Thanks to visit codestin.com
Credit goes to attestto.org

Verify any document. Issue any credential. Bridge any PKI.

Identity infrastructure built on W3C and IETF standards. Technologically neutral — works with any stack, any vendor, any government. Open source reference implementations anyone can deploy.

Identity infrastructure for the real world

Each use case below is either live or in active development, using open standards for identity resolution and credential verification.

Document verification

Drop a digitally signed PDF. The signature, certificate chain, and issuing authority are verified cryptographically — no account required, no data uploaded.

Cross-border PKI bridge

Costa Rica's Firma Digital PKI hierarchy mapped to did:pki DIDs. Every CA resolvable as a DID Document. A document signed in CR can be verified anywhere — one resolver endpoint, any country.

Professional credentials

Proposed framework for Verifiable Credentials for licensed professionals — doctors, lawyers, engineers. Mastery-based continuous competency model with issuance by professional bodies.

Proposed Architecture

Digital driving credentials

Proposed mobile driving license architecture following ISO 18013-5, with proctored exams, decay scoring, and renewal gates — anchored to the holder's DID.

Proposed Costa Rica

Use it today

Four surfaces, progressive adoption. Start with zero friction in the browser, go deeper as you need.

Live

Verify

Drag and drop a signed PDF. Verify the signature, certificate chain, and issuing CA — in your browser, nothing uploaded.

verify.attestto.com →
Live

App

Sovereign identity wallet. Store credentials, take proctored exams, present proofs. Progressive Web App — works on any device.

app.attestto.com →
Pre-release

Station

Desktop vault, signer, verifier, and mesh node. Full offline capability. Electron on macOS, Windows, and Linux.

Learn more →
Coming soon

Extension

Browser extension for web-native verification. Validates digital signatures on any page you visit.

Downloads →

W3C standards-track DID methods

Two DID methods, both on the W3C standards track, both with live resolvers. They bridge existing trust infrastructure into the DID ecosystem without replacing anything.

did:pki

Read-only DIDs derived from X.509 CA certificates. If a government CA exists, it already has a DID.

did:sns

Alias-anchored DIDs via Solana Name Service. Human-readable, verifiable identifiers.

resolver

Unified HTTP endpoint resolving both methods. DIF Universal Resolver compatible.

All standards & use cases →

What we stand for

Sovereignty Your keys, your device, your data.
Interoperability W3C, IETF, ISO standards only.
Privacy Selective disclosure by default.
Portability Fork it, export it, migrate freely.
Transparency Open source, open governance, open audit.
Neutrality You choose the technology, not us.
Public good Free for citizens, forever.
Read the full story →