Independent Forensic Boutique · Larnaca, Cyprus

AI makes decisions.
We make them defensible.

Plica is an independent forensic boutique for regulated file workflows. We audit the gap between the file your client submitted and the file your stack actually examined.

Truth lives in the layers.
A · AUTHENTICITY GENUINE 0.84 conf 84% C · CONSISTENCY metadata sensor dct hist layers_agree: true I · INTEGRITY FFT analysis PRNU corr FRC-L1-FFT-GRID · FRC-L1-PRNU-ABSENT L · LINEAGE intake resize recompr sha256_intake: a3f7c291… sha256_analysis: t7u6v5w4… P · PROVENANCE sterility: 0.12 Make: Apple · Model: iPhone 15 · GPS: ✓
The problem

The detector sees a copy.
Not the original.

Most KYC teams believe they verify the customer's file. In reality, the detector often sees a pipeline copy — already resized, recompressed, normalised, or sanitised by the intake stack.

That means the verdict may be valid for the derivative object — but not defensible for the original evidence.

"Show me exactly what you examined in that document — and prove it." When that question arrives from a regulator, a confidence score is not an answer.
What we measure

P · L · I · C · A

P
Provenance

Where the file came from. Does its digital biography match what was claimed?

L
Lineage

What changed before the decision. Every pipeline transform — logged with before/after hash.

I
Integrity

What physical signals survived. PRNU, DCT, FFT — the signals that distinguish a camera from a generator.

C
Consistency

Whether signal layers agree. Metadata vs. sensor physics vs. compression history.

A
Authenticity

Whether the result can be defended under scrutiny. Reproducible verdict, 90 days later.

Formalised in SDB-26 — an open benchmark framework for measuring synthetic document bypass rate. Published under CC BY 4.0.

sdb26.com →
Engagements

Three entry points.
One ladder.

Phase 0
Quick Scan
48-hour evidence review.

Send a ZIP of labelled document images. We return a signal-level breakdown of what your current stack catches, what it misses, and where provenance breaks. No infrastructure, no PII, no commitment.

≤ 100 files
48h turnaround
JPEG · PNG · WebP
Contact us
Phase 1
Full Audit
Evidence Pipeline Audit.

We map upload → pipeline → decision and show where the file stops being what your client submitted. Transform log design, hash chain repair, audit trail gap report. Three deliverables: ops, audit, board.

10–14 days
50–150 files
DPA required
Contact us
Ongoing
Retainer
Quarterly Forensic Baseline Review.

When your KYC vendor updates their model, you'll know what changed in FPR and bypass rate within the same week — not when a regulator asks.

Quarterly
Your corpus + SDB-26
Alert same week
Contact us
Who it's for

The question changes
by role.

MLRO · Head of Compliance
"If a regulator asks what we examined — can we show more than a vendor PASS?"

Plica produces a structured evidence record per decision — FRC reason codes, intake hash, transform log. Reproducible. Citable in regulatory review.

Head of Fraud · CTO
"Where in our pipeline does synthetic content pass undetected?"

We measure bypass rate by generator, attack level, and pipeline stage. You see exactly where the gap is — before the next incident.

CRO · Legal · Board
"What is our actual exposure if an approved file turns out to be synthetic?"

We quantify the evidence gap — what fraction of past decisions can be reconstructed to original upload — and what it takes to close it.

Writing

From the field.
On Medium.

FAQ

Before you reach out.

Does Plica replace our KYC vendor?

No. Plica is an independent forensic layer — not a replacement for Sumsub, Onfido, or Veriff. We audit what they produce and the pipeline that feeds them.

What file types does Phase 0 accept?

JPEG, PNG, WebP. No real PII at Phase 0 — use anonymised or synthetic labelled samples. PDF and video from Phase 1.

Do you sign NDA before Phase 1?

Yes. Phase 1 requires mutual NDA, DPA, agreed retention limits, and subprocessor disclosure before any data transfer. We prepare standard templates.

Who should we put you in touch with?

MLRO, Head of Compliance, Head of Fraud, or CRO — whoever owns the KYC decision process and has visibility into vendor contracts and audit obligations.

We already have a KYC vendor. Is this relevant?

Especially then. The gap Plica addresses is in the pipeline before the vendor, and in the evidence record after. Vendors don't certify their own decisions. We do — independently.

What is SDB-26?

An open benchmark framework for measuring synthetic document bypass rate. Published on GitHub under CC BY 4.0. P-L-I-C-A and FRC reason codes are formalised there. sdb26.com →

If the question is
"can we prove it"

Start with Phase 0. 48-hour turnaround. Send a ZIP of labelled document images. We return a signal-level breakdown — what your stack catches, what it misses, where provenance breaks.

We'll be direct if we can help — and equally direct if we can't.