Skip to main content
Didit Raises $2M and Joins Y Combinator (W26)
Didit
Account recovery

Recover a lost account with a face check.

Replace security questions and SMS one-time codes with a biometric re-match against the enrolment selfie. Sub-2-second verdict, ~$0.15 per recovery, iBeta Level 1 certified.

Backed by
Y CombinatorRobinhood Ventures
GBTC Finance
Bondex
Crnogorski Telekom
UCSF Neuroscape
Shiply
Adelantos

Trusted by 2,000+ organizations worldwide.

A cinematic dark abstract password-recovery stack illustration, four floating translucent glass panels in 3D perspective on pure black, threaded by a luminous Didit Blue line and framed by four glowing scanner brackets. Each panel carries a small pale-white abstract motif (padlock outline, face oval, refresh-arrow loop, key).

Why a face check beats SMS

Re-prove identity. Not knowledge. In two seconds.

SIM-swap defeats SMS one-time codes. Phishing defeats security questions. Support reps defeat themselves under pressure. A live face match against the enrolment selfie defeats all three, at $0.15 per recovery, sub-two-second verdict, 500 free every month.

How it works

From sign-up to verified user in four steps.

  1. Step 01

    Create the workflow

    Pick the checks you want, ID, liveness, face match, sanctions, address, age, phone, email, custom questions. Drag them into a flow in the dashboard, or post the same flow to our API. Branch on conditions, run A/B tests, no code required.

  2. Step 02

    Integrate

    Embed natively with our Web, iOS, Android, React Native, or Flutter SDK. Redirect to a hosted page. Or just send your user a link, by email, SMS, WhatsApp, anywhere. Pick what fits your stack.

  3. Step 03

    User goes through the flow

    Didit hosts the camera, the lighting cues, the mobile hand-off, and accessibility. While the user is in the flow, we score 200+ fraud signals in real time and verify every field against authoritative data sources. Result in under two seconds.

  4. Step 04

    You receive the results

    Real-time signed webhooks keep your database in sync the moment a user is approved, declined, or sent to review. Poll the API on demand. Or open the console to inspect every session, every signal, and manage cases your way.

Built for security · Priced like infrastructure

Two checks. One call. $0.15 per recovery.

A recovery isn't a single check, it's a recipe. Liveness rejects the attack, Face Match approves the user, fallback channels keep no-camera users covered. All on one /v3/session/ call.
01 · Selfie re-auth

Match the recovery selfie. Approve the user.

Face Match 1:1 compares the live selfie to the user's stored enrolment selfie. Similarity score above the configured threshold (default 0.85) approves the recovery. $0.05 per match, sub-two-second verdict.
Face Match 1:1 module
02 · Liveness check

Reject prints, screens, masks, deepfakes.

Passive Liveness uses Presentation Attack Detection (PAD) signals, no head-tilt prompts, no friction. iBeta Level 1 certified. $0.10 per check. Active liveness ($0.15) available for higher-assurance apps.
Liveness module
03 · Step-up triggers

Fire recovery on the right risk signal.

Forgot-password, new-device sign-in, new-IP country sign-in, dormancy, sensitive action. Configure per scenario in the no-code Workflow Builder, high-risk triggers go straight to face + liveness, low-risk triggers go face-only.
Workflow Orchestrator
04 · Fallback channels

When the selfie isn't possible.

No camera, low light, hardware refused permission, fall back gracefully. Phone Verification (Short Message Service / WhatsApp / Telegram One-Time Passcode) at $0.03 per OTP, email magic link, Time-based One-Time Password (TOTP) authenticator app. Selfie always primary.
Phone Verification module
05 · Audit trail

Every recovery on the record.

vendor_data, device fingerprint, IP country, similarity score, verdict, every recovery attempt searchable in the Business Console, exportable per case. SOC 2 Type 1 + ISO 27001 controls.
Business Console
06 · Session policy

Re-auth cadence, per app.

Each sign-in, every 7 days, on sensitive action, on signal anomaly, pick the cadence per Didit application. Biometric Authentication ($0.10 per auth) extends the same Face Match primitive into a recurring login flow.
Biometric Authentication module
Integrate

One session. One webhook. Recovery unlocked.

