Humanity Protocol: Redefining Digital Identity with Privacy and Decentralization
Introduction
Today, big companies control most digital identities. We need something more secure, private, and decentralized. Current systems rely on government IDs, centralized databases, and invasive biometrics. These approaches put people at risk of data breaches, surveillance, and identity theft. Humanity Protocol is transforming digital identity by utilizing palm scans, zero-knowledge proofs, and self-sovereign identity to create a network that ensures fairness and security in Web3.

What is Humanity Protocol?
Humanity Protocol is a decentralized identity system that verifies real humans while protecting their privacy. Built on Ethereum technology, it uses a Proof-of-Humanity system that prevents fake accounts, bots, and fraud without requiring traditional verification methods. This makes it ideal for governance, Universal Basic Income, decentralized finance, and many other real-world applications.
How It Works
Humanity Protocol uses a step-by-step process to verify you're a real person:
  1. Palm Scanning – You scan your palm with your phone or a special device. This is safer and less intrusive than face or eye scans.
  1. Private Proof System – Your palm data stays private. The system only creates a proof that you're unique without revealing your personal information.
  1. You Control Your Identity – You decide what information to share and with whom. Your identity remains in your hands.
  1. Community Verification – Trusted members with $H tokens help verify real humans. They earn rewards for honest work and contribute to keeping the system reliable.
Why It Matters
1
Privacy Protection
Unlike other ID systems, we don't store your biometric data on a single server. This means your personal information is better protected against hackers.
2
Stopping Fake Accounts
Bots and fake accounts harm online voting and reward systems. Our palm scan ensures each person has only one account, making systems fairer for everyone.
3
Available to Everyone
Many people don't have government ID. Our palm technology gives them a way to prove their identity without requiring official documents.
4
Works Everywhere
You can use your Humanity ID across different blockchains and with real-world services like banking, healthcare, and education.
Humanity Protocol vs Other Identity Solutions
Worldcoin
Relies on iris scanning, raising concerns about biometric data centralization and exclusivity.
Fractal ID
Focuses on identity verification but lacks biometric uniqueness verification.
Humanode
Uses facial recognition but does not incorporate ZKP for privacy protection.
Humanity Protocol sets itself apart by combining biometric palm scanning with cryptographic proofs, ensuring a balance between security, privacy, and usability.
Future Prospect & Use Cases

