At Identity.com, we’re redefining digital identity by giving you full control. 🔒 Our decentralized identity solutions empower you to manage your data, choose who has access to it, and protect your privacy. No more relying on centralized platforms – your identity is secure, private, and under your control. 🤝
Identity.com
IT Services and IT Consulting
San Francisco, California 810 followers
Open source ecosystem providing access to on-demand, secure identity verification
About us
Identity.com is a non-profit organization dedicated to putting digital identity in your control. As proud members of the W3C, we strive to shape a digital landscape that prioritizes security, privacy, and user control. We're building an open-source ecosystem for user-centric digital identity, equipping developers and end-users with the tools they need to manage their identities easily and securely.
- Website
-
https://identity.com
External link for Identity.com
- Industry
- IT Services and IT Consulting
- Company size
- 11-50 employees
- Headquarters
- San Francisco, California
- Type
- Privately Held
- Founded
- 2018
- Specialties
- identity, blockchain, identity verification, decentralized, security, and digital identity
Locations
-
Primary
703 Market St
San Francisco, California, US
Employees at Identity.com
-
Phillip Shoemaker
CEO/Executive Director of Identity.com, focusing on Decentralized Identities for the world.
-
Daniel Kelleher
Web3 and Regenerative Finance Tech Lead, Engineer and Advocate.
-
David de Bruyn
Software Engineer at Identity.com
-
Tighe Barris
Senior Software Development Engineer at Identity.com
Updates
-
Data is the new currency. 💯 In a world overflowing with information and misinformation, having verified content is crucial for building trust and transparency. Digital Provenance ensures data authenticity and integrity, making it invaluable across industries like finance, healthcare, and media. By tracking the origin and modifications of data, it establishes credibility, ensuring you can trust what you see. Learn more about how digital provenance is shaping our digital landscape in our latest blog. 👇
-
🎉 Excited to announce that V2 of the Identity Gateway Protocol is getting close to being mainnet-ready! After receiving the FYEO audit report, we're implementing the final tweaks to ensure a secure and robust launch. Stay tuned for the full release soon! FYEO audit report: https://lnkd.in/gs7SESSr Gateway Protocol V2: https://lnkd.in/g-kcQJgW #blockchain #decentralizedidentity #identityverification
FYEO performs security assessment for identity.com
fyeo.io
-
Trust in biometric technology is decreasing, with only 5% of consumers saying they highly trust how it is handled. Verifiable credential technology offers a solution: 1️⃣ Capture biometric data (e.g., face) by a trusted authority. 2️⃣ Save it as a Uniqueness VC (verifiable credential) and store it in your digital ID wallet. 3️⃣ Present the credential to validate your unique and genuine presence. No central storage of biometrics required. Secure, private, and user-controlled!
-
Imagine the convenience of not having to manually present your driver's license and go through the verification process repeatedly. With decentralized, reusable IDs, you can upload your ID once and use your unique attributes to confirm your identity whenever needed. This saves time for both individuals and businesses by streamlining verification processes and enhancing efficiency. 🔐
-
At Identity.com, we’re committed to ensuring your identity is secure. We advocate and develop digital identity tools that are secure, private, and user-friendly.🤝
-
-
When signing up for some services, you often have to undergo KYC processes to confirm your identity. However, sometimes completing KYC is not enough to keep fraud from happening. By exploiting loopholes in identity verification processes, fraudsters use fake IDs, stolen info, and synthetic identities to bypass checks. Our latest blog post below dives into KYC fraud and key strategies to help prevent it, including decentralized reusable IDs that enhance security by eliminating central data storage vulnerabilities and giving users control over their personal data. 🔒🏦
What Is KYC Fraud?
https://www.identity.com
-
Verifiable Credentials are secure digital records that prove specific attributes about an individual. They function like digital IDs but with enhanced security and privacy. Here's how they work: 1️⃣ Issuer: A trusted organization (like a university or government agency) creates and issues the credential. 2️⃣ Holder: The individual owns and controls the credential, often storing it in a digital ID wallet. 3️⃣ Verifier: An entity (like an employer or service provider) checks the credential's authenticity and validity. This process allows for secure and private identity verification, sharing only specific attributes when necessary. 🔒
-
Ensuring privacy and security in dApps is essential for their widespread adoption and success. With data breaches projected to reach $10.5 trillion by 2025, proactive measures are crucial, especially with how developers handle users' personal information. Dive into our latest blog about securing dApps, covering: 🆔 Decentralized Identity: Empowering users with control over personal data. 🔒 Smart Contract Security: Regular audits and formal verification. 🔑 Data Encryption: Utilizing homomorphic encryption and zero-knowledge proofs. ...and more
How to Ensure Privacy and Security in dApps
https://www.identity.com