One Person, One Identity
The Sybil Problem
A Sybil attack is when a single actor creates many fake identities to gain disproportionate influence in a system. On the internet, Sybil attacks are everywhere: fake social media accounts, bot farms, manufactured reviews, astroturfed movements, and coordinated manipulation campaigns.
The fundamental challenge is ensuring that each participant in a system is a unique, real person. Without this guarantee, any system that gives equal weight to each participant — voting, reviews, social proof, reputation — can be gamed by anyone willing to create enough fake accounts.
How Existing Approaches Fall Short
CAPTCHAs were designed to distinguish humans from bots, but modern AI solves them more reliably than humans. They are a nuisance for real users and no longer a meaningful barrier for automated systems.
Phone number verification raises the bar slightly, but phone numbers can be purchased in bulk for pennies. A determined actor can acquire thousands of phone numbers and create thousands of verified accounts.
Government ID verification (KYC) is effective at establishing uniqueness but requires users to surrender sensitive personal data to centralized databases. This creates massive privacy risks and excludes people who lack formal identification documents.
None of these approaches achieve both strong uniqueness guarantees and privacy preservation.
A Different Approach
Accountable Humanity achieves Sybil resistance through three reinforcing mechanisms:
In-person verification. Registration requires a face-to-face meeting with a trusted network member — a thoroughly vetted individual with a large stake in the network. This is something AI cannot fake: a real human, in the physical world, confirming that another real human is standing in front of them.
Economic deterrent. A membership fee makes it financially impractical to register multiple identities. The fee is substantial enough to discourage abuse but designed to be accessible. If a member violates the rules, their fee is forfeited — donated to a charity they chose at registration.
Biometric device binding. Each identity is protected by biometrics on the member's personal device. The biometric data never leaves the device — it is used solely to prevent unauthorized access to the identity. This ensures that even if someone obtained the cryptographic keys, they could not use the identity without the registered person's biometric.
Why One-Identity-Per-Person Matters
When every participant in a system is guaranteed to be a unique human, the dynamics of online interaction change fundamentally. Votes cannot be stuffed. Reviews cannot be manufactured at scale. Reputation becomes meaningful because it is attached to a scarce, non-duplicable identity.
This is the foundation that makes all other trust mechanisms possible: human-authored content verification, geographic accountability, and meaningful privacy-preserving identity.
Claim Your Unique Identity
Join the waitlist to be among the first verified humans on a Sybil-resistant network.
Join the Waitlist