Open the recovery session on the right trigger. Read the signed verdict. Unlock or escalate.
POST /v3/session/Recovery
$ curl -X POST https://verification.didit.me/v3/session/ \
  -H "x-api-key: $DIDIT_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "workflow_id": "wf_account_recovery",
    "vendor_data": "user-7382",
    "metadata": { "trigger": "forgot_password" },
    // base64 enrolment selfie, ≤ 1MB
    "portrait_image": "/9j/4AAQSkZJRgABAQE..."
  }'
201Created{ "session_url": "verify.didit.me/..." }
Block the recovery until the webhook says status: Approved.docs →
POST /webhooks/diditVerdict
// X-Signature-V2 verified upstream
if (payload.status === "Approved") {
  sendPasswordResetEmail(payload.vendor_data);
  registerNewDevice(payload.metadata);
} else if (payload.status === "Declined") {
  security.logRecoveryAttack(payload);
}
200OKstatus Approved · Declined · In Review · Kyc Expired
Verify X-Signature-V2 before reading the payload.docs →
Agent-ready integration

Ship account recovery in one prompt.

Paste into Claude Code, Cursor, Codex, Devin, Aider, or Replit Agent. Fill in your stack. The agent wires the trigger, opens the session, reads the verdict, and unlocks or escalates.
didit-integration-prompt.md
You are integrating Didit into an account-recovery flow. Replace knowledge-based recovery (security questions, SMS OTP, support-rep verification) with a biometric re-match against the user's enrolment selfie. ONE Didit session, two checks:

  - Passive Liveness — make sure the recovery selfie is a real human, not a print / screen / mask / deepfake.
  - Face Match 1:1 — match the recovery selfie against the user's enrolment selfie. If similarity is above your threshold, the recovery is approved.

Bundle pricing (verified live, 2026-05-16):
  - Passive Liveness: $0.10 per recovery
  - Face Match 1:1: $0.05 per recovery
  - Total: ~$0.15 per recovery — public price, no minimums
  - First 500 verifications free every month, forever
  - SMS / WhatsApp One-Time Passcode (OTP) fallback: $0.03 per OTP (when biometric isn't possible)

PRE-REQUISITES
  - Production API key from https://business.didit.me (sandbox key in 60s, no card).
  - Webhook endpoint with HMAC SHA-256 verification using the X-Signature-V2 header.
  - User's enrolment selfie on file — captured during initial KYC via a previous /v3/session/. Stored under your tenant in encrypted form.
  - A workflow_id from the Workflow Builder that runs Passive Liveness + Face Match 1:1 against the stored reference.

STEP 1 — Trigger recovery on the right signal

  Recovery is gated by your risk policy. Typical triggers:

  - User clicks "Forgot password" — always.
  - Sign-in from a new device + new IP country at the same time.
  - Sign-in after account dormancy (e.g. 180+ days).
  - Sensitive action: large withdrawal, payout to a new beneficiary, account-settings change.

  Each trigger opens a Didit session.

STEP 2 — Open the recovery session

  POST https://verification.didit.me/v3/session/
  Headers:
    x-api-key: <your api key>
    Content-Type: application/json
  Body:
    {
      "workflow_id": "<wf id with Passive Liveness + Face Match against enrolment selfie>",
      "vendor_data": "<your user id, max 256 chars>",
      "callback": "https://<your-app>/account/recovery/callback",
      "metadata": {
        "trigger": "forgot_password",
        "device_fingerprint": "<your device fingerprint>",
        "ip_country": "ES"
      },
      "portrait_image": "<base64 JPEG of the user's enrolment selfie, ≤ 1 MB — REQUIRED when the workflow has FACE_MATCH active; the recovery flow matches the new live selfie against this stored reference>"
    }

  Response: 201 Created with a hosted session URL. Redirect the user (web or in-app webview) to the URL. Sub-2-second median verdict on completion.

STEP 3 — Read the signed webhook on the verdict

  Didit POSTs to your callback. Session statuses are Title Case With Spaces:

  Body (excerpted):
    {
      "session_id": "<uuid>",
      "vendor_data": "<your user id>",
      "status": "Approved",
      "liveness": { "status": "Approved" },
      "face": { "status": "Approved", "similarity_score": 0.94 }
    }

  Status enum (exact case): Approved | Declined | In Review | Resubmitted | Expired | Not Finished | Kyc Expired | Abandoned.

  Verify the X-Signature-V2 header BEFORE reading the body — HMAC SHA-256 of the raw bytes with your webhook secret.

