🎉 Excited to announce that V2 of the Identity Gateway Protocol is getting close to being mainnet-ready! After receiving the FYEO audit report, we're implementing the final tweaks to ensure a secure and robust launch. Stay tuned for the full release soon! FYEO audit report: https://lnkd.in/gs7SESSr Gateway Protocol V2: https://lnkd.in/g-kcQJgW #blockchain #decentralizedidentity #identityverification
Identity.com
IT Services and IT Consulting
San Francisco, California 812 followers
Open source ecosystem providing access to on-demand, secure identity verification
About us
Identity.com is a non-profit organization dedicated to putting digital identity in your control. As proud members of the W3C, we strive to shape a digital landscape that prioritizes security, privacy, and user control. We're building an open-source ecosystem for user-centric digital identity, equipping developers and end-users with the tools they need to manage their identities easily and securely.
- Website
-
https://identity.com
External link for Identity.com
- Industry
- IT Services and IT Consulting
- Company size
- 11-50 employees
- Headquarters
- San Francisco, California
- Type
- Privately Held
- Founded
- 2018
- Specialties
- identity, blockchain, identity verification, decentralized, security, and digital identity
Locations
-
Primary
703 Market St
San Francisco, California, US
Employees at Identity.com
-
Phillip Shoemaker
CEO/Executive Director of Identity.com, focusing on Decentralized Identities for the world.
-
Daniel Kelleher
Web3 and Regenerative Finance Tech Lead, Engineer and Advocate.
-
David de Bruyn
Software Engineer at Identity.com
-
Tighe Barris
Senior Software Development Engineer at Identity.com
Updates
-
Trust in biometric technology is decreasing, with only 5% of consumers saying they highly trust how it is handled. Verifiable credential technology offers a solution: 1️⃣ Capture biometric data (e.g., face) by a trusted authority. 2️⃣ Save it as a Uniqueness VC (verifiable credential) and store it in your digital ID wallet. 3️⃣ Present the credential to validate your unique and genuine presence. No central storage of biometrics required. Secure, private, and user-controlled!
-
Imagine the convenience of not having to manually present your driver's license and go through the verification process repeatedly. With decentralized, reusable IDs, you can upload your ID once and use your unique attributes to confirm your identity whenever needed. This saves time for both individuals and businesses by streamlining verification processes and enhancing efficiency. 🔐
-
At Identity.com, we’re committed to ensuring your identity is secure. We advocate and develop digital identity tools that are secure, private, and user-friendly.🤝
-
-
When signing up for some services, you often have to undergo KYC processes to confirm your identity. However, sometimes completing KYC is not enough to keep fraud from happening. By exploiting loopholes in identity verification processes, fraudsters use fake IDs, stolen info, and synthetic identities to bypass checks. Our latest blog post below dives into KYC fraud and key strategies to help prevent it, including decentralized reusable IDs that enhance security by eliminating central data storage vulnerabilities and giving users control over their personal data. 🔒🏦
What Is KYC Fraud?
https://www.identity.com
-
Verifiable Credentials are secure digital records that prove specific attributes about an individual. They function like digital IDs but with enhanced security and privacy. Here's how they work: 1️⃣ Issuer: A trusted organization (like a university or government agency) creates and issues the credential. 2️⃣ Holder: The individual owns and controls the credential, often storing it in a digital ID wallet. 3️⃣ Verifier: An entity (like an employer or service provider) checks the credential's authenticity and validity. This process allows for secure and private identity verification, sharing only specific attributes when necessary. 🔒
-
Ensuring privacy and security in dApps is essential for their widespread adoption and success. With data breaches projected to reach $10.5 trillion by 2025, proactive measures are crucial, especially with how developers handle users' personal information. Dive into our latest blog about securing dApps, covering: 🆔 Decentralized Identity: Empowering users with control over personal data. 🔒 Smart Contract Security: Regular audits and formal verification. 🔑 Data Encryption: Utilizing homomorphic encryption and zero-knowledge proofs. ...and more
How to Ensure Privacy and Security in dApps
https://www.identity.com
-
Building on our previous overview of digital manipulation, this week’s article dives deeper into its growing impact on society. The rise of manipulated content raises significant ethical, social, and legal concerns, making transparency and consent critical for maintaining trust. As distinguishing real from fake becomes harder, creators will start using decentralized technologies like digital signatures and verifiable credentials to authenticate content. Disclosing edits and tracing back to the origin will be crucial in building trust in this space. Read more about its impact and the future of digital manipulation below. 🔐
What Is the Impact of Digital Manipulation?
https://www.identity.com
-
Age verification has been a significant application for identity verification. However, traditional methods often fall short due to privacy concerns. Using decentralized technologies like cryptographic proofs, we can verify age without revealing personal information. This allows individuals to prove they are over a certain age without disclosing their entire identity. Identity.com is developing a platform for organizations to implement these solutions conveniently, ensuring secure and user-controlled identification from one place. 💪
Identity
https://www.identity.com