page.title:
The universal digital identity protocol for everyday use cases.
We are a seed stage non-profit working on a decentralized digital identity protocol suitable for growing numbers of real world use cases.
Message us on Twitter

Note: We are a seed stage non-profit organization in the process of nailing down our strategy and roadmap. Your feedback and advice is welcome. Please message us on twitter and connect.

Problem: Digital identity fragmentation

  • πŸ™β€β™€οΈ Broken consumer experiences
    • *️⃣ Managing so many passwords.
    • πŸ¦Έβ€β™€οΈ Privacy issues and personal data management.
    • πŸ€¦β€β™€οΈ Friction and limitations across services, devices, ecosystems and use-cases.
  • βœ… Customer verification challenges - Multi-billion dollar Identity Access Management (IAM) and Identity Verification industries address the need in an inefficient way.
  • πŸ§ͺ Innovation roadblocks - Fragmented identity silos, each controlled by a large player, adds significant friction to adoption of innovative new services.
  • 🏒 Broken business models - Allows certain players to lock consumers and businesses in, such that innovative business models cannot emerge, preventing others from capture any of their own value.

Solution: Universal identity protocol

  • 🀳 Self-sovereign - Controlled by the ID owners.
  • πŸ“œ Standards-based - Based on a ubiquitous common logical structure.
  • πŸ”“ Permissionless - Allows everyone and anyone to innovate on top of it.
  • πŸ”’ Versioned - Supports evolution through time, to cover increasing number of digital identity use cases.
  • πŸ”— Federated - When necessary, supports interoperability between different jurisdictional governance approaches.

Goals

  • πŸ‘₯ Digital identity for the masses - Provide everyday people with a usable (requiring minimal cognitive load) digital self-sovereign identity protocol and third-party identity apps.
  • πŸ”’ Security - Not only should the solution be technically secure against unauthorized exploits, it should also guarantee decentralization and protect against collusion by stakeholders to take advantage of others.
  • πŸ•Έ Decentralization - Preventing of capture and rent-seeking behavior, the same behaviors that have fragmented Web 1.0 and Web 2.0 digital identity.
  • πŸ¦Έβ€β™€οΈ Personal data privacy - Identity owners are in full control of personal data and decide the extent to which it is shared. The choices are enforceable through social and national governance.
  • 🌏 Ubiquitous adoption - An identity protocol cannot be easy-to-use if it is not widely adopted by a network of people and organizations, and it is not widely adopted if doesn’t grow past a tipping point, where mainstream digital ecosystem players are incentivized to support it.
  • 🧠 Intuitiveness - The standard concepts and protocol operation are in harmony with human cognitive models of identity, privacy and security.

Protocol traits

  • ↔️ Interoperable - Entities functioning on the same protocol can interoperate seamlessly.
  • πŸ”— Federatable - New instances of the protocol can be governed separately, while remaining interoperable with other instances, as long as both follow the same standards.
  • ➑️ Transferrable - Owner of a specific identity can easily transfer between different types of service providers.
  • πŸ”“ Censorship resistant by default - The protocols should allow anyone to participate by default.
  • πŸ¦Έβ€β™‚οΈ Privacy-enabled by default - The protocols should allow the use of private (anonymous or pseudonymous) identities by default.