Cross-Chain Identity
DeFi & Enterprise
Web3 Governance
Universal Basic Income
Humanity Protocol has many exciting prospects. It can be used for DeFi, enterprise, and web3 governance. It may even allow for universal basic income.
Verifiable Credentials
Unique Human User
VC digitally represent an individual user.
Status & Identity
VC contain verified details, such as human or institutional status.
Digital Signatures
VC are cryptographically secured.
Tamper Resistant
Cryptographic proofs ensure validity and prevent tampering.
Why the Project Was Created
Web2 Centralization Risks
Existing digital identity systems store raw biometric data centrally.
This creates risk of hacking and unauthorized access.
Web3 Sybil Attacks
Fake accounts and bots distort online economies and governance.
Proof-of-humanity is needed to ensure fairness.
Biometric Verification
Palm-vein biometrics ensure uniqueness without storing sensitive data.
Web2 Centralization Risks
Vendor Lock-In
Users become dependent on single providers. This risks service discontinuation or arbitrary fee hikes.
Single Points of Failure
Data breaches at centralized custodians expose user information.
Privacy Erosion
Centralized issuers retain visibility into user activity. Mass profiling becomes possible.
Web3 Sybil Attacks
Sybil attacks plague Web3. Fake accounts distort governance and resource allocation. Without identity solutions, these attacks are hard to prevent. The horizontal bar chart shows the breakdown of Sybil attack vectors. Airdrop farming accounts for 45%, governance manipulation 30%, and resource exploitation 25%.
Proof of Humanity
Biometric Enrollment
Users scan their palm veins using accessible hardware. AI ensures accuracy.
Privacy Preservation
Biometric data is encrypted and stored off-chain, preserving user privacy.
Decentralized Verification
Validators verify ZKP, ensuring Sybil resistance with rewards.
The protocol expands into a full SSI ecosystem. It enables verifiable credentials for real-world attributes. Users share credentials selectively using ZKP. The architecture adheres to W3C standards.
Human Recognition Module
Phase 2: RGB Palm Print Capture
Uses smartphone cameras for initial palm print capture. Accessible and convenient for a global user base.
Phase 3: Palm Vein Recognition
Employs low-cost infrared device for enhanced accuracy. Analyzes unique vein patterns for verification.
Privacy-Preserving Data
VC are encrypted using AES-GCM. Decentralized storage solutions enhance security.
Identity Validators
Validators
Validators verify data and issue verifiable credentials. In Phase 1, the core platform is the sole issuer. In Phase 2, accredited validators stake tokens. This aligns incentives with protocol integrity.
zkProofer Nodes
zkProofer Nodes facilitate secure identity verification. They process credentials and zero-knowledge proofs. They verify credentials for third-party dApps. Node operators must obtain a license, showing network integrity.
Node licenses are allocated through a random draw system. This mechanism ensures that all participants have an equal opportunity to acquire nodes of varying tiers, preventing centralization and promoting widespread network participation. The total supply of zkProofer Node Licenses is capped at 100,000, with availability determined by the structured draw system. This approach maintains a balanced ecosystem where node ownership is widely distributed rather than concentrated among a few entities
To reinforce the long-term sustainability of the ecosystem, 18% of all $H tokens are allocated to Verifier Nodes for user-related verification tasks. Additionally, 25% of all verification fees collected from ecosystem DApp are distributed among zkProofer Nodes. This dual-reward structure ensures that node operators remain incentivized to maintain network security, privacy, and efficiency.
Human ID
Human ID is Humanity Protocol unique identification card.
It's currently on the testnet.
1
Unique Identifier
Each Human ID is unique to an individual.
2
Privacy-Focused
Leverages zero-knowledge proofs for selective sharing.
3
Testnet Available
Experience the registration process on the test network.
Once created, you’ll be in the dashboard. It is currently on testnet. The Palm Not Enrolled is a feature that will be released in Phase 2 when the palm scanners are distributed.
Palm Recognition
Humanity Protocol uses palm recognition.
It leverages both palm print and palm vein recognition.
This creates a reliable method for verifying human identity.
The palm recognition process is executed in two phases to maximize accessibility and precision. Phase 1 employs palm print recognition, which uses personal smartphone cameras to capture images of the palm’s external features, such as skin patterns, lines, and creases. These attributes are analyzed using Convolutional Neural Networks (CNN) to extract key features and differentiate individuals. This phase enables quick and convenient user verification while ensuring a high level of accuracy in identifying unique individuals. However, since external palm prints may change over time due to aging or environmental factors, Phase 2 introduces a more advanced biometric approach.
Phase 2 enhances identity verification by incorporating palm vein recognition, which requires a specialized infrared-enabled device connected to a smartphone. This method captures the internal vascular structure of the palm, which remains stable throughout an individual’s lifetime and is nearly impossible to replicate or forge. Studies, such as those conducted by Fujitsu, have demonstrated that palm vein recognition offers an exceptional false acceptance rate of less than 0.00008% and a false rejection rate of only 0.01%. By analyzing both palm prints and palm veins, the Humanity Protocol ensures an unparalleled level of biometric accuracy, creating a unique digital identity signature for every verified user.
Potential Adoption
Enhanced Privacy
Consumers want more control over their personal data. Humanity Protocol offers a solution with a decentralized identity system.
Market Growth
The data protection market is rapidly expanding. It's projected to reach $115 billion by 2029.
User Empowerment
Users have complete ownership of their data. They decide what to share and with whom.
Cross-Service Utility
Human ID works across many different services. Users avoid managing separate accounts.
$H Token
1
ERC-20 Token
The $H token is built on the Ethereum network using the ERC-20 standard.
2
Fixed Supply
There are 10 billion tokens to ensure balance without inflating value.
3
Incentive Mechanism
The incentive design enhances ecosystem participation without devaluing the token.
Unofficial Tokenomics Details and Allocation
Early Contributors
19% allocated to core team members and initial project contributors.
Investors
10% reserved for strategic investors supporting growth initiatives.
Human Institute
5% designated for operational support and future collaborations.
Foundation Treasury
12% dedicated to liquidity, operations, and key strategic goals.
Ecosystem Fund
24% incentivizes developers and fosters protocol innovation.
Verification Rewards
18% boosts node operator engagement in verification activities.
Community Incentives
12% drives user adoption and broad network participation.
$H emissions are as follows:

