It's 2:47am. A $50,000 wire transfer just completed. Your KYC said clean. Your 2FA passed. It wasn't your user.

Lorica verifies the human at the moment of the action. Not at signup.

get early access →

Built by a 19-year-old who used to certify aerospace components for NASA.

Lorica. Roman armor. Not worn at the gate — worn into the field.

Call /enroll once. A face embedding is stored. Never a photo — an irreversible mathematical representation.

Call /verify before any high-risk action. Liveness detection runs first. A deepfake injection fails here.

Receive a signed JWT. Your backend verifies it independently. No callback to Lorica. Portable proof of a human decision.

$ curl -X POST https://api.loricaapi.com/verify \
  -H "X-API-Key: lrca_live_..." \
  -d '{"user_id": "usr_4f8a2c", "image": "<base64_jpeg>"}'

{
  "match": true,
  "confidence": 0.94,
  "liveness_score": 0.97,
  "liveness_failed": false,
  "action_verified": "high_risk_action",
  "token": "eyJhbGciOiJIUzI1NiJ9..."
}

Deepfake injection attacks grew 311% in 2024. Your verify endpoint is the last line.

[ demo.mp4 ]

First 50 developers get free API access. 12 spots remaining. No spam.

access requested. api key incoming.

something went wrong. try again.