Worldcoin Rival Humanity Protocol made its debut at $ 1.1 million for confidentiality first web2 with web3 identity

Humanity Protocol, an identity network of confidentiality blockchain and a high -level rival in Worldcoin by Sam Altman, triggered its main network, making the start of a system that connects web identification information familiar to decentralized web3 services using the safety of the zero transport layer (ZKTLS).

The introduction comes only a few months after the startup based in Hong Kong raised $ 20 million in a round of financing co-directed by Jump Crypto and Pantera Capital, bringing its valuation to $ 1.1 billion.

The ZKTLS technology of humanity protocol allows users to prove that they have consulted verifiable information, such as the job lists or the loyalty status of the airlines, without revealing the document or the underlying page.

Sensitive data never leave the user’s browser, avoiding confidentiality concerns that have criticized biometric approaches, including the Worldcoin Iris sweeping model.

Initially, travelers are able to directly link loyalty and loyalty accounts directly to their “human ID”, creating a portable reputation layer usable on web2 and web3 applications.

The network also supports financial, educational and professional references. In the future, it plans to deploy node infrastructure in new regions as well as venture into chain ticketing and decentralized governance.

“Our main version transforms decentralized identity into practical infrastructure,” said founder and CEO Terence Kwok. “With ZKTLS live, anyone can confirm who they are and what they have achieved on several platforms, but no central party sees their personal information.”

By relying on cryptographic evidence rather than on physical biometrics, the protocol of humanity is positioned as a more concerned alternative of confidentiality in Worldcoin and other “proof of humans” projects.

The architecture of the network allows developers to create Sybil resistant social platforms, reputation -based markets and “humanity checks” without collecting or storing sensitive user data. An attack by Sybil occurs when a person or an entity creates several false identities within a network, often to obtain a reward such as an airline or disproportionate control of the operations of a network.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top