Frequently Asked Questions

Identity.com is a decentralized, open-source identity verification platform committed to providing users with secure, private, and user-friendly tools to verify and manage their identities online.

To bring trust, privacy, and simplicity to digital identity.

When the internet first began, there was no reliable way to verify who or what you were connecting with—much like meeting a stranger without any context.

Today, with billions of devices and people online, verifying identities has become essential for many activities. The lack of trusted identity verification is now a major source of cybercrime and online challenges. Identity.com tackles these issues by offering a secure and convenient way to verify identities online, reducing friction and enhancing trust.

The core technologies behind Identity.com and self-sovereign identity include:

  • Decentralized Identifiers (DIDs): DIDs are unique identifiers that are globally resolvable and independent of any central authority. They are used to identify individuals and organizations in a decentralized network.
  • Verifiable Credentials: Verifiable credentials are a type of digital credential that can be issued and verified by different entities in a decentralized network. These credentials can be used to prove a person’s identity, qualifications, or other attributes, and can be selectively disclosed to third parties without revealing any unnecessary information.
  • Blockchain: Blockchain is a decentralized ledger technology that securely records transactions across multiple computers, ensuring transparency and immutability. It guarantees that once identity claims are issued and verified by trusted parties, they cannot be altered. This creates a tamper-proof and transparent system for managing digital identities.
  • Identity wallets: Identity wallets are software applications that store an individual’s verifiable credentials and DIDs. These wallets allow individuals to manage their digital identity, selectively disclose their credentials, and control the sharing of their personal data.

Decentralized identity allows you to control who has access to your personal data and how it is used. You can choose which verifiable credentials to share with others and can revoke access at any time if you no longer want to share your data. Having your data stored on a decentralized network makes it harder for hackers to access it without your permission.

Identity.com’s developer tools are open-source resources designed to empower developers in creating decentralized identity and verification solutions:


Gateway Protocol:
Provides permissionless validation of digital credentials on-chain. V1 is on Solana, while V2 for EVM chains is nearing mainnet readiness.


Decentralized Identifier Methods:
Universal identifiers for on and off-chain use, including did:sol and did:bnb.

Cryptid: A wallet abstraction layer linking off-chain DIDs with on-chain identities. Access it here.

Learn more about our tools here.

The Identity.com app is a mobile application that allows users to create, manage, and share their digital identities securely. It uses verifiable credentials to ensure privacy and security, giving individuals control over which personal data they share with different services. By storing credentials locally on their devices, users can easily verify their identity without relying on centralized databases, making the app secure, user-friendly, and fully privacy-focused.

Download now: App Store | Google Play

With Identity.com’s technology, identity verification is secure, private, easy to use, and interoperable. Its decentralized nature provides flexible solutions for various applications, whether for individuals via the Identity.com App or developers using open-source toolkits.

 

We believe it’s important for everyone to have tools that enable them to manage their personal data securely. Our platform provides:

 

User Control: Allows users to maintain control over their own personal data and choose which aspects of their identity they wish to share with different parties. This empowers users to protect their privacy and control their digital identities.

 

Decentralization: Identity.com is a decentralized platform, meaning that there is no single point of failure or control. This makes it more resilient to attacks and ensures that the platform is available to all users at all times.

 

Compliance: Identity.com is designed to comply with a wide range of regulatory frameworks, including GDPRAML, and KYC. This makes it a trusted and compliant platform for identity verification that can be used by a wide range of industries and applications.

As a non-profit organization, Identity.com’s primary goal is not profit but to provide a safe and secure digital identity for everyone. We charge a small fee to the issuers of Verifiable Credentials and also earn revenue through gatekeeper fees. These income sources support our mission to maintain and enhance our open-source tools, ensuring the continued improvement of digital identity security

If you need support with implementing Identity.com’s technologies in your project, you can reach out via Discord or directly at contact@identity.com.

 

For more personalized inquiries, feel free to schedule a 1:1 meeting here.

Follow our social accounts: TwitterLinkedinDiscord.

Keep up with our blog to learn about digital identity, regulations, and the future of identity.

Join the Identity Community

Download our App