few curious viewers check and find fakery, they can comment and everyone else sees it quickly.
Why it is practical for creators
Creators can still color-grade, trim, and polish after export in the regular photo library. The shared version does not need to be identical to the stored source to still depict real events. Viewers can compare both and use human judgment to decide whether edits changed authenticity.
The QR watermark carries the source location directly in the shared image or video. Saved copies and screenshots keep this info too, so people do not need a post description to find proof.
Hard edge case
This is the classic limitation of recording verification: the recording can be real, while what it depicts is fake. RealRec uses two capture-time tests to make this very hard to hide.
For every capture, RealRec takes two verification images at 0.5x and 5x (or min and max supported zoom). Screen setups are hard to hide at both levels. At wide zoom, environment or display borders often appear. At high zoom, pixels and display artifacts often appear.
The device flashes briefly at the beginning of video capture. Filmed screens typically show glare and reflections from this flash, while real scenes behave differently.
Design balance
RealRec focuses on source traceability in a format that stays practical for everyday sharing, while helping expose AI-generated and manipulated content.
Trust model
Verification only works if people trust the verifier. RealRec explicitly acknowledges that this is not a zero-trust system, and instead focuses on clear accountability and open scrutiny.
This model still requires trust in RealRec. If we wanted to manipulate verification records, we technically could, so your trust in us is a real part of the system.
Even with zero-trust design, someone still has to build and run it. You cannot personally verify every deployed detail all the time. Trust does not disappear; it moves to the implementers.
Many systems split trust across vendors and services. That means more handoffs, more weak links, and less clear ownership when something fails. RealRec keeps the critical path with one accountable team, with fewer handoffs and clearer audits.
Trust initiatives
RealRec is open to independent review of capture integrity, source immutability, and verification-link behavior. External scrutiny is a direct way to increase confidence in implementation quality.
Open source can increase trust, but it also exposes implementation details to everyone, including attackers. Public code makes it easier to study potential weak points. That is why we harden first, then consider open-sourcing the app and website after external reviews give high confidence in security.
iOS app
Record with verification, export with an embedded source reference, and share with a traceable original.
Replace the placeholder App Store URL in `appStoreUrl` when your listing is live.