Authentication Process — Pre-Owned Luxury Bags in Egypt

Authentication Process — Pre-Owned Luxury Bags in Egypt

Quick answer

Every piece at Sold Attire, from vintage outerwear to five-figure handbags, passes a 10-step authentication process combining in-house specialist review and AI image analysis trained on authentic and counterfeit archives. Every bag comes with a lifetime authenticity guarantee: if a piece can be proven inauthentic, we refund in full. No conditions. No debate.

Authenticity

Authentication Process

We do not check pieces. We interrogate them.

At Sold Attire, authenticity is not a promise made in fine print. It is the foundation the entire business is built on. Every piece — whether it is a graphic tee, a rare designer jacket, or a Birkin — is authenticated before it appears anywhere on the site. The process is the same regardless of category or price point. There is no tier below which we get careless.

As featured in Harper's Bazaar Arabia and CairoScene, Sold Attire has built Egypt's most rigorous pre-owned luxury authentication standard. This is what it looks like.


Dual authentication: human expertise and AI precision

Every item passes through two independent layers before clearance.

Human eyes, vintage instincts. Our in-house specialists are trained in the specific authentication markers of luxury and vintage fashion — the details that separate a genuine piece from a convincing copy, and an early production run from a later one. They know what most people miss because they have spent years learning where to look.

AI trained on authenticated archives. Our proprietary analysis tool cross-references each piece against verified authentic and known counterfeit samples — examining leather grain, stitching geometry, logo font consistency, hardware finish, and production-era details at the micro level. The AI does not replace the human eye. It extends it.

If the two layers produce different conclusions, the item does not pass. If there is any residual doubt after both, the item is rejected. We do not list pieces we are not certain about.


The 10-step bag authentication protocol

For luxury bags, we apply the most advanced version of our process — the standard used by serious auction houses and global resellers. Every bag on the site has passed all ten steps.

  1. Material and craftsmanship

    Leather, hardware, lining, and finishing are examined against the original brand specification for the model and production era. Material substitutions are identified at this stage.

  2. Stitching and hardware

    Thread count, stitch symmetry, and every metallic detail — clasp weight, zipper pull, turn-lock action — are checked for era-appropriate accuracy. Counterfeit hardware fails at this step consistently.

  3. Logo and branding accuracy

    AI overlay and side-by-side comparison against authenticated reference samples. Font weight, letter spacing, embossing depth, and alignment are all measured. Logo inconsistency is one of the most common failure points in high-quality fakes.

  4. Serial number verification

    Serial numbers, date codes, and holograms are cross-referenced against global production databases. Format, placement, and font must match the claimed production year and factory.

  5. Date code and model analysis

    Model numbers, season codes, and country-of-origin stamps are verified and cross-checked for internal consistency. A date code that conflicts with known production timelines fails immediately.

  6. Interior markings and linings

    Every internal label, plaque, pocket construction, and lining material is reviewed. Interior finishing on authentic pieces follows specific brand standards that counterfeits rarely replicate correctly at this level of detail.

  7. Label and tag consistency

    Swing tags, dust bags, authenticity cards, and care labels are reviewed for font, format, and era consistency. An original 1990s Chanel should not have a care label printed in 2010 format.

  8. Sourcing and provenance

    Acquisition channel, ownership history, and sourcing origin are verified where possible. Pieces sourced through Star Buyers Global Auction in Japan arrive with the platform's own authentication already applied — and are re-authenticated on arrival regardless.

  9. Comparative AI image analysis

    The piece is run against dozens of verified authentic samples of the same model, era, and colourway using AI image analysis. Micro-level discrepancies in grain pattern, seam geometry, or hardware finish are identified at this stage.

  10. Final multi-expert review

    Clearance requires sign-off after human review, AI analysis, and where applicable, external specialist consultation. No bag is listed on the basis of a single opinion. The standard is unanimous agreement — not a majority.


The lifetime guarantee

Every bag sold at Sold Attire carries a lifetime authenticity guarantee. If you can provide verified proof — from a reputable authentication service — that a piece is not genuine, we refund in full. No time limit. No debate. No fine print that makes the guarantee meaningless in practice.

We can make this offer because we have never had to honour it. That is not luck. It is the process.


Who authenticates

Yahya Karali — founder of Sold Attire, lead authenticator, and the person behind every piece that leaves this operation. Featured in Harper's Bazaar Arabia and named among CairoScene's Egyptians who made waves in 2018. Every authentication carries his name. That accountability is deliberate.


The Sold Attire Standard

  • ✓ Every piece authenticated before listing — no exceptions
  • ✓ 10-step dual process — human specialist and AI analysis
  • ✓ Lifetime authenticity guarantee — refund in full if proven otherwise
  • ✓ Japan-sourced pieces re-authenticated on arrival in Cairo
  • ✓ Zero tolerance — if there is doubt, the item is rejected
  • ✓ Authentication report available on request for any piece

Questions about a specific piece or want a full authentication report? Message us on WhatsApp or email hello@soldattire.com — we share full documentation for every bag on request.

Trust is not a feature. It is the whole point.