Simulating browser-native claim verification via right-click
What is this?
This page demonstrates text selection verification. Select text directly on web pages — including the verify: line — and verify it against the issuer's endpoint.
This simulates what browsers could do natively in the future: recognize verify: URLs in selected text and offer a "Verify" option in the context menu.
How to Use
Select any text block below (including the verify: or vfy: line at the end)
Click the green "Verify" button that appears
See the verification result in the browser chrome bar at the top
Click the result bar to expand and see the normalized text and hash
Example 1: Peer Reference (Real Domain)
Should verify as OK — verifies against paulhammant.com
I, Paul Hammant, worked for Kevin Behr in
his role as CIO of HedgeServ in New York City
in 2015 and 2016
verify:paulhammant.com/refs
Example 2: Revoked Employment Reference
Should verify as REVOKED
MERIDIAN CONSULTING GROUP
EMPLOYMENT REFERENCE
Ref: MCG-EMP-2024-0847
This confirms that
SARAH CHEN
was employed as Senior Project Manager
from March 2021 to November 2023.
During her tenure, Ms. Chen demonstrated
strong leadership and project delivery skills.
Issued: 15 January 2024
HR Director: James Morton
verify:live-verify.github.io/live-verify/c
This is a fake claim that has never been
registered with any verification endpoint.
The hash computed from this text will not
be found at the verification URL.
verify:live-verify.github.io/live-verify/c
Privacy Note:
All processing happens locally in your browser. The only network request made is the final hash lookup to the issuer's endpoint. The issuer never sees the original text - only the SHA-256 hash.
Future: Native Browser Support
Imagine this built into Chrome, Safari, and Firefox: select any text containing a verify: URL, right-click, and see "Verify Claim" in the context menu. The verification result appears in the browser's trusted UI (address bar area), not in the page itself - preventing fake "Verified" badges from malicious pages.
This page simulates that experience. The green bar at the top acts as the browser chrome where verification results would appear in a native implementation.
More demos:
The simulated integration tests run full-stack verification with authority chains, fake TLS domains, and real browser extension — police IDs, bank statements, OFSI sanctions licences, and revoked references. See the repo for demo videos.
The training pages have additional fictional documents for OCR testing.