Return to Help Center

How Grivy Ensures Only Real Users Participate

We verify user identity using trusted logins, layered authentication, and built-in fraud prevention from start to finish.

At Grivy, we take verification seriously. To protect the integrity of every activation, we use a combination of trusted logins, verified contact points, and layered authentication steps. This ensures that only real users, not bots or duplicates, can access, engage, and redeem campaign offers.

Here are the key ways we verify users:

1. Authentication via Trusted Channels

Grivy supports login through widely used and secure platforms to make verification simple and reliable. These include:

  • Google and Samsung account login, offering trusted credentials backed by major tech providers
  • Email address validation, with only whitelisted domains such as gmail.com and hotmail.com allowed
  • Phone number verification through SMS or WhatsApp to confirm identity and device ownership
  • WhatsApp-based authentication for an added layer of security, combined with high reach and ease of use
  • Each method is designed to collect authentic, verifiable user information from the start.

2. Multi-Step Authentication for Extra Protection

For campaigns where higher security is needed, Grivy offers multi-step verification that adds additional layers to confirm a user's identity:

  • Verification using something the user has, like a phone number through SMS or WhatsApp
  • Optional biometric verification using something the user is, such as a fingerprint or facial scan
  • Optional support for passkeys, which are tied to the user’s device and offer a secure, password-free login experience

This multi-step process ensures that even if one layer is compromised, unauthorized access is still prevented.

3. Designed for End-to-End Campaign Security

Grivy’s verification process continues throughout the campaign lifecycle. From login to offer redemption, each touchpoint is secured by user-specific limits, device recognition, and fraud detection systems. If unusual activity is detected, the system may trigger extra verification steps or automatically block the action. This makes it extremely difficult for fraudulent users to bypass security or game the system.

Real Users, Real Results

With Grivy, you can be confident that your campaigns reach real consumers. Our verification framework ensures each interaction is secure, validated, and built on trust.