.id

The Protocol

Identity Anchor

A cryptographic root binding your on-chain identity to a verifiable Layer-2 attestation, immutable once committed.

Authentication

Zero-knowledge proof of identity without revealing underlying data. Prove who you are while protecting what you are.

Attestation

Third-party verification stamps, recorded on-chain as signed assertions about identity attributes and credentials.

Network Layer

Operating above the base chain, Layer-2 protocols provide the throughput needed for identity verification at scale.

Consensus

Distributed agreement on identity state across the network, ensuring no single point of failure or authority.

Interoperability

Cross-chain identity resolution, enabling a single verifiable identity to operate across multiple Layer-2 networks.

Liveness

Continuous proof-of-existence signals, verifying that an identity is active and has not been revoked or abandoned.

Key Rotation

Seamless cryptographic key replacement without identity disruption, ensuring long-term security as algorithms evolve.

Data Sovereignty

Full ownership of personal identity data, stored encrypted with user-controlled access permissions at every layer.

Identity Stack

Authentication Layer

At the foundation of every Layer-2 identity system lies authentication -- the mechanism by which a user proves they are who they claim to be. Unlike traditional authentication models that rely on centralized credential stores, blockchain-native authentication leverages the mathematical certainty of public-key cryptography. Your identity is not a username in someone else's database; it is a cryptographic keypair that you alone control.

The elegance of this approach lies in its elimination of trust dependencies. When you authenticate against a Layer-2 identity protocol, you are not asking a server to confirm your password. You are producing a digital signature that is mathematically verifiable by anyone with access to your public key. The protocol does not need to trust you, and you do not need to trust the protocol. Verification is deterministic.

Identity is not granted by authority. It is proven by mathematics.

This paradigm shift has profound implications for identity sovereignty. In a system where authentication is cryptographic rather than credential-based, identity theft requires not the theft of information, but the theft of private keys -- a fundamentally different threat model that can be addressed through hardware security modules and multi-signature schemes.

Authorization Layer

Once identity is established, authorization determines what that identity may do. Layer-2 authorization models move beyond simple role-based access control toward attribute-based and capability-based systems. An identity does not merely have permissions; it holds capabilities -- cryptographic tokens that grant specific, bounded access to specific resources for specific durations.

The capability model aligns naturally with blockchain's composability. An authorization token issued by one protocol can be verified by another, creating a web of interoperable permissions that respects the boundaries of each participating system. Cross-chain identity authorization becomes not an integration challenge, but a natural consequence of shared cryptographic standards.

Authorization in Layer-2 is not about gates and walls. It is about capabilities and proofs.

This composable authorization architecture enables identity systems that evolve without central coordination. New capabilities can be defined by any participant, and their validity is established through the same consensus mechanisms that secure the underlying blockchain. The authorization layer is, in this sense, as decentralized as the network itself.

Attestation Layer

The attestation layer transforms identity from self-assertion into verified claim. While authentication proves you control a key and authorization defines what that key can do, attestation provides the social and institutional layer -- other entities vouching for specific attributes of your identity. These are not mere references; they are cryptographically signed assertions, timestamped and recorded on-chain.

Attestation on Layer-2 follows a verifiable credential model. An issuer produces a signed statement about a subject, which can be presented to any verifier who trusts that issuer. The critical innovation is selective disclosure: the subject can reveal specific attestation attributes without exposing the entire credential. You can prove you are over 18 without revealing your birth date. You can prove institutional affiliation without revealing your role.

Attestation is the bridge between cryptographic identity and human trust.

The permanence of on-chain attestation creates an accumulating identity record that grows richer and more trustworthy over time. Each new attestation strengthens the web of verification around an identity, making it progressively harder to forge and easier to trust. This is identity as reputation -- earned, recorded, and immutable.