outtake / blog / verify
verify_whitepaper

Announcing Outtake Verify.

Email identity is broken - we're fixing it.

Alex dhillon
july 20, 2025
5 min read

Introduction

We're thrilled to announce Outtake Verify for Email: the email security product that guarantees you’re communicating with trusted counterparties.

Designed for enterprise teams and executives that use email for sensitive workflows, Verify is a simple browser extension that cryptographically signs emails with your unique device Passkey or your World ID, ensuring official communication is unmistakable and preventing vendor or executive impersonation or account takeover.

It's free for early partners, easy to deploy, and available now. In this post, we'll explain why email desperately needs this authentication layer, and how Verify delivers it.

Ready to never second-guess an email again?

figure 1
Watch our launch video to see how simple Verify really is.

The Pain: Email's Lack of Trust is Costing Billions

Situation: Early on at Outtake our team was flooded with phishing emails claiming to be me (Alex). They varied in sophistication and in what they requested from us: personal details, phone numbers, invoices, etc.

figure 2
One of the funnier, but less sophisticated phishing attempts we received

This problem is foundational in email. Email was built in the 1970s for messaging, not security. Anyone can spoof a domain, hijack an account, or craft convincing fakes.

And this lack of built in email security costs enterprises billions. 90% of data breaches start with a phishing email. In 2023 alone, the FBI reported $2.9 billion in losses from business email compromise (BEC) scams.

With generative AI enabling near zero cost for highly personalized and effective phishing campaigns, traditional email security providers are stuck in an accelerated arms race to distinguish real emails from the fakes.

As we swiped Junk on more and more fake emails, we became frustrated with why emails themselves weren’t properly authenticated. With the latest advances in passkey technologies and new email protocol standards like RFC 5322, we knew this was now possible.

So we decided to build that deterministic authentication layer.

figure 3
In 2023, Business Email Compromise (BEC) caused $2.95B in losses, making it the second costliest cybercrime after investment scams.

Meet Outtake Verify: Identity Built Into Every Email

Outtake Verify isn’t like existing SEGs (Secure Email Gateways) that set rules and probabilistically filter out spam and phishing emails. Instead, Outtake Verify is a deterministic process that allows senders to verify their identity on-the-fly when they send sensitive emails - preventing both impersonation and account takeovers.

Verified emails will appear with a "Verified Badge" to recipients who also have the extension installed, illustrating who actually pressed the Send button with 100% certainty.  

Verify can be layered in an enterprise’s existing email security stack to require Verification on workflows that meet certain sensitivity criteria or to enable focused inboxes for Verified messages, filtering out all unverified messages. The Verify web extension supports Gmail and Superhuman, with Outlook coming soon!)

figure 4
A short video showcasing Verify’s user experience.

How It Works: Sophisticated Tech, Simple Experience

Verify blends cutting-edge cryptography with effortless device-based verification, all without storing or transmitting your raw emails to Outtake’s servers. Here's the high-level breakdown:

Secure Onboarding: Tie Email and Identity to User Device  


Participating organizations first onboard by verifying ownership of their domain, logo, and other relevant business assets.

When an employee accepts an invitation to join, their full name, role and organization are registered at verify.outtake.ai via enterprise SSO/HRIS systems.

Employees tie their identity information to a passkey only they can unlock on their device, via standard FIDO options or World ID. Identity information from SSO is not stored on this passkey. 

figure 5
Verification mechanism a via passkey authentication partner World ID.

Sending Emails: Authenticate

Once finished composing an email, an employee hits the "Send" button, which is rendered by our extension as "Send Verified."

The employee is challenged to authenticate every few hours to every day, depending on your organization's security preferences.

Behind the scenes, the Verify for Email web extension hashes the email content and builds a Merkle Tree (the foundation of Git and Bitcoin) — a tamper-proof structure that securely hashes the message. No raw emails are sent to Outtake or stored. We save the hash. Everything else happens on the device.

Attackers can't fake this process; they'd need access to the passkey that employees unlock on their device via password or biometrics. Yet, to you and your employees, it's simple and easy - no IT overhauls required.

figure 6
Simplified diagram describing sending a Verified email.

Receiving Emails: Instant Verification Badge

If the email recipient also has Verify installed, Verify will detect if the hash of the incoming email matches the hash of the sent email. If there is a match, a Verified badge immediately appears in the recipient’s email client, confirming the email was sent by the expected person and was not tampered in transit.

No more second-guessing or out of band confirmations required - you’re sending and receiving emails that you know you can trust.

figure 7
Simplified diagram describing Verification on the reciever end.

How is this different from legacy solutions?

Email has a long history of email policies, with mixed outcomes. Unlike existing policies like SPF, DKIM, and DMARC, Verify adds a layer that is tied to your identity, so the recipient can trust that you work where you claim to work, and that you are who you claim to be.

Furthermore, unlike S/MIME or PGP/GPG, Verify does not rely on encryption, key-sharing, or Web of Trust techniques. Instead, Verify sends your emails as-is; verification occurs in the background via privacy-preserving lookups against a table of verified email hashes.

Finally, although modern email security products using ML to detect phishing are powerful, they still have false positives and false negatives. In contrast, Verify’s deterministic nature means messages are  Verified or not. This also means Verify doesn't suffer from the expensive process of training a classifier against your organization's inbox, it doesn't require cumbersome setup in your email environment, and it will never delay messages from hitting your inbox on time.

figure 8
A comparison chart of Outtake Verify relative to existing solutions.

Why Enterprises Need Verify: Unbreakable Verification

  • Eliminate Account Takeovers and Impersonations: Verify ensures only the real email owner sends "verified" emails, eliminating ATOs and spoofing that bypass current systems
  • Network-Wide Trust: Protection doesn't stop at your enterprise's inbox- it extends to partners and customers. When you receive verified emails, you know you can trust that counterparty, and vice-versa.
  • Resilient and Compliant: No raw emails are ever stored or transmitted to our servers.
  • Easy and Free for Early Partners: Deploys in minutes via Chrome—no MX changes or training. And it's free for early adopters.
figure 9
Verify complements  your existing email defenses, detecting impersonations and increasing trust

Join the Verified Network Today – Before the Next Attack

Phishing and account takeovers aren't slowing down- they are evolving faster with AI. Don't wait for the next breach.

Outtake Verify solves this: building identity  into every email, deterministically.


Join leading cyber-conscious enterprises in securing emails. Request access to our closed beta to learn more today.

figure 10
A sent email being successfully verified with Passkey.