

Table of Agenda
1. The Digital World Is Leaving Humans Behind
2. Humanity Protocol for Real Humans
2-1. Why palm vein recognition?
2-2. Critical security issues solved through ZK technology
2-3. Identity verification process via Humanity Protocol
3. The Strategic Role of the $H Token
4. Key Challenges Ahead for Humanity Protocol
5. Final Thoughts: Building the Infrastructure to Prove Humanity
Appendix. Hands-On with Humanity Protocol
1. The Digital World Is Leaving Humans Behind
In 2023, Arbitrum—a leading Layer 2 project—captured significant market attention with a large-scale airdrop. The initiative was intended to reward genuine users through fair distribution, but the outcome was quite the opposite. Nearly half of the total tokens ended up in the hands of the top 1% of wallets, most of which had engaged in large-scale airdropfarming (Sybil attacks) using hundreds of addresses. Instead of broadening its real user base, the project inadvertently exposed a system where bots and multi-account operators monopolized the rewards. This problem is by no means limited to the crypto space. MapleStory, a long-standing leader in gaming that recently launched its $NXPC token, has been locked in a decades-long battle against illegal macro bots. While legitimate users may spend hours completing a single quest, automated scripts run hundreds of accounts in parallel—clearing out in-game items and currency. Despite continuous security updates, developers remain hamstrung by a more fundamental limitation: systems that cannot distinguish between humans and non-humans simply cannot defend against these threats.
Another pressing issue lies in the broader internet experience. When setting up an iPhone, users are required to agree to lengthy terms and conditions spanning dozens of pages. Most people skip the content entirely and click “I agree,” unaware that these documents may contain troubling provisions. For instance, Apple has included clauses allowing “voice data collected during interactions with Siri to be listened to by some employees or contractors for quality improvement.” It later came to light that thousands of private conversations had been reviewed—without user consent—by third-party contractors, sparking widespread backlash. The fact that our daily habits, emotions, and even personal conversations are stored somewhere in the cloud is a sobering reflection of the darker undercurrents of digital life.
Bots are capturing airdrops and dominating online games. Personal data is being harvested, controlled, and exploited by Big Tech platforms. The digital space is becoming a space where it is increasingly difficult for actual humans to claim a secure place.
So how can one prove their humanity online? And how can personal information be safeguarded in the process?
These are the very questions that Humanity Protocol seeks to answer. The project is grounded in a simple yet powerful principle: anyone should be able to prove that they are a real human being using a single ID, and that verification must be both privacy-preserving and technically trustworthy. Rather than relying on conventional methods, Humanity Protocol embraces palm recognition and zero-knowledge proof (ZK) technology as its core tools for digital identity. With AI accelerating the erosion of online authenticity, the internet is no longer a place where anonymity guarantees freedom—it has become a space plagued by distrust. We now live in an era where proving humanity is not just desirable—it’s essential. And in such an era, a universal, verifiable ID is not optional. It’s indispensable.
Source: X (@TK_Humanity)
2. Humanity Protocol for Real Humans
To address the two challenges outlined earlier, digital identity verification and data privacy, the Web3 ecosystem has seen the rise of numerous projects advocating for Decentralized Identity (DID) solutions. Among the most prominent is Worldcoin, which sought to ensure that each individual could claim a unique ID by scanning their irises. While innovative, the method came with clear limitations: it required proprietary hardware (Orbs) and involved repetitive biometric scans, creating a cumbersome user experience. Another project, Fractal ID, offered more accessible onboarding through conventional KYC, but drew criticism for storing sensitive personal data on centralized servers.
This prompted a continued search for an identity verification approach that is both user-friendly and privacy-preserving. Humanity Protocol emerged with a novel solution: the combination of palm vein recognition and Zero-Knowledge Proof (ZK Proof) technology. This foundation laid the groundwork for a service that enables trustless, self-sovereign identity without compromising user privacy. Recognizing the importance of the problems Humanity Protocol aims to solve—and the scale of the opportunity—leading crypto venture firms made substantial commitments. In January 2025, the project secured $20 million in funding at a $1 billion valuation. The backing of top-tier investors such as Pantera, Jump, Hashed, and Animoca signaled strong conviction in both the team and the protocol’s long-term potential.
2-1. Why palm vein recognition?
