Identity
Identity is sacred — and now spoofable. AI makes it trivial to clone a voice, face, or writing style.
Identity, truth, and trust form a single meta-problem: you cannot build consensus if you cannot verify who is in the conversation.
The Bridge
Identity connects the inner game to the outer game. Who you are (character, values, culture) is shaped by community and shapes community in return. Crypto makes this legible — not by replacing identity, but by making it portable, sovereign, and verifiable without surrendering it to a gatekeeper.
| Layer | What it is | Where it lives |
|---|---|---|
| Inner | Character, values, pepeha — who you are before you act | Agency |
| Social | Culture, community, belonging — identity in relation | The Journey |
| Verifiable | DIDs, ZKPs, proof of personhood — identity that travels | This page |
A pepeha declares identity to a room. A DID declares identity to a network. Same function, different scale. The inner identity must be real before the verifiable identity means anything.
The Crisis
Prior exposure to deepfakes does not just make people vulnerable to specific falsehoods — it fosters broad skepticism that anything could be fake. Confidence in all authentic speech collapses.
| What's At Risk | The Threat |
|---|---|
| Personal likeness | Voice, face, writing style cloned without consent |
| Reputation | Synthetic content attributed to real people |
| Authentication | "Seeing is believing" no longer works |
| Public discourse | Cannot verify who is actually speaking |
The greatest challenge: balancing transparency and privacy while pursuing intents and purposes.
Proof of Personhood
Proof of Personhood (PoP) ensures each participant in a decentralized system is a unique human being. Prevents Sybil attacks where an attacker creates multiple fake identities to manipulate the system.
| Property | What It Does |
|---|---|
| Uniqueness | Each participant verified as a unique human |
| Sybil Resistance | Multiple fake identities cannot manipulate the system |
| Equality | Equal voting power and rewards, independent of economic stake |
Methods: Biometric verification (iris scans — WorldCoin), physical verification (pseudonym parties), time-locked wallets, zero-knowledge proofs.
Self-Sovereign Identity
Individuals control their own digital identities without relying on a central authority. Blockchain creates a secure, private way to manage and verify identities.
| Property | What It Does |
|---|---|
| Self-sovereignty | Full control over your digital identity |
| Privacy | Minimum personal information shared |
| Interoperability | Works across platforms and applications |
Methods: Decentralized Identifiers (DIDs) on-chain, Verifiable Credentials without exposing sensitive data, ZKPs for attribute proof without disclosure.
Zero-Knowledge Proofs
ZKPs prove a statement is true without revealing additional information. The enabling primitive for both PoP and DID.
| Application | What ZKPs Enable |
|---|---|
| Attribute verification | Prove age or nationality without revealing the data |
| Identity verification | Prove credentials without exposing sensitive information |
| Transaction privacy | Validate transactions without revealing details |
| Access control | Prove permissions without disclosing identity |
| Compliance | Meet regulatory requirements without compromising privacy |
Data Sovereignty
Context
- Agency — Identity in motion — character plus capability
- The Journey — Identity is the root of the Theory of Knowledge
- Culture — Identity is shaped by and shapes culture
- Pepeha — The deepest prompt: declaring what grounds you
- The Mycelium — Truth, trust, identity as agent commerce infrastructure
- Web3 Identity Tech — Implementation stack
- Zero Knowledge Proofs — The enabling primitive
- Verifiable Truth — What identity is built on
- Identity — The human anchor — who you are before you prove it
- Truth Recognition — The capability loop that identity anchors
- Trust — What identity enables
- Smart Contracts — Deterministic execution layer
Links
- Why Identity Matters
- Decentralized Identity Foundation
- Ethereum Decentralized Identity
- Biometric Update
Questions
When AI can clone any voice, face, or writing style, what does "proving you are you" actually mean?
- If biometric verification (iris scans) solves Sybil resistance but creates a biometric database, has identity become more secure or more fragile?
- At what point does privacy-preserving identity (ZKPs, selective disclosure) become so frictionless that people stop understanding what they are proving?
- If decentralized identity works across platforms, who maintains the revocation list — and what happens when they disagree?