EDUCATION | EMPLOYMENT | AIRLINE STATUS | AND MORE

The Consumer Verification
That will not haunt you.

No phishing. No stale databases. Just clean consumer data, straight from the source. Compliant by design. Secured by cryptography.

3M+ verifications0 fraud0 data leakage29k+ universities10k+ employers100+ airlines & hotels
What you can verify

Any verification.
Global coverage.

10K+ EMPLOYERS

Employment & income

Verify employer and gross income from today's payroll. Most solutions rely on stale databases or phishing websites. Huge liability.

ADP
Workday
Paychex
Gusto
IRS
HMRC
Uber
DoorDash
Verified from payroll systems, tax portals and gig platforms.
Read more
29K+ SCHOOLS

Education enrollment

Pull live enrollment directly from universities. Not guessing using a .edu email, not using a transcript upload that's trivial to fake these days.

Stanford
MIT
Oxford
IIT Bombay
USP
Tsinghua
Universitas Indonesia
Heidelberg
Verified directly from 29,000+ universities, globally.
Read more
100+ AIRLINES & HOTELS

Loyalty & status match

Instant tier verification across 100+ airlines and hotels. No screenshots, no email back-and-forth. This industry is ridden with AI generated fraud.

Golden Loyalty Awards 2025
Winner — Startup of the Year, Loyalty Awards, Amsterdam
Read more
Need to verify something else?Ask us →
How it works

3 steps.
Fully secured by cryptography.

The protocol uses zero-knowledge cryptography to fetch a single, verified fact straight from the issuing source — never seeing the user's credentials, never storing their data.

STEP 01

User logs in to the source

Your user signs into their university, employer, airline, or bank as they always do. Not an unfamiliar phishing site. Familiarity builds trust.

User signs in
STEP 02

Only the needed fact is extracted

Name, enrollment status, tier, age. Only the field you asked for. Everything else stays on-device. No PII leaks. Consistent with GDPR data minimization laws.

Validating information
STEP 03

A cryptographic proof is generated

A zero-knowledge proof is generated on device. Akin to a digital notary. Unforgeable. You receive the proof on user consent. You can verify yourself.

Validation complete
Compliance & security

Reclaim never asks users to log in
on a third-party portal.

Tricking users into handing over a username and password to your verification vendor isn't a UX shortcut — it's a credential-phishing pattern. The regulator agrees. Your users do too.

With Reclaim, the user logs in on the real source (the employer, the university, the airline). We never see the password. All the verification happens on the browser, not our backend.

thirdparty-portal.com
Sign in to Acme Corp
Connect your employer to continue verification.
jordan.reyes
••••••••••••
Sign in
“We won't store your password. Pinky promise!”
↘ small print
“We won't store your password. Pinky promise!”
— literally every credential-aggregator
Reclaim Protocol in numbers

Verifiable.
At scale.

3M+
Verifications processed
0%
Fraud
45%+
Conversion rates, upto
29K+
Universities
10K+
Employers
100+
Airlines & hotels

Across customers in airline loyalty, mortgage & lending, and background checks — happy to introduce on request.

Madhavan Malolan

“We started this research in 2022 because we could see what AI was about to do to the internet. Documents would become trivially forgeable; the verification stack the entire economy runs on would silently break. We built Reclaim Protocol so every fact you verify is straight from the source — no document uploads, no phishing. All verified using cryptography, so even a single byte or pixel tampered with is caught trivially.”

“The better the AI models get, the more fraud there is — and the more you'll need Reclaim Protocol.”

Madhavan (Maddy) Malolan · Cofounder & CEO
Changing landscape

New world. But,
old verification stack?

AI fakes any document in 10 seconds. Regulators are watching more closely than ever before. Your users are globally distributed.
The old guard wasn't built for any of it:

  • Document uploads AI can fake it pixel to pixel. Impossible to catch.
  • Central Databases Country specific, and often stale.
  • Phishing websites Strict laws against storing and using user credentials.
Try it yourself!
See how trivial it is to generate a fake document
Click to upload
PDF or Image (PNG, JPG)
What to change?
Change the value of
0/140
Integration

The engineering team will love you for this.

Grab an API key, paste the SDK snippet, ship to staging this afternoon. Built by engineers, for engineers.

Self-serve API keys and docs for all frameworks. No sales call needed.
AI and MCP support that works with coding agents.
Cryptography that makes data security nightmares go away.
Open-source code with permissive licenses.
verify-enrollment.ts● ready
// 1. Initialize the verifier
import { ReclaimProofRequest } from '@reclaimprotocol/js-sdk';

const req = await ReclaimProofRequest.init(
  APP_ID,
  APP_SECRET,
  'university-enrollment'  // or 'employer-income', 'airline-tier'…
);

// 2. Send the user through the flow
await req.triggerReclaimFlow();

// 3. Receive a cryptographic proof. Done.
req.onProof(proof => {
  user.grantStudentDiscount(proof);
});
READY WHEN YOU ARE

Lower fraud. Stronger compliance.
One integration.

Plug in a test API key in 10 lines of code. Throw your fraud team's hardest examples at it. If we can't catch it, you don't pay.

● No sales call to start● Free test mode● Production in days, not quarters