In particular, the method ensures the participant's identity by requiring biometric input unique to the participant, creating a program which converts the biometric information into a unique identifier, for example, and incorporating the unique identifier into content, such as the software, emails, websites, etc. for future reliability.