join the waitlist
Whether you have a question, feedback, or need support, our team is ready to assist you.

Join our waitlist to secure priority access to the Human Verification Card Kit when it launches. We'll notify you the moment kits become available and send you exclusive setup guides to get your verification network ready. Don't wait for the next scam call to realize you need protection—reserve your spot today and help us build a community that fights AI deception with analog truth.
Join our waitlist to secure priority access to the Human Verification Card Kit when it launches. We'll notify you the moment kits become available and send you exclusive setup guides to get your verification network ready. Don't wait for the next scam call to realize you need protection—reserve your spot today and help us build a community that fights AI deception with analog truth.
Join our waitlist to secure priority access to the Human Verification Card Kit when it launches. We'll notify you the moment kits become available and send you exclusive setup guides to get your verification network ready. Don't wait for the next scam call to realize you need protection—reserve your spot today and help us build a community that fights AI deception with analog truth.


we're here to help
Whether you have a question, feedback, or need support, our team is ready to assist you.
Start with 3-5 of your most important contacts - immediate family, close friends, or financial advisors who might legitimately need to reach you in emergencies. You can expand your network over time as needed but we reccomend keeping it small.
Once all circles are scratched off, you'll need to create new cards. We recommend keeping track of used circles and making fresh cards when you have 3-4 circles remaining to ensure continuous protection.
Both of you should create entirely new cards with fresh codes. The old cards become invalid once either person's card is compromised, lost, or stolen.
Yes, you can use this system any time you need to verify humanity. Follow the guidelines as stated exactly regardless.
The stickers are designed for long-term use and should remain intact for years under normal storage conditions. Keep your cards in a dry place away from extreme temperatures.
This could indicate you're dealing with a scammer. A legitimate contact with their card should be able to quickly locate and scratch the circle you specify. When in doubt, try a different circle or end the call.
No, one kit can create cards for two people. However, if you want to be part of multiple networks (family, work, etc.), you may need additional kits to create cards for different groups.
No. If a scammer physically steals your card, the codes remain hidden under the scratch-off stickers, so they can't see them without scratching - which would leave obvious evidence of tampering. However, once they scratch off stickers to see codes, those codes are compromised. The bigger risk is if someone gains access to your card and photographs or copies the codes after scratching them off. This is why you should: Store your card securely like you would cash or important documents Only scratch circles when you're actively verifying a call Immediately inform your network if your card is ever lost, stolen, or if you suspect someone had access to it Create new cards with fresh codes if there's any possibility of compromise Remember, even if someone got your codes, they'd still need to know they should call you impersonating your trusted contact AND know to expect a verification challenge. The system's strength comes from the combination of physical security and the verification process itself.

FAQ
we're here to help
Whether you have a question, feedback, or need support, our team is ready to assist you.
Start with 3-5 of your most important contacts - immediate family, close friends, or financial advisors who might legitimately need to reach you in emergencies. You can expand your network over time as needed but we reccomend keeping it small.
Once all circles are scratched off, you'll need to create new cards. We recommend keeping track of used circles and making fresh cards when you have 3-4 circles remaining to ensure continuous protection.
Both of you should create entirely new cards with fresh codes. The old cards become invalid once either person's card is compromised, lost, or stolen.
Yes, you can use this system any time you need to verify humanity. Follow the guidelines as stated exactly regardless.
The stickers are designed for long-term use and should remain intact for years under normal storage conditions. Keep your cards in a dry place away from extreme temperatures.
This could indicate you're dealing with a scammer. A legitimate contact with their card should be able to quickly locate and scratch the circle you specify. When in doubt, try a different circle or end the call.
No, one kit can create cards for two people. However, if you want to be part of multiple networks (family, work, etc.), you may need additional kits to create cards for different groups.
No. If a scammer physically steals your card, the codes remain hidden under the scratch-off stickers, so they can't see them without scratching - which would leave obvious evidence of tampering. However, once they scratch off stickers to see codes, those codes are compromised. The bigger risk is if someone gains access to your card and photographs or copies the codes after scratching them off. This is why you should: Store your card securely like you would cash or important documents Only scratch circles when you're actively verifying a call Immediately inform your network if your card is ever lost, stolen, or if you suspect someone had access to it Create new cards with fresh codes if there's any possibility of compromise Remember, even if someone got your codes, they'd still need to know they should call you impersonating your trusted contact AND know to expect a verification challenge. The system's strength comes from the combination of physical security and the verification process itself.

FAQ
we're here to help
Whether you have a question, feedback, or need support, our team is ready to assist you.
Start with 3-5 of your most important contacts - immediate family, close friends, or financial advisors who might legitimately need to reach you in emergencies. You can expand your network over time as needed but we reccomend keeping it small.
Once all circles are scratched off, you'll need to create new cards. We recommend keeping track of used circles and making fresh cards when you have 3-4 circles remaining to ensure continuous protection.
Both of you should create entirely new cards with fresh codes. The old cards become invalid once either person's card is compromised, lost, or stolen.
Yes, you can use this system any time you need to verify humanity. Follow the guidelines as stated exactly regardless.
The stickers are designed for long-term use and should remain intact for years under normal storage conditions. Keep your cards in a dry place away from extreme temperatures.
This could indicate you're dealing with a scammer. A legitimate contact with their card should be able to quickly locate and scratch the circle you specify. When in doubt, try a different circle or end the call.
No, one kit can create cards for two people. However, if you want to be part of multiple networks (family, work, etc.), you may need additional kits to create cards for different groups.
No. If a scammer physically steals your card, the codes remain hidden under the scratch-off stickers, so they can't see them without scratching - which would leave obvious evidence of tampering. However, once they scratch off stickers to see codes, those codes are compromised. The bigger risk is if someone gains access to your card and photographs or copies the codes after scratching them off. This is why you should: Store your card securely like you would cash or important documents Only scratch circles when you're actively verifying a call Immediately inform your network if your card is ever lost, stolen, or if you suspect someone had access to it Create new cards with fresh codes if there's any possibility of compromise Remember, even if someone got your codes, they'd still need to know they should call you impersonating your trusted contact AND know to expect a verification challenge. The system's strength comes from the combination of physical security and the verification process itself.

FAQ