Tokenomics Allocation

Community 12% supports user onboarding, airdrops, and reward programs. Ecosystem 24% incentivizes partners, developers, and new projects. Security 18% ensures node operator engagement in verification. Treasury 12% for liquidity, operations, and strategic goals. 10 billion $H tokens have been minted. Tokenomics include allocations to the team, investors, the Human Institute, and the community. The incentive design enhances participation without devaluing tokens.

Stakeholders
The Humanity Protocol ecosystem is composed of several key stakeholders, each playing a distinct role in the network’s functionality and economic sustainability. These participants contribute to the protocol’s security, governance, and adoption through various mechanisms.Primary Stakeholders:
  • End Users: Individuals who engage with the network by verifying their identity, participating in governance, and utilizing ecosystem applications. These users benefit from secure identity verification and may receive incentives for their engagement.
  • Identity Validators: Participants who stake $H tokens to issue and verify identity credentials. Their role is crucial in maintaining network integrity, and they earn a share of verification fees as compensation.
  • zkProofer Node Operators: Responsible for running verification proofs that validate credentials. These operators receive rewards in return for their computational efforts, which support the protocol’s trust architecture.
  • Third-Party Applications: External platforms that integrate with the Humanity Protocol to utilize identity verification and attestation services. These applications contribute to network activity and may receive onboarding incentives for participation.
  • Humanity Protocol Foundation: Manages various aspects of the protocol, including operational costs, partnerships, and community incentives. The foundation also plays a role in maintaining liquidity and supporting ecosystem development.
  • Governance Participants: $H token holders who participate in governance by voting on key protocol decisions. Their involvement ensures decentralized decision-making and long-term network sustainability.
The interaction between these stakeholders establishes an interconnected ecosystem where each participant benefits from and contributes to the overall functionality of the Humanity Protocol. As adoption grows, the collective engagement of these groups is expected to drive network expansion and enhance the token’s utility.
Risks
Biometric Data Security
Palm scans are required. Users must trust data management.
User Trust
Transparency about data handling is vital.
3
Device Dependence
Requires palm-scanning devices, limiting access.
4
Tech Support
Ongoing tech support and maintenance are essential.
Team
Terence Kwok (CEO)
Seasoned entrepreneur who previously founded Hong Kong-based unicorn Tink Labs.
Yat Siu (Director)
Chairman and co-founder of Animoca Brands, contributing valuable insight to blockchain gaming and digital property rights.
Mario Nawfal (Director)
Serial entrepreneur who has founded companies like International Blockchain Consulting Group and Froothie. Also runs one of the largest citizen journalists on X.
Project Investors
Funding Round
On January 27, 2025, Humanity Protocol secured $20M in funding. The funding round was co-led by Pantera and Jump.
Valuation
The funding was raised at a Fully Diluted Valuation (FDV) of $1.1B. This highlights the strong investor confidence.
Other Investors
Investors also include Animoca, Shima, Hashed, and Mechanism Capital. Cypher and more also invested in the protocol.
FAQ
Privacy
Zero-knowledge proofs and encryption protect data. Biometric data is secured during processing.
Human ID
It's a unique identifier. Reserve it through the testnet platform. Use Email, Telegram, X, Discord, Google, or MetaMask.
Referrals
Share your referral link. Earn rewards when friends sign up.
Staking Incentives
Rewards may be earned for network activities. Verification process participation may earn tokens.
Differentiation
Palm vein recognition is used. It integrates ZKPs and decentralized storage.
KYC
Self-sovereign identity (SSI) is enabled. Users control credentials using ZKPs.
Join the community
Made with