# GetTrusted Overview

[**GetTrusted** ](https://gettrusted.app/)is a **human-to-human trust layer** that verifies identity across any communication channel targeting removing deepfakes and social engineering from your threat model and preventing before they impact their victims.

### Jump right in

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><h4><i class="fa-leaf">:leaf:</i></h4></td><td><strong>Security Foundations</strong></td><td>Learn how GetTrusted works.</td><td><a href="https://2326890204-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FFLgHngqkS37CVWDXID8t%2Fuploads%2F6MkmvrAkdz835BIL5pzp%2FUntitled%20diagram-2025-10-10-124815.svg?alt=media&#x26;token=b336d23c-48f1-4721-a46e-659c669afd79">Untitled diagram-2025-10-10-124815.svg</a></td><td></td><td><a href="architectural-foundations">architectural-foundations</a></td></tr><tr><td><h4><i class="fa-fingerprint">:fingerprint:</i></h4></td><td><strong>Individuals Start Here</strong></td><td>Learn how to setup and exchange trust with your first contact.</td><td><a href="https://2326890204-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FFLgHngqkS37CVWDXID8t%2Fuploads%2FvNs7vdoDw7aKxsRG92x4%2FBF0A5C94-8790-45D3-9EEF-F39E5231F85D_1_105_c.jpeg?alt=media&#x26;token=54a5ea11-c167-40b8-a5a2-8444a5581122">BF0A5C94-8790-45D3-9EEF-F39E5231F85D_1_105_c.jpeg</a></td><td></td><td><a href="getting-started/quickstart">quickstart</a></td></tr><tr><td><h4><i class="fa-building-memo">:building-memo:</i></h4></td><td><strong>Enterprise Start Here</strong></td><td>Get started with Enterprise GetTrusted today.</td><td><a href="https://2326890204-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FFLgHngqkS37CVWDXID8t%2Fuploads%2F6YS7UeNVHLSLpnx4JB9u%2Fliheader.png?alt=media&#x26;token=057f32ce-19f1-4ffd-855f-163064ff49c7">liheader.png</a></td><td></td><td><a href="getting-started/quickstart-for-enterprises">quickstart-for-enterprises</a></td></tr></tbody></table>

### GetTrusted Core Tenets <a href="#get-started" id="get-started"></a>

#### **1. Human-First Security**

> Security should empower people, not burden them.

We design systems around **how humans actually live, not how we wish they did.** We know that calls, texts, email, video communications to personal cell phones is a primary business communication today and we make cryptographic verification as simple as a glance or tap.\
No passwords, no guesswork, no “trust me” moments.

#### **2. Proof Over Promises**

> Trust should be verified, not assumed.

Every verification in GetTrusted is **cryptographic, hardware-backed, and auditable**.\
We don’t rely on memory, caller ID, or internal tools. We rely on math.

#### **3. Privacy by Design**

> Zero knowledge. Maximum assurance.

GetTrusted never stores secrets, passwords, or private keys. We rely on your GetTrusted Identity when identifying with our servers.  All identities live **on the user’s hardware**, not our servers. Encryption is end-to-end, with **no third-party exposure** or recovery access.&#x20;

#### **4. Universal Interoperability**

> Trust shouldn’t stop at your perimeter.

We verify across systems, organizations, and channels. Whether a call comes from HR, a partner, or a personal contact, verification just works, anywhere.

#### **5. Recoverability With Minimal Risk**

> Identity should be durable, not fragile.

We enable secure recovery through just like your identity is recoverable, we create a recoverable backup key so that your data is recoverable only by the rightful owner, never by us. Same identity, new hardware, zero compromise.

{% hint style="info" %}
We rely on you storing your backup information safely and securely as someone with your backup information and your passphrase can recover your identity.&#x20;
{% endhint %}

#### **7. Trust That Scales**

> From one person to an entire enterprise.

GetTrusted grows from a single verified exchange to an organization-wide trust fabric.\
Verification events build a network of proven identities, enabling safer communication everywhere.Get started

* Want to learn more about GetTrusted? [Visit our website](https://gettrusted.app/).
* Interested in a demo? Lets [get you booked.](https://gettrusted.app/request-demo)
* Ready to stop social engineering and deep fake threats? Check out the [Quick Start](https://docs.gettrusted.app/getting-started/quickstart)
