Frequently Asked Questions

 

What is Identity.com?

Identity.com is a decentralized, open-source identity verification platform that aims to provide users with a private, easy-to-use, and secure way to verify and manage their identities online.

 

What is our Mission?

To put the power of self-sovereign identity (SSI) into every software developer’s hands.

 

How did our Mission evolve?

Back in the day when the Internet was first created, there wasn’t any way to know who or what you were connecting to. It’s like meeting a stranger without knowing anything about them, except it’s with machines. Nowadays, we’ve got billions of devices and people all online, and we need to know who’s who for a lot of things we do. Consequently, identity (or the lack of it) is a major source of cybercrime and friction online.

 

What are the technologies behind Identity.com and SSI?

The core technologies behind Identity.com and self-sovereign identity include:

Decentralized Identifiers (DIDs): DIDs are unique identifiers that are globally resolvable and independent of any central authority. They are used to identify individuals and organizations in a decentralized network. Our in-depth explanation of decentralized identifiers can be found here.

Verifiable Credentials: Verifiable credentials are a type of digital credential that can be issued and verified by different entities in a decentralized network. These credentials can be used to prove a person’s identity, qualifications, or other attributes, and can be selectively disclosed to third parties without revealing any unnecessary information.  Read more here about verifiable credentials.

Distributed Ledger Technology (DLT): DLT is a technology that enables the decentralized storage and management of data in a secure and transparent manner. DLT is used to store DIDs and verifiable credentials in a decentralized network, providing a tamper-proof and auditable record of all identity-related transactions.

Zero-Knowledge Proofs (ZKPs): ZKPs is a type of cryptographic protocol that allow individuals to prove the validity of their identity or attributes without revealing any unnecessary information. ZKPs are used to ensure that verifiable credentials are only shared with authorized parties and that individuals have control over their personal data.

Identity wallets: Identity wallets are software applications that store an individual’s verifiable credentials and DIDs. These wallets allow individuals to manage their digital identity, selectively disclose their credentials, and control the sharing of their personal data.

 

How does self-sovereign identity, also knows as decentralized identity, help protect my privacy?

Decentralized identity allows you to control who has access to your personal data and how it is used. You can choose which verifiable credentials to share with others and can revoke access at any time if you no longer want to share your data. Having your data stored on a decentralized network makes it harder for hackers to access it without your permission.

 

Why use our technology?

With Identity.com’s technology, identity verification can be performed in a secure, private, easy-to-use, and interoperable manner. As a result of its decentralized and customizable nature, it is a versatile solution for a wide range of applications.

We believe that it is important for developers to have access to toolkits that offer their users a convenient and secure way to manage their personal data and digital identities, including:

User Control: Allows users to maintain control over their own personal data and choose which aspects of their identity they wish to share with different parties. This empowers users to protect their privacy and control their digital identities.

Decentralization: Identity.com is a decentralized platform, meaning that there is no single point of failure or control. This makes it more resilient to attacks and ensures that the platform is available to all users at all times.

Compliance: Identity.com is designed to comply with a wide range of regulatory frameworks, including GDPR, AML, and KYC. This makes it a trusted and compliant platform for identity verification that can be used by a wide range of industries and applications.

 

How would you describe Gateway Protocol in one line?

Permissionless validation of digital credentials on-chain. Learn more here.

 

How would you describe Cryptid in one line?

Gives web3 users a wallet abstraction layer that anchors and links a standardized off-chain identity (DIDs) with an on-chain identity. Learn more here.

 

How would you describe did:sol in one line?

One identifier for all on and off-chain needs. Learn more here.

 

Where can I ask questions about the implementation of technology for a project I’m building?

For information about our technology and any questions you may have for our team, please visit the dev section of our Discord.

For more personal questions, please feel free to contact us at contact@identity.com or schedule a 1:1 session here.

 

How can I follow updates?

Follow our social accounts: Twitter, Linkedin, Discord.

Keep up with our blog to learn about digital identity, regulations, and the future of identity.