Skip to main content

Identity

Identity is sacred — and now spoofable. AI makes it trivial to clone a voice, face, or writing style.

Identity, truth, and trust form a single meta-problem: you cannot build consensus if you cannot verify who is in the conversation.

The Crisis

Prior exposure to deepfakes does not just make people vulnerable to specific falsehoods — it fosters broad skepticism that anything could be fake. Confidence in all authentic speech collapses.

What's At RiskThe Threat
Personal likenessVoice, face, writing style cloned without consent
ReputationSynthetic content attributed to real people
Authentication"Seeing is believing" no longer works
Public discourseCannot verify who is actually speaking

The greatest challenge: balancing transparency and privacy while pursuing intents and purposes.

Proof of Personhood

Proof of Personhood (PoP) ensures each participant in a decentralized system is a unique human being. Prevents Sybil attacks where an attacker creates multiple fake identities to manipulate the system.

PropertyWhat It Does
UniquenessEach participant verified as a unique human
Sybil ResistanceMultiple fake identities cannot manipulate the system
EqualityEqual voting power and rewards, independent of economic stake

Methods: Biometric verification (iris scans — WorldCoin), physical verification (pseudonym parties), time-locked wallets, zero-knowledge proofs.

Decentralized Identity

Individuals control their own digital identities without relying on a central authority. Blockchain creates a secure, private way to manage and verify identities.

PropertyWhat It Does
Self-sovereigntyFull control over your digital identity
PrivacyMinimum personal information shared
InteroperabilityWorks across platforms and applications

Methods: Decentralized Identifiers (DIDs) on-chain, Verifiable Credentials without exposing sensitive data, ZKPs for attribute proof without disclosure.

Zero-Knowledge Proofs

ZKPs prove a statement is true without revealing additional information. The enabling primitive for both PoP and DID.

ApplicationWhat ZKPs Enable
Attribute verificationProve age or nationality without revealing the data
Identity verificationProve credentials without exposing sensitive information
Transaction privacyValidate transactions without revealing details
Access controlProve permissions without disclosing identity
ComplianceMeet regulatory requirements without compromising privacy

Data Sovereignty

Context

Questions

When AI can clone any voice, face, or writing style, what does "proving you are you" actually mean?

  • If biometric verification (iris scans) solves Sybil resistance but creates a biometric database, has identity become more secure or more fragile?
  • At what point does privacy-preserving identity (ZKPs, selective disclosure) become so frictionless that people stop understanding what they are proving?
  • If decentralized identity works across platforms, who maintains the revocation list — and what happens when they disagree?