Among various biometric modalities, palm vein recognition was chosen for its rare combination of security, reliability, and ease of use. The palm provides a rich set of biometric markers—not only surface-level features like lines and creases, but also the unique vascular patterns beneath the skin. These subdermal vein patterns are highly individual and remain stable throughout a person’s life, making them an exceptionally reliable identifier. Unlike fingerprints or facial features, palm veins are invisible to the naked eye and structurally complex, rendering them virtually impossible to replicate. Fingerprints can be altered by injury, wear, or even cloned. Facial recognition can be spoofed using high-resolution images or deepfakes. In contrast, palm veins are not externally exposed, which eliminates most attack vectors and makes them resistant to forgery.
Source: X (James Kim, Co-CEO/Co-Founder of Xangle, @JunwooJames)
From a user experience perspective, palm recognition offers a familiar and less intrusive alternative to other biometric methods. While iris scans can be psychologically uncomfortable—requiring light to be directed into the eye—palm recognition allows users to simply present their hand to a smartphone camera. The process is fast, intuitive, and hygienic, requiring no specialized hardware. Even in less-than-ideal conditions—such as when a user's hand is dirty or has small cuts—machine learning–based algorithms can compensate for surface noise and accurately interpret the internal vein pattern. According to research conducted by Fujitsu, palm vein recognition has an error rate of less than 0.00008%, placing it among the most accurate biometric technologies available today.
Building on this robust technological foundation, Humanity Protocol is advancing a vision to create the “Human Layer of Web3.” In order to lower entry barriers and enable broad participation, the protocol’s palm recognition system is designed as a two-phase process:
- Phase 1 leverages smartphone cameras to recognize surface-level palm features such as wrinkles and patterns. Though similar to fingerprint scanning, it captures richer data and is less vulnerable to damage or degradation.
- Phase 2, still in development, will introduce infrared-based vein recognition to deliver significantly enhanced precision and security.
The newly released Humanity Protocol app for iOS and Android currently implements Phase 1, offering palm surface scanning via smartphone camera. Future updates will enable Phase 2, bringing vein recognition into production as the next step in the protocol’s roadmap toward higher-assurance verification.
This contactless approach reduces both psychological resistance and hygiene concerns, ultimately lowering onboarding friction for users. Feedback from the community has been overwhelmingly positive, with comments such as “This feels far less dystopian than iris scanning,” and “It’s much more convenient than conventional biometric methods.” In the long term, Humanity Protocol aims to generate a unique digital identity signature by combining both palm surface and vein data. This dual-layered biometric profile is set to serve as the foundation for a trustworthy, privacy-preserving identity infrastructure on the blockchain—one that is truly human-centric in both form and function.
2-2. Critical security issues solved through zk technology
While palm vein recognition is effective in distinguishing humans from bots, it raises a critical question: how is sensitive biometric data managed? As highlighted by Apple’s unauthorized use of voice recordings, today’s digital environment offers no guarantees when it comes to data privacy. Humanity Protocol directly addresses this concern by integrating Zero-Knowledge Proof (ZKP) technology—enabling verification without revealing any personal information.
Consider a decentralized application (dApp) that needs to verify only whether a user is over the age of 19. Humanity Protocol can generate a ZK proof that confirms, “Yes, this user is 19+,” without exposing the user’s actual date of birth, legal ID, or any other identifying data. The dApp receives only a true/false result, with no access to the underlying personal information. This architecture allows users to retain full control over their data while revealing only the minimum necessary to meet the verification requirement.
During initial identity registration, the high-resolution palm print image is immediately converted into an encrypted biometric signature, ensuring that the original image is never stored or exposed. These encrypted signatures are then fragmented and distributed across multiple zkProofer nodes within the Humanity Protocol network. Because no single node holds the complete dataset, even if one node is compromised, the full biometric record cannot be reconstructed, dramatically reducing the risk of data leakage.
Humanity Protocol is also designed to give users full autonomy over their biometric data. At any point, users can choose to delete their data, and the team emphasizes that no user information is ever stored on centralized infrastructure. Unlike the Web2 model employed by companies like Google and Facebook—where user data is centrally stored and monetized—Humanity Protocol leverages decentralized storage and ZK technology to ensure that individuals retain sovereignty over their private data.
Strict access controls further safeguard the system. Nodes responsible for ZK verification, zkProofers, operate solely on encrypted datasets and are never granted access to plaintext images or user-identifiable information. The verification process is both decentralized and redundant, with multiple zkProofers participating in cross-validation to enhance security and trustlessness. This many-to-many structure ensures that even if certain nodes are compromised or behave maliciously, the integrity of the system remains intact. Within this architecture, Humanity Protocol establishes a privacy-first identity system in which all personal data is encrypted and distributed, only the requested fact is revealed (never the underlying data), and no central authority can access raw user information. The design affirms a core tenet of digital autonomy: the right to possess an identity without surrendering personal privacy. Protected by this framework, users can confidently maintain self-sovereign identity (SSI) and participate in Web3 services without compromising their data or their dignity.
