Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Proof-of-Humanity

Proof-of-Humanity (PoH) is a decentralized identity and sybil-resistance protocol that uses social verification to cryptographically attest that an entity is a unique human being.
Chainscore © 2026
definition
BLOCKCHAIN IDENTITY PROTOCOL

What is Proof-of-Humanity?

Proof-of-Humanity (PoH) is a decentralized identity verification protocol built on Ethereum that uses social verification and video submissions to create a sybil-resistant registry of unique humans.

Proof-of-Humanity (PoH) is a decentralized identity verification system, often described as a sybil-resistant registry, that aims to cryptographically prove an entity is a unique human being. It operates as a set of smart contracts on the Ethereum blockchain, creating a publicly verifiable list of authenticated human profiles. The primary goal is to solve the "one-person-one-vote" problem in decentralized governance and to enable fair distribution mechanisms, such as Universal Basic Income (UBI) experiments, by preventing individuals from creating multiple fraudulent identities, or Sybil attacks.

The verification process is a hybrid of social verification and video attestation. An applicant submits a video of themselves alongside personal details, which is then stored on a decentralized file system like IPFS. Existing, verified members of the registry, known as vouchers, can vouch for the applicant's humanity. The submission then enters a challenge period, where any community member can dispute its validity by depositing a bond. If unchallenged, the submission is approved and the applