The conversation of protecting one’s digital identity has been ongoing for years, with users raising concerns over privacy and data exploitation by centralized internet giants like Meta and Google.
Such concerns have led blockchain experts to attempt new solutions that aim to decentralize identity verification while safeguarding personal information.
The key is to confirm you are who you say you are without having to reveal personal information along the way.
Humanity Protocol (HP) is one such project attempting to bridge the gap between our physical and digital identities through its ‘Proof of Humanity’ (PoH) mechanism. We speak to CEO Terence Kwok on how HP aims to create a Sybil-resistant network of blockchains, ensuring users have complete control over their data and identity.
- Show Full Guide
About Terence Kwok
Terence Kwok is the Founder and CEO of Humanity Protocol, a leading organization dedicated to amplifying human potential in a world of artificial intelligence. He is a technology entrepreneur from Hong Kong.
With expertise in blockchain, Web3, and technology integration, Kwok’s mission is to use technology to bring people together, ensuring its benefits are widely accessible and impactful.
The Decentralization of Identity Verification & Protecting Who We Are
Q: Can you briefly tell me about Humanity Protocol?
A: Humanity Protocol (HP) is a project dedicated to bridging the gap between our physical and digital identities, in order to create a Sybil-resistant network of blockchains and protect our digital identities.
Central to HP is the Proof of Humanity mechanism, which provides unique human authentication, allowing users complete control over their data and identity.
The project was inspired by the current issues of privacy and data exploitation in the centralized internet, where dominant platforms like Facebook and Google control vast amounts of personal information. This centralization poses significant risks to privacy and autonomy, as these platforms can misuse or monetize personal data.
We address the ‘unique-human’ problem, preventing the creation of fake identities that can manipulate digital systems. By decentralizing identity verification and fostering trust in digital interactions, HP aims to create a more secure and equitable digital ecosystem, ensuring fair participation and protecting users’ privacy.
Protecting Who We Are: Inside the PoH Mechanism
Q: How does your PoH mechanism work in layman’s terms?
A: The process begins with users submitting a unique identity claim, which may include biometric data in the form of a palm scan. To maintain privacy, this data is hashed, encrypted and decentralized, ensuring that sensitive details are not exposed during verification.
Next, our network of distributed zkProofers generates a zero-knowledge proof [ZKP] based on the submitted identity claim. This proof validates the authenticity of the claim without revealing the actual data.
The generated proof is then broadcast to the network, where other zkProofers undertake the verification process and perform complex mathematical checks to ensure the proof accurately reflects a true human identity.
Upon successful verification, the user is granted Proof of Humanity status. This status enables the user to interact with Web3 applications and services, confident that they are recognized as a genuine human.
Q: I heard of other similar Decentralized Finance (DeFi) projects that scan a user’s iris instead. Why did you decide to focus on the pam?
A: A major reason why we picked palm scanning as the preferred biometric method was to ensure we made the onboarding process as convenient as possible. Our competitors may prefer methods such as iris scans, but palm scans give users a far more comfortable experience with using PoH systems, which will play a significant role in driving adoption.
Q: And in that case, how does the authorization process work? For example, how do I, as Iliana, prove I am indeed who I say I am?
A: In phase one of our rollout, you’ll only be able to prove that you’re human. This is done by scanning your palm via your mobile device. This data isn’t stored by us, but by our network of zkProofers, which act as distributed nodes across the world.
Moving on to phase two, your biometric information can be tied to personally identifiable data, such as your name, location, date of birth, and more.
For instance, this phase will allow users to prove that you’re Iliana, an individual who is above 21, to access age-restricted information by scanning your palm with your mobile device at the point of entry without having to disclose who you are and your date of birth to this third-party application.
All of this information is also stored across multiple nodes on our network so your privacy isn’t compromised in the process.
Hashing, Encryption and ZKPs Under One Roof to Ensure Privacy
Q: How does Humanity Protocol ensure the privacy and security of users’ identities?
A: This is done through a combination of advanced cryptographic techniques and decentralized verification. First, users’ identity data is hashed and encrypted, transforming the data into a secure, non-reversible format that protects against exposure. This encrypted data is then used to generate ZKPs, which allow the validation of identity claims without revealing any actual personal information.
These ZKPs are verified by multiple zkProofer nodes in a decentralized network, ensuring that no single point of failure exists, and that the decentralized nature of the verification process prevents any central authority from accessing or misusing users’ data.
A Jump into the Future: Humanity Protocol and RWA Tokenization
Q: One of the use cases for PoH is Real World Asset (RWA) tokenization, can you explain how PoH enables on-chain verification of physical asset ownership and how could this change the future of crypto?
A: PoH ensures that the individual claiming ownership of a physical asset is verified and linked to a unique, human identity on the blockchain, reducing fraud and increasing trust in transactions involving RWAs.
Once an individual is onboarded onto PoH, they can choose to use it to store personal information, including certificates and deeds of ownership for their RWAs.
As with the individual’s other private information, PoH allows them to prove that they own an asset without disclosing any other information that is tied to the asset — like proving they own a painting without disclosing where it is stored.
By integrating PoH, the process of tokenizing RWAs, such as real estate or precious metals, becomes more secure and transparent. Each tokenized asset can be traced back to a verified human owner, ensuring authenticity and legal compliance.
This capability enables secure, trustless transactions and increases the adoption of blockchain technology in traditional asset markets.
Tokenized RWAs have the potential to enhance liquidity, lower transaction costs, and democratize access to investment opportunities, fundamentally transforming how we interact with and trade physical assets on a global scale.
Q: Moving beyond RWAs, could a solution like this expand its use cases into the real world? For example, could it be used during elections or by governments to authorize services without people being too aware that it is a blockchain solution?
A: These are certainly possible with a Proof of Humanity solution, but won’t be our focus as we gear up to launch. Other real-world use cases include access to buildings and services without being too aware that this is all powered by a blockchain.
What is Humanity Doing Differently?
Q: It seems like one of Humanity Protocol’s biggest competitors is Worldcoin. Could you dive into how Humanity is different from Worldcoin?
A: Worldcoin’s onboarding requires users to make their way to specific locations to get their iris scanned on specialized hardware. Not only is this dystopian, but it has also raised concerns about privacy in various jurisdictions.
Humanity Protocol, on the other hand, can onboard users from anywhere in the world by scanning their palms using their mobile devices. This is a far more familiar method of biometric authentication and still achieves the desired level of accuracy. It is also more convenient and straightforward.
Q: And finally, what are the next steps for Humanity Protocol in terms of development and expansion?
A: We are rolling out our testnet in the coming weeks and that will include information for developers on how they can begin incorporating PoH into their projects. We are also working on a range of partnerships with established Web3 projects to begin rolling out PoH on their chains.
We are excited about the shift in power Humanity will bring from the hands of large tech organizations to the people.
At the moment, our personal data is owned and monetized by corporations that have unfettered access to it, including our location, preferences, and information about our social circles.
With PoH, users’ data is encrypted and stored securely across a distributed network. This means no one else can access your information and your data is owned solely by you.
The Bottom Line
A social media application recently asked me for “proof of identity”, as they became suspicious I was not a “real person”.
Faced with the decision of whether I wanted to send a stranger my passport details or not, I realized that a PoH solution would have made the situation easier.
As the world becomes a little more tech-dependant every day, it seems like hiding our real identities behind a screen might only get harder — could HP be the solution?