# GetTrusted Overview

[**GetTrusted** ](https://gettrusted.app/)is a **human-to-human trust layer** that verifies identity across any communication channel targeting removing deepfakes and social engineering from your threat model and preventing before they impact their victims.

### Jump right in

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><h4><i class="fa-leaf">:leaf:</i></h4></td><td><strong>Security Foundations</strong></td><td>Learn how GetTrusted works.</td><td><a href="https://2326890204-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FFLgHngqkS37CVWDXID8t%2Fuploads%2F6MkmvrAkdz835BIL5pzp%2FUntitled%20diagram-2025-10-10-124815.svg?alt=media&#x26;token=b336d23c-48f1-4721-a46e-659c669afd79">Untitled diagram-2025-10-10-124815.svg</a></td><td></td><td><a href="architectural-foundations">architectural-foundations</a></td></tr><tr><td><h4><i class="fa-fingerprint">:fingerprint:</i></h4></td><td><strong>Individuals Start Here</strong></td><td>Learn how to setup and exchange trust with your first contact.</td><td><a href="https://2326890204-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FFLgHngqkS37CVWDXID8t%2Fuploads%2FvNs7vdoDw7aKxsRG92x4%2FBF0A5C94-8790-45D3-9EEF-F39E5231F85D_1_105_c.jpeg?alt=media&#x26;token=54a5ea11-c167-40b8-a5a2-8444a5581122">BF0A5C94-8790-45D3-9EEF-F39E5231F85D_1_105_c.jpeg</a></td><td></td><td><a href="getting-started/quickstart">quickstart</a></td></tr><tr><td><h4><i class="fa-building-memo">:building-memo:</i></h4></td><td><strong>Enterprise Start Here</strong></td><td>Get started with Enterprise GetTrusted today.</td><td><a href="https://2326890204-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FFLgHngqkS37CVWDXID8t%2Fuploads%2F6YS7UeNVHLSLpnx4JB9u%2Fliheader.png?alt=media&#x26;token=057f32ce-19f1-4ffd-855f-163064ff49c7">liheader.png</a></td><td></td><td><a href="getting-started/quickstart-for-enterprises">quickstart-for-enterprises</a></td></tr></tbody></table>

### GetTrusted Core Tenets <a href="#get-started" id="get-started"></a>

#### **1. Human-First Security**

> Security should empower people, not burden them.

We design systems around **how humans actually live, not how we wish they did.** We know that calls, texts, email, video communications to personal cell phones is a primary business communication today and we make cryptographic verification as simple as a glance or tap.\
No passwords, no guesswork, no “trust me” moments.

#### **2. Proof Over Promises**

> Trust should be verified, not assumed.

Every verification in GetTrusted is **cryptographic, hardware-backed, and auditable**.\
We don’t rely on memory, caller ID, or internal tools. We rely on math.

#### **3. Privacy by Design**

> Zero knowledge. Maximum assurance.

GetTrusted never stores secrets, passwords, or private keys. We rely on your GetTrusted Identity when identifying with our servers.  All identities live **on the user’s hardware**, not our servers. Encryption is end-to-end, with **no third-party exposure** or recovery access.&#x20;

#### **4. Universal Interoperability**

> Trust shouldn’t stop at your perimeter.

We verify across systems, organizations, and channels. Whether a call comes from HR, a partner, or a personal contact, verification just works, anywhere.

#### **5. Recoverability With Minimal Risk**

> Identity should be durable, not fragile.

We enable secure recovery through just like your identity is recoverable, we create a recoverable backup key so that your data is recoverable only by the rightful owner, never by us. Same identity, new hardware, zero compromise.

{% hint style="info" %}
We rely on you storing your backup information safely and securely as someone with your backup information and your passphrase can recover your identity.&#x20;
{% endhint %}

#### **7. Trust That Scales**

> From one person to an entire enterprise.

GetTrusted grows from a single verified exchange to an organization-wide trust fabric.\
Verification events build a network of proven identities, enabling safer communication everywhere.Get started

* Want to learn more about GetTrusted? [Visit our website](https://gettrusted.app/).
* Interested in a demo? Lets [get you booked.](https://gettrusted.app/request-demo)
* Ready to stop social engineering and deep fake threats? Check out the [Quick Start](https://docs.gettrusted.app/getting-started/quickstart)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.gettrusted.app/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
