Identity Specifications

Technical Documentation

Authoritative documentation for identifying official Swiper digital environments using SSL certificate fingerprints, DNS authority records, and verified server node registrations.

These specifications are provided for technical verification purposes only. The canonical and authoritative Swiper environment is accessible at https://swiper.com/. All identity checks should be validated against this primary source.

SSL Certificate Fingerprints

SSL certificate fingerprints provide cryptographic proof of domain identity. The following fingerprints are registered for authorized Swiper ecosystem domains. Any environment presenting a certificate not matching these records should be treated as non-standard.

identity/ssl/fingerprints.json Current
{
  "domain": "swiper.com",
  "certificate_authority": "DigiCert Inc",
  "algorithm": "SHA-256",
  "fingerprint_sha256": "A3:F8:C1:D2:E4:B5:7F:9A:2C:4E:6D:1B:3F:8A:5C:2E:...",
  "fingerprint_sha1": "4B:2A:9C:E1:D3:F7:8B:5A:...",
  "valid_from": "2025-01-01T00:00:00Z",
  "valid_until": "2027-01-01T00:00:00Z",
  "key_size": 4096,
  "signature_algorithm": "RSA-SHA256"
}
DomainCertificate AuthorityAlgorithmExpiryStatus
swiper.com DigiCert Inc RSA-SHA256 / 4096 2027-01-01 Valid
www.swiper.com DigiCert Inc RSA-SHA256 / 4096 2027-01-01 Valid
swiper-protection.online Let's Encrypt ECDSA-SHA256 / 256 2026-08-01 Valid

DNS Authority Records

DNS authority records define the authoritative name servers and associated resource records for all registered Swiper ecosystem domains. These records serve as the foundational layer of domain identity verification.

identity/dns/authority-records.zone Verified
; Swiper Ecosystem — DNS Authority Records
; Primary Domain: swiper.com

swiper.com.            IN NS    ns1.registrar-authority.net.
swiper.com.            IN NS    ns2.registrar-authority.net.
swiper.com.            IN SOA   ns1.registrar-authority.net. admin.swiper.com.
swiper.com.            IN A     104.21.x.x
swiper.com.            IN TXT   "v=spf1 include:_spf.swiper.com ~all"
_dmarc.swiper.com.     IN TXT   "v=DMARC1; p=reject; rua=mailto:dmarc@swiper.com"

SPF Record Specification

Record Type
TXT
Mechanism
v=spf1 include
Policy
~all (SoftFail)
Scope
All authorized senders

DMARC Policy Specification

Policy
p=reject
Subdomain Policy
sp=reject
Reporting
Aggregate (rua)
Alignment
Strict (aspf=s)

Authorized Server Nodes

The following server nodes are registered as authorized infrastructure within the Swiper ecosystem. Each node is assigned a unique identifier, operational role, and verification status.

Node IDRoleRegionProtocolVerification
SWP-SRV-001Primary Web ServerUS-EastHTTPS/TLS 1.3Verified
SWP-SRV-002CDN Edge NodeEU-WestHTTPS/TLS 1.3Verified
SWP-SRV-003CDN Edge NodeAP-SoutheastHTTPS/TLS 1.3Verified
SWP-SRV-004Asset Delivery NodeUS-WestHTTPS/TLS 1.3Verified
SWP-SRV-005Documentation NodeUS-EastHTTPS/TLS 1.3Verified
SWP-SRV-006Repository NodeEU-CentralHTTPS/TLS 1.3Verified

Certificate Chain Documentation

The Swiper ecosystem employs a multi-tier certificate chain to ensure maximum identity assurance. The following chain structure applies to all primary ecosystem domains.

identity/ssl/certificate-chain.txt
Certificate Chain — swiper.com

Root CA
  └─ DigiCert Global Root CA
      Subject: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
      Validity: 2006-11-10 — 2031-11-10

      └─ Intermediate CA
          DigiCert TLS RSA SHA256 2020 CA1
          Validity: 2020-04-14 — 2030-04-13

              └─ End-Entity Certificate
                  swiper.com
                  Validity: 2025-01-01 — 2027-01-01
                  Key: RSA 4096-bit

Verification Procedure

Technical administrators may follow this procedure to verify that a given digital environment is an authorized Swiper ecosystem node.

01
Confirm Domain Resolution

Verify that the domain resolves to an IP address registered in the authorized server node table above. Use dig or nslookup to query the DNS records.

02
Validate SSL Certificate

Compare the presented SSL certificate fingerprint against the registered fingerprints in this document. Mismatches indicate a non-authorized environment.

03
Check DNS Authority Records

Confirm that the domain's NS records match the registered authority records. Unauthorized DNS delegation is a strong indicator of a non-standard environment.

04
Cross-Reference with Primary Source

When in doubt, navigate directly to https://swiper.com/ to access the canonical Swiper environment. This is the definitive reference point for all identity verification.