2-3. Identity verification process via Humanity Protocol
How exactly do palm vein recognition and zero-knowledge (ZK) technology come together in Humanity Protocol’s identity verification process?
At its core, Humanity Protocol is founded on the principle that individuals should own and control their identity data and verification records. To realize this, the system incorporates three essential actors: the Identity Validator, the zkProofer, and the user, who holds a unique Human ID.
The process begins when a user creates a Human ID derived from their palm vein biometric data. To bring real-world identity attributes—such as age, academic credentials, or KYC verification—into the Web3 environment, the user then requests the issuance of a Verifiable Credential (VC).
Identity Validators assess whether the submitted biometric data is unique, non-duplicated, and valid, and if so, they issue the corresponding VC. This validation step involves at least two validators participating asynchronously within a two-hour window. If they disagree, additional validators are called in to resolve discrepancies. To ensure accuracy and discourage misconduct, any validator who makes an erroneous judgment risks slashing of their staked $HP tokens—a mechanism designed to uphold trust and precision in credential issuance.
Once issued, the VC is verified via a zkProofer whenever the user interacts with a Web3 application. The zkProofer generates a zero-knowledge proof that validates the authenticity of the VC without revealing any personal informationto the application. For example, if a dApp restricts access to verified human users, the user can present their Human ID and the relevant VC through a zkProofer. The dApp sees only the result of the verification—true or false—not the underlying data. zkProofers function as privacy-preserving intermediaries, and they receive service fee incentives for providing cryptographic validation.
A critical feature of this system is that users maintain full control over their data at all times. No third party can access, view, or retain personal information. Credentials are stored using decentralized storage protocols such as IPFS, and access for verification is temporarily delegated via time-bound key sharing mechanisms. This model enables Humanity Protocol to embody the core tenet of Self-Sovereign Identity (SSI)—a structure that ensures one person, one ID within the Web3 ecosystem. This approach has gained recognition beyond the project itself. Polygon co-founder Sandeep described Humanity Protocol as the world’s first truly Sybil-resistant network, emphasizing its novel approach to identity integrity in decentralized systems.
Ultimately, Humanity Protocol creates a trustworthy digital identity infrastructure by combining biometric authentication, zero-knowledge cryptography, and SSI principles. Each participant—user, validator, and proofer—operates under a model of clear responsibility and aligned incentives. Far more than a simple blockchain or consensus design, this framework represents a meaningful advancement in identity systems—a foundational mechanism for a truly human-centered Web3.
3. The Strategic Role of the $H Token
Humanity Protocol raised $30 million in its seed round at a near-$1 billion valuation, backed by leading crypto venture firms including Animoca Brands, Hashed, Pantera, and others. From the outset, there was strong anticipation surrounding a token launch, and that expectation has now been formalized through the release of Humanity’s tokenomics and distribution framework for the $H token.
The total supply of $H is capped at 10 billion tokens, serving as the primary incentive mechanism across the Humanity Protocol ecosystem and facilitating coordination among various stakeholders. According to the distribution plan, 24% will go to the ecosystem fund—the largest share—to support long-term ecosystem growth; 19% and 10% are allocated to the team and investors, respectively; 18% is designated for Identity Validators; and 12% is allocated to the community, with the remaining portion reserved for other key roles within the network.
One of the $H token’s core functions is to reward the network’s infrastructure providers—specifically, the Identity Validators and zkProofers, who collectively ensure the integrity and privacy of the protocol’s verification layer.
- Identity Validators participate in the consensus process by verifying whether a user’s biometric submission is authentic and non-duplicated, and issuing the corresponding Verifiable Credential (VC). While these roles are initially fulfilled by the core team during Phase 1, Phase 2 will introduce a more decentralized validator set comprising institutions like universities and financial organizations, who will stake tokens to participate. In this setup, $H tokens function as compensation for accurate verification work.
- zkProofers, on the other hand, are responsible for generating ZK proofs without accessing any raw personal data. They compute cryptographic proofs solely over encrypted inputs, never interacting with identifiable information. Given the high computational cost of ZK operations, a dedicated Identity Verification Pool has been established, from which zkProofers are periodically rewarded in $H tokens.
