← Back

How It Works

This page is primarily AI generated, based on the founder's vision documents.

In-Person Registration

To join the network a human registers a pseudo-anonymous identity that is only accessible by biometrics on their mobile device. The biometric information is not stored or shared during registration, only used locally on the device to protect the identity.

This registration takes place in the presence of another trusted human to provide a proof of humanity that AI cannot fake. This, along with the biometric requirement to access the identity, serves as proof that a real human is controlling the identity.

Trusted humans are thoroughly vetted members with a large stake in the network. Initially, they are the founding members. Their role is straightforward: confirm that the person in front of them is a real, living human being — not a screen, not a recording, not a second registration for someone already on the network.

Biometric-Protected Identity

Your identity lives on your mobile device, protected by the device's biometric authentication — fingerprint or face recognition. The private key that controls your identity is generated and stored in the device's secure element, a hardware-isolated area that even the operating system cannot access directly.

No biometric data ever leaves your device. The network never sees your fingerprint or face scan. Biometrics are used solely as a local gate — proving that the person holding the phone is the person who registered it.

This means your identity cannot be used remotely, cannot be accessed by someone who steals your phone without your biometrics, and cannot be extracted or copied to another device.

GPS-Anchored Location

Registrations include approximate GPS coordinates, permanently anchoring each identity to a physical location so that identities cannot be falsely claimed in geographic contexts where they do not belong.

The coordinates are coarse — enough to associate an identity with a region, not a street address. This preserves privacy while enabling platforms to distinguish local voices from foreign interference. A product review site can show that a reviewer is actually in the country where the product is sold. A local news forum can verify that commenters are from the community.

The Membership Fee

The network discourages multiple registrations through a membership fee that not only helps secure the network, but provides the means to sustain it.

The fee creates a real economic cost to creating fake identities. If someone wants to run a bot farm of 1,000 fake accounts, they need to pay 1,000 membership fees — and each one requires a separate in-person registration with a trusted human. The combination of financial cost and physical presence makes Sybil attacks economically and logistically impractical.

All fees are segregated and operational costs come from interest earned on the fees held. If a human violates the rules, their identity is inactivated and their membership fee is donated to a charity chosen at the time of registration. If a human wishes to leave the network, they may request a refund of their membership fee which may be granted after a mandatory 90-day review period.

Signing Content

Once registered, members can cryptographically sign any piece of content — a social media post, a product review, a comment, an article. The signature proves that a verified, unique human authored the content, and includes a mandatory disclosure about AI involvement in the creation process.

Anyone can verify these signatures against the network's public transparency log. No account on any platform is needed to verify — the proof is cryptographic and independently auditable.

Help Build a More Human Internet

Join the waitlist to be among the first verified humans on the network.

Join the Waitlist