STEP 4 — Branch on the verdict

  Approved          → unlock recovery: send the password-reset email, register the new device, complete the sensitive action.
  In Review         → soft-fail the recovery, route to support for human review.
  Declined          → block the recovery; log the hit. Could be a printed-photo or screen-replay attack — surface to security.
  Resubmitted       → user retried after a soft rejection — re-read.
  Kyc Expired       → reference selfie has aged out (per your retention policy) — fall back to documented recovery flow.

STEP 5 — Fallback for users who can't take a selfie

  Camera missing, low light, hardware refused permission. Two graceful fallbacks:

  - SMS / WhatsApp / Telegram One-Time Passcode (OTP) via Didit Phone Verification, $0.03 per OTP.
  - Email magic link via your existing transactional email provider, $0.03 per email.
  - Authenticator app — Time-based One-Time Password (TOTP) or FIDO2 hardware key, free.

  Configure the fallback chain in the Workflow Builder. Selfie always tried first.

WEBHOOK EVENT NAMES
  - Sessions: status changes flow through the standard session webhook.

  Verify X-Signature-V2 on every payload.

CONSTRAINTS
  - Session statuses use Title Case With Spaces (Approved, In Review). Do not lowercase or snake_case them.
  - The recovery similarity threshold is configurable per app — start at 0.85, tune up for high-assurance apps (banks, brokerages) and down for low-friction consumer apps.
  - Liveness is a Presentation Attack Detection (PAD) Level 1 model — defeats prints, screens, masks, deepfakes on consumer cameras. Active liveness (head-tilt prompts) is available for higher-friction higher-assurance flows at $0.15.
  - The user's enrolment selfie must have been captured by Didit (any prior /v3/session/ with face capture). Bring-your-own enrolment image is roadmap.
  - Default audit retention is 5 years configurable in the Business Console.

Read the docs:
  - https://docs.didit.me/sessions-api/create-session
  - https://docs.didit.me/core-technology/face-match/overview
  - https://docs.didit.me/core-technology/liveness/overview
  - https://docs.didit.me/integration/webhooks

Start free at https://business.didit.me — sandbox key in 60 seconds, 500 verifications free every month, no credit card.
Need more context? See the full module docs.docs.didit.me →
Compliant by design

Open a new country in one click. We do the hard work.

We open the local subsidiaries, secure the licenses, run the penetration tests, earn the certifications, and align with every new regulation. To ship verifications in a new country, flip a toggle. 220+ countries live, audited and pen-tested every quarter, the only identity provider an EU member-state government has formally called safer than in-person verification.
Read the security & compliance dossier
EU financial sandbox
Tesoro · SEPBLAC · BdE
ISO/IEC 27001
Information security · 2026
SOC 2 · Type I
AICPA · 2026
iBeta Level 1 PAD
NIST / NIAP · 2026
GDPR
EU 2016/679
DORA
EU 2022/2554
MiCA
EU 2023/1114
AMLD6 · eIDAS 2.0
EU-aligned by design

Proof numbers

Proof numbers
  • ~$0.15
    Per fully-checked recovery, Passive Liveness + Face Match 1:1.
  • <0s
    End-to-end verdict per session, on entry-level Android.
  • iBeta L1
    Presentation Attack Detection (PAD) certification, defeats prints, screens, masks, deepfakes.
  • 0
    Free verifications every month, on every account.
Three tiers, one price list

Start free. Pay per usage. Scale to Enterprise.

500 free verifications every month, forever. Pay-as-you-go for production. Custom contracts, data residency, and SLAs (Service Level Agreements) on Enterprise.
Free

Free

$0 / month. No credit card required.

  • Free KYC bundle (ID Verification + Passive Liveness + Face Match + Device & IP Analysis), 500 / month, every month
  • Blocklisted Users
  • Duplicate Detection
  • 200+ fraud signals on every session
  • Reusable KYC across the Didit network
  • Case Management Platform
  • Workflow Builder
  • Public docs, sandbox, SDKs, MCP (Model Context Protocol) server
  • Community support
Most popular
Pay per usage

Usage Based

Pay only for what you use. 25+ modules. Public per-module pricing, no monthly minimum fee.

  • Full KYC at $0.33 (ID + Biometric + IP / Device)
  • 10,000+ AML datasets, sanctions, PEPs, adverse media
  • 1,000+ government data sources for Database Validation
  • Transaction Monitoring at $0.02 per transaction
  • Live KYB at $2.00 per business
  • Wallet Screening at $0.15 per check
  • Whitelabel verification flow, your brand, our infrastructure
Enterprise

Enterprise

Custom MSA & SLA. For large volumes and regulated programs.