A key challenge with any token-incentivized model is the long-term impact of token emissions on price. While token-based rewards are necessary to bootstrap infrastructure participation, they also increase supply—which, without sufficient demand, can lead to downward price pressure. To mitigate this, the team has emphasized the importance of utility-driven demand for $H. The most direct utility is its role as the native gas token on Humanity’s zkEVM Layer 2 chain. However, with gas fees across L2s trending lower, this alone is unlikely to generate sufficient token velocity. In response, Humanity Protocol has proposed a core utility tied directly to its identity model: users who require identity verification will be required to pay verification fees in $H. This not only introduces organic demand, but also aligns the token’s usage with the project’s central value proposition—proof of humanness.
As the crypto industry matures, the market is increasingly distinguishing between tokens with real, recurring demand and those driven solely by inflationary emissions, resulting in a widening gap in price performance. Projects like Hyperliquid, which leverage trading fee revenue to buy back their native token ($HYPE), have established clear value capture mechanisms and compelling price narratives. In contrast, tokens lacking meaningful utility and subject to continuous supply expansion have faced prolonged price stagnation or decline. Within this landscape, Humanity Protocol’s strategy—to link core utility, namely identity verification, directly to token demand—is not just prudent but essential for long-term sustainability. While execution challenges remain, the tokenomics framework is fundamentally sound. Its success will depend on the protocol’s ability to maintain a delicate balance between incentive alignment, organic demand creation, and disciplined supply management.
4. Key Challenges Ahead for Humanity Protocol
Humanity Protocol has demonstrated early momentum—technically innovative, and successfully listed on major exchanges. However, several real-world challenges must be addressed to ensure the project’s long-term viability. These can be broadly categorized into three key areas:
(1) The Acquisition of Moongate: A strategic move to secure real-world use cases for identity verification
For Humanity Protocol to sustain growth, the Human ID must find meaningful applications across both digital and physical domains. Token rewards alone are not enough; the credential must be usable in real-world and Web3 contexts. Recognizing this, the team has actively pursued partnerships and ecosystem expansion.
Between 2023 and 2024, Humanity collaborated with key players such as Polygon Labs and Animoca Brands. In April 2025, it announced the acquisition of Moongate, a Web3 event ticketing platform—marking a decisive step toward real-world utility. The acquisition allows Humanity Protocol to onboard hundreds of thousands of event attendees into its identity ecosystem. By integrating its technology with Moongate, users can verify ticket ownership and event access using their Human ID, while organizers gain protection against bots and secondary market abuse.
Source: X (@Humanityprot)
Moongate already supports high-profile events such as Token2049 and ETHDenver, and starting with Token2049 Singapore, palm vein authentication is expected to be implemented for event entry. Looking ahead, extending real-world applications remains one of the most critical priorities for the protocol. Beyond events, use cases may include Finance (as a KYC replacement), Gaming (enforcing one account per real person), and Social media (creating bot-free environments). If real-world demand for Human ID remains limited, participation may decline rapidly once the airdrop momentum fades. As such, securing sustained, diverse use cases will be fundamental to Humanity Protocol’s continued relevance and adoption.
(2) Accessibility challenges of Phase 2 palm vein scanning
As outlined previously, full identity verification in Humanity Protocol will require Phase 2 infrared (IR) palm vein scanning. Currently, most users have only completed Phase 1 via smartphone camera-based palm print registration. However, devices capable of performing vein scans are not yet widely available, representing a potential bottleneck—similar to Worldcoin’s challenges in distributing Orbs. To address this, the team is developing compact and affordable scanners, and exploring options to distribute them for free at events and through communities. Limited units were showcased and distributed at meetups across Asia in late 2024, and plans are underway to establish scanning stations in major global hubs throughout 2025. Long-term strategies may include leveraging IR sensors in existing smartphones, or partnering with banks and telecom providers to offer verification-as-a-service. Ultimately, widespread accessibility will depend on creative infrastructure deployment. If Phase 2 remains difficult to access, identity verification may stagnate within a niche user base. Therefore, hardware distribution and ease of use will be critical to unlocking broader adoption.
(3) Ensuring the sustainability of the $H tokenomics
The project’s early growth relied heavily on points accumulation and token airdrops—effective mechanisms for initial user acquisition—but maintaining price stability and long-term economic sustainability presents a more complex challenge. If airdrop recipients were to mass-sell their tokens, it could trigger sharp price declines and reduced engagement across the network. To mitigate this risk, Humanity Protocol is implementing strategies to enhance the intrinsic value of the $H token and promote long-term alignment. These measures include charging verification service fees in $H, enabling staking for node participation, offering governance rights as an incentive for holders, and introducing long-term lockup programs—such as granting early access to third-party airdrops for those who stake their tokens.
