Technology

The Technology Behind Verified Transactions

How prepaid cards, webhooks, and video gating create an unbreakable accountability chain.

10 min read
The Technology Behind Verified Transactions
TL;DR

VideoBackedMoney uses prepaid cards with webhook-triggered locks that require video verification after each transaction. This creates an unbreakable chain of accountability from donor to recipient that cannot be circumvented.

The Technical Failure of Traditional Charity Platforms

Most charity platforms are built on honor systems. A recipient receives funds, promises to use them responsibly, and maybe submits a monthly report. Maybe. The technology exists to verify every transaction in real time—but traditional charities do not use it.

This is not because the technology is prohibitively expensive. Prepaid card APIs, webhook systems, and mobile video upload pipelines are mature, cost-effective infrastructure. The real reason is simpler: most organizations do not believe accountability should be structural. They believe it should be optional.

VideoBackedMoney takes the opposite approach. We built our entire platform around the thesis that accountability must be automatic, mandatory, and impossible to bypass.

The Programmable Card Infrastructure

At the foundation of our system are programmable prepaid debit cards issued through authorized issuing partners. These are not ordinary prepaid cards—they are API-controllable financial instruments. We can lock and unlock spending privileges in real time through authenticated API calls.

When a recipient is onboarded, they receive either a virtual card (immediately) or a physical card (mailed within 5-7 days). Both cards share the same programmable backend. Both can be locked, unlocked, or have their spending limits adjusted instantly.

1
Card Issuance
Recipient completes KYC verification and receives a virtual card instantly, with physical card mailed
2
Initial Balance
First donor subscription funds arrive and card is enabled for spending
3
Transaction Webhook
When recipient spends, our system receives real-time notification within 500ms
4
Automatic Lock
Card is immediately locked via API call—no manual intervention required
5
Video Gate
Recipient app displays prominent prompt to record 10-30 second verification video
6
Upload and Verify
Video is processed, passes safety checks, and card unlocks for next spend
Key Point

The entire lock-to-unlock cycle completes in under a minute when recipients have connectivity. Even offline, videos queue locally and sync when signal returns.

Real-Time Transaction Webhooks

Every transaction triggers a webhook—a real-time HTTP notification from our card issuing partner to our servers. When we receive this webhook, our system executes a precise sequence of operations within milliseconds:

  • -Parse and validate the webhook payload for authenticity
  • -Log transaction details: amount, merchant category code, timestamp, card ID
  • -Execute API call to lock the card immediately
  • -Push notification to recipient mobile app
  • -Update donor dashboard with pending video indicator
  • -Queue notification email/SMS to donor if preferences allow

This webhook-driven architecture means there is zero delay between a transaction occurring and the card being locked. Recipients cannot make a second purchase before uploading video for the first. The system enforces one-to-one correspondence: one spend, one video.

The Video Processing Pipeline

When a recipient uploads their verification video, it passes through a sophisticated processing pipeline designed for mobile-first delivery and safety:

  • -Initial upload to secure temporary storage with signed URL
  • -Content moderation: automated safety filters for prohibited content
  • -Video compression optimized for mobile playback (typically 480p)
  • -Thumbnail generation for donor feed previews
  • -Secure permanent storage with encrypted-at-rest policy
  • -Signed URL generation for time-limited donor access
  • -Card unlock API call execution
  • -Push notification to donor(s) with video link

The entire pipeline from upload to donor notification typically completes in under 30 seconds. Recipients see their card unlock within moments of successful upload.

Security Architecture

Security is non-negotiable when handling financial transactions and personal videos. Our architecture implements multiple layers of protection:

Data in Transit: All API communications use TLS 1.3 encryption. Webhook payloads are signed with HMAC-SHA256 to prevent forgery. Video uploads use signed URLs that expire within 15 minutes.

Data at Rest: Transaction logs and video files are encrypted using AES-256. We never store full card numbers in our database—only tokenized references provided by our issuing partner.

Access Control: Donor access to videos is authenticated and audited. Recipients cannot access other recipients data. Administrative access requires multi-factor authentication and generates permanent audit logs.

Key Insight

We designed our security architecture assuming breach scenarios. Even if our database were compromised, attackers would obtain only encrypted blobs and tokenized references—not usable financial credentials.

Why This Architecture Matters

Most charity platforms rely on voluntary reporting. Monthly updates submitted when convenient. Annual reports compiled from self-reported data. Outcomes estimated from surveys. The entire accountability model depends on organizational good faith—which history shows is unreliable.

VideoBackedMoney makes reporting mandatory and automatic. The system itself enforces accountability. Humans do not have to remember, choose, or prioritize transparency—it is built into the transaction flow.

This architectural choice has profound implications. Recipients cannot accumulate funds without generating proof of use. Donors cannot be shown aggregated statistics instead of specific impacts. Organizations cannot hide inefficiency behind glossy annual reports.

FeatureTraditional CharityVideoBackedMoney
Reporting ModelVoluntary, delayedMandatory, real-time
Verification MethodSelf-reported surveysVideo proof per transaction
Card ControlNo transaction-level locksWebhook-triggered lock/unlock
Processing SpeedDays to weeksUnder 200ms lock operations
Fraud DetectionAnnual auditsPer-transaction verification

We built architecture that makes transparency automatic—not something organizations choose to do.

VideoBackedMoney EngineeringSystem Design Principles

Scaling Without Compromising Integrity

Our architecture scales horizontally. The webhook ingestion layer handles thousands of concurrent transactions. Video processing uses distributed workers that auto-scale based on queue depth. Card lock/unlock operations complete in under 200ms regardless of system load.

Critically, we designed for failure tolerance. If a video upload fails, the card remains locked until successful retry. If our systems are temporarily unavailable, the card remains locked by default. The system fails closed, never open.

This fail-closed approach means accountability cannot be accidentally compromised by technical issues. The integrity of the verification loop is maintained under all conditions.

VideoBackedMoney

About This Content

This content was collaboratively created by the VideoBackedMoney Team and AI-powered tools to ensure accuracy, comprehensiveness, and alignment with current best practices in transparent philanthropy, fintech, and direct giving.

Team Contribution

Reviewed and validated by VideoBackedMoney's founding team to ensure accuracy and alignment with our mission.

AI Enhancement

Enhanced with AI-powered research and writing tools to provide comprehensive, up-to-date information.

Last Updated:2026-02-01

This collaborative approach ensures our content is both authoritative and accessible, combining human expertise with AI efficiency.

Ready to Make a Direct Impact?

Join VideoBackedMoney and see exactly where your donations go.

Start Giving Today