  • Annual contracts
  • Custom MSA, DPA, and SLA
  • Dedicated Slack and WhatsApp channel
  • Manual reviewers on demand
  • Reseller and white-label terms
  • Exclusive features and partner integrations
  • Named CSM, security review, compliance support

Start free → pay only when a check runs → unlock Enterprise for a custom contract, SLA, or data residency.

FAQ

Common questions

What is Didit?

Didit is infrastructure for identity and fraud, the platform we wished existed when we were building products ourselves: open, flexible, and developer-friendly, so it works as a real part of your stack instead of a black box you integrate around.

One API covers verifying people (KYC, know your customer), verifying businesses (KYB, know your business), screening crypto wallets (KYT, know your transaction), and monitoring transactions in real time, on a stack built to be:

  • Fast, sub-2-second p99 on every session
  • Reliable, in production with 1,500+ companies across 220+ countries
  • Secure, SOC 2 Type 1, ISO 27001, GDPR-native, and formally attested by Spain's financial regulator as safer than verifying someone in person

The footprint underneath: 14,000+ document types in 48+ languages, 1,000+ data sources, and 200+ fraud signals on every session. The Didit infrastructure dynamically learns from every session and gets better every day.

Why is password recovery a security weak point?

Because the recovery flow is the easiest place to bypass authentication. The user has forgotten the password, by definition you can't ask for it. Most apps fall back to:

  • Short Message Service (SMS) one-time codes, defeated by SIM-swap, signalling-protocol (SS7) interception, and rogue mobile operators.
  • Security questions, defeated by phishing, social-media research, and data-breach hashes.
  • Email magic links, defeated when the email account itself has been taken over.
  • Support-rep human verification, defeated by social engineering and pressure tactics on a tired agent.

A live face match against the enrolment selfie defeats all four.

What's wrong with SMS one-time codes specifically?

Three structural problems that won't go away:

  • SIM-swap attacks, an attacker convinces the carrier to port the number to a new SIM. Then the one-time codes arrive at the attacker.
  • Signalling-protocol (SS7) interception, telecom infrastructure flaws let attackers see SMS traffic for any number from anywhere in the world. Documented since 2014.
  • Two-Factor Authentication (2FA) prompt fatigue, the user gets so many codes that they approve attacker-initiated ones by reflex.

The US National Institute of Standards and Technology (NIST) has explicitly recommended against SMS for high-assurance recovery since 2017 (SP 800-63B).

How fast is the verification for my end user?

The full flow normally takes under 30 seconds end-to-end, pick up the ID, snap the document, snap the selfie, done. That is the fastest in the market. Legacy KYC providers usually take more than 90 seconds for the same flow.

On the back end, Didit returns the result in under two seconds at p99, measured from the moment the user finishes the selfie to the moment your webhook fires. Mobile capture is tuned for slow phones and slow networks: progressive image compression, lazy software development kit load, and a one-tap hand-off from desktop to phone via QR code if the user starts on web.

What if the user doesn't have an enrolment selfie on file?

Two scenarios:

  • Pre-existing users with no selfie, run a one-time enrolment flow first. Open a /v3/session/ with ID Verification + Face Match + Liveness, store the verified selfie on the user record. Cost: $0.33 (full KYC bundle).
  • New users, the enrolment selfie is captured during the standard KYC onboarding. Recovery is then automatic from the user's second sign-in onwards.

Bring-your-own enrolment image, your existing selfie corpus, is on the roadmap.

What happens if a user fails, abandons, or expires?

Every session lands on one of seven clear statuses, so your code always knows what to do:

  • Approved, every check passed. Move the user forward.
  • Declined, one or more checks failed. You can allow the user to resubmit the specific failed step (for example, re-take the selfie) without re-running the whole flow.
  • In Review, flagged for compliance review. Open the case in the console, see every signal, decide approve or decline.
  • In Progress, user is mid-flow.
  • Not Started, link sent, user has not opened it yet. Send a reminder if it sits too long.
  • Abandoned, user opened the link but did not finish in time. Re-engage or expire.
  • Expired, the session link aged out. Create a new session.

A signed webhook fires on every status change, so your database always stays in sync. Abandoned and declined sessions are free.

Where does my customer data live and how is it protected?

Production data is processed and stored in the European Union by default, on Amazon Web Services. Enterprise contracts can request alternative regions for jurisdictions whose regulators require it.

