Anti-impersonation protection program — how it works
This guide covers: anti-impersonation protection program. We focus on quick setup and a clear customer experience.
If you have questions, use the contact form or check the documents.
If you are comparing options (BLIK, terminals), see: QRTransfers vs BLIK — comparison, QRTransfers vs payment terminal, QR payments vs BLIK and QR payments vs payment terminal.
In short
Key points to keep in mind:
- The program is layered: prevention + fast response.
- Stripe Connect verification and service-side checks reduce abuse risk.
- Impersonation reports are triaged with priority.
- Plus plan adds extra trust signals (account logo in QR center).
How to start
The simplest start is to configure the basics and generate your first payment. Then you can expand settings (e.g. scenarios or shortcuts).
- Start with a simple scenario (one amount, one title).
- Check documents.
- If needed, use the contact form.
Program components
The protection program is layered and combines preventive controls with fast operational response.
- Identity/settlement verification through Stripe Connect plus platform-side checks.
- Clear recipient and amount presentation on payment screens.
- Seller-side trust signals (e.g. account logo in QR center in Plus plan).
- Fast abuse-reporting flow and priority triage for impersonation cases.
- Policy enforcement and rapid disablement of accounts violating rules.
Related information
See also: anti-impersonation protection.
Related pages
- QR payments without a terminal
- How QR payments work (step by step)
- QR payment methods: BLIK, Apple Pay, Google Pay (and more)
- QR payment security
FAQ
What is the anti-impersonation protection program?
It is a layered set of controls reducing impersonation risk: verification, clear payee presentation, abuse triage, and fast disablement of violating accounts.
Does the program apply to all accounts?
Yes, core protection is global, while selected extra trust signals (like account logo in QR center) are available in Plus plan.
How fast do you respond to impersonation reports?
Impersonation cases are handled with priority: easy reporting, context review, and rapid restriction of accounts violating rules.