The team has clearly stated: “Future airdrops will go to real humans, and staking $H will be key to participating.” The goal is to convert one-time airdrop recipients into committed long-term stakeholders, while stabilizing token supply dynamics. In summary, sustainable tokenomics will require a combination of growing utility and long-term holder retention. The ultimate test lies in the protocol’s ability to engineer a robust, incentive-aligned economic system that balances demand generation, supply management, and user value.
5. Final Thoughts: Building the Infrastructure to Prove Humanity
The rise of AI has ushered the digital world into a new era—one marked by an explosion of fake identities and synthetic content. These are no longer fringe issues but core threats to the trustworthiness of digital systems, and they demand viable solutions. Humanity Protocol offers one such solution: a bold, technically grounded approach to identity verification that combines the relative simplicity of palm vein recognition with privacy-preserving zero-knowledge (ZK) technology. While hurdles remain—particularly in adoption and securing real-world use cases—the protocol’s verification architecture holds strong potential to become a new standard for establishing humanness in an increasingly automated world. Whether Humanity Protocol can truly become the cornerstone of a “human-first” digital ecosystemwill be tested in the phases to come, especially with the upcoming mainnet launch.
Despite the inherent risks and growing competition in the space, there is reason for optimism. The project signals a future in which users retain sovereignty over their identities, disclosing only what is necessary and nothing more. Such an infrastructure—one that enables individuals to verifiably prove their humanity—has the potential to become a foundational layer for trust in digital interactions, from financial transactions to social networks. If Humanity Protocol succeeds in realizing its vision, it could mark the beginning of a new paradigm for internet identity—where privacy and trust are not in tension, but in harmony.
Appendix: Hands-On with Humanity Protocol
To provide a brief overview of the user experience, I personally tested the Humanity Protocol testnet app and documented each step of the process. As of June 2025, users can create a Human ID and complete Phase 1 palm print recognition via either the mobile app or the web interface.
1. Reserving a Human ID and Connecting a Wallet
I began the process by visiting the testnet website and clicking on "Reserve your Human ID." Multiple login options are available—email, Twitter, Discord, etc.—but using social logins like Gmail or X (Twitter) made onboarding simple. After signing a message via Gmail to link my wallet, I was prompted to create a unique Human ID.
I entered my preferred ID (e.g., username
) and, in the invite code field, entered a friend’s code—or the default code t
if none was available. A welcome message followed, along with the final profile setup step.
2. Entering Profile Information and Email Verification
Once the Human ID was created, the app requested basic profile details including first name, last name, and email. Although the system is based on decentralized identity, the testnet still requires email verification to enable account recovery and notifications. After submitting the information, a confirmation email was instantly delivered. Clicking the link completed verification and finalized the creation of my Human ID account.
3. Dashboard Overview – Points and Referrals
The in-app and web dashboards display the Human ID, linked wallet address, RWT (reward point) balance, and current ranking on the leaderboard. A small Genesis reward was granted at signup, and a countdown timer indicated the next eligibility for the Daily Reward, which resets every 20 hours. Additional features like Bridge and Faucet also allow users to accumulate more points. Collecting and claiming these points may prove valuable for future airdrops or benefits.
4. Palm Print Recognition (Phase 1)
The mobile app offers functionality to complete Phase 1 palm print registration. After downloading the Humanity app from the App Store, I logged in and selected “Verify Palm (Phase 1).” The camera activated, and I was guided to position my hand approximately 20 cm from the screen. Once properly aligned, the camera captured the palm image. The AI system successfully identified the palm pattern, completed registration, and displayed a message:
“Your palm prints have been successfully enrolled and you are now Humanity App Verified.”
A Phase 1 verification badge appeared on my profile. The entire process took less than five seconds and required no specialized hardware.
5. Next Steps
With palm print registration complete, I now await Phase 2 vein scanning and Phase 3 full verification, which will lead to mainnet issuance. According to the team, once Phase 2 launches, the app will be updated to support infrared palm vein registration—either by locating nearby scanner stations or reserving appointments. Upon completing Phase 3, users will be recognized as Verified Humans, unlocking benefits such as airdrops and priority access to ecosystem opportunities.
This concludes a brief walkthrough of the Humanity app onboarding process. Overall, the experience was intuitive and user-friendly, with a modern interface familiar to Web2 users. That said, since Phase 2 has not yet launched, the full self-sovereign identity experience remains incomplete. Once Phases 2 and 3 are rolled out, it will be important to observe how well infrared palm vein recognition is received and how seamlessly it functions for real-world users. These steps will be critical in shaping the protocol’s usability at scale.