Encryption everywhere. AES-256 at rest across every database, object store, and backup. Transport Layer Security 1.3 in transit on every API call, webhook, and Business Console session. Biometric data is encrypted under a separate Customer Master Key.

Retention is yours to control. Default retention is indefinite (unlimited) unless you configure shorter, between 30 days and 10 years per application, and you can delete any individual session at any time from the dashboard or the API.

Certifications: SOC 2 Type 1 (Type 2 audit in progress), ISO/IEC 27001:2022, iBeta Level 1 PAD, and a public attestation from Spain''s Tesoro / SEPBLAC / CNMV that Didit''s remote identity verification is safer than verifying someone in person. Full report at /security-compliance.

Is Didit compliant for my industry?

Didit ships compliant by default for the regulators that matter to identity infrastructure:

  • GDPR + UK GDPR, controller / processor split, full Data Processing Agreement published, lead supervisory authority named (Spain''s AEPD).
  • AMLD6 + EU AML Single Rulebook, 1,300+ sanctions, politically exposed person, and adverse-media lists screened in real time.
  • eIDAS 2.0, EU Digital Identity Wallet aligned; reusable-identity ready.
  • MiCA (Markets in Crypto-Assets), ready for crypto on-ramps, exchanges, and custodians.
  • DORA, Digital Operational Resilience Act, EU financial-services operational resilience.
  • BIPA, CUBI, Washington HB 1493, CCPA / CPRA, US biometric privacy (Illinois, Texas, Washington) and California consumer privacy.
  • UK Online Safety Act, age-gating and child-safety obligations.
  • FATF Travel Rule, originator and beneficiary data on crypto transfers, IVMS-101 interoperable.

Detailed memo, every certificate, every regulator letter: /security-compliance.

How fast can I integrate and start verifying users?
  • 60 seconds to a sandbox account at business.didit.me, no credit card.
  • 5 minutes to a working verification through Claude Code, Cursor, or any coding agent via our Model Context Protocol (MCP) server.
  • A weekend to a production-ready integration with signed-webhook verification, retries, and a remediation flow when a user is declined.

Three integration paths, pick whichever fits your stack:

  • Embed natively with our Web, iOS, Android, React Native, or Flutter SDK.
  • Redirect the user to the hosted verification page, zero SDK.
  • Send a link by email, SMS, WhatsApp, or any channel, zero front-end work.

Same dashboard, same billing, same pay-per-success price for all three. Step-by-step guide at docs.didit.me/integration/integration-prompt.

What about deepfakes, can someone defeat the recovery with an AI-generated face?

Passive Liveness defeats consumer-grade deepfakes today. The Presentation Attack Detection (PAD) model looks for:

  • Texture artefacts, screen sub-pixel patterns, print halftone, latex specular highlights.
  • Motion-temporal cues, micro-expressions, micro-saccades, natural eye-blink timing.
  • Geometric inconsistencies, lighting that doesn't match the depicted environment, perspective skew.

Didit's PAD model is iBeta Level 1 certified. Active Liveness ($0.15) adds head-tilt prompts for higher assurance against the rare professional-grade real-time deepfake.

Deepfake defence is an arms race, Didit retrains the PAD model on a quarterly cadence against the latest attack corpora.

Can I use recovery on every sign-in (true biometric login)?

Yes, that's Biometric Authentication, a recurring re-auth pattern. $0.10 per auth:

  • User signs in with their normal username (no password, they forgot it last week anyway).
  • A Face Match against the enrolment selfie runs in 2 seconds.
  • Approved → in. Declined → fall back to recovery + password reset.

Same /v3/session/ contract, different workflow_id. Common for crypto exchanges, banking apps, and high-assurance consumer products. See /products/biometric-authentication for the recurring-auth pattern.

How is the recovery flow audited?

Every recovery attempt logs:

  • The vendor_data (your user identifier) and Didit session_id.
  • The device fingerprint and Internet Protocol (IP) country.
  • The trigger you passed in metadata (forgot_password / new_device / dormancy / sensitive_action).
  • The Passive Liveness verdict and confidence.
  • The Face Match similarity score and verdict.
  • The webhook delivery confirmation.

Searchable from the Business Console, exportable per user, 5-year retention configurable. SOC 2 Type 1 + ISO 27001 controls govern the storage.

Infrastructure for identity and fraud.

One API for KYC, KYB, Transaction Monitoring, and Wallet Screening. Integrate in 5 minutes.

Ask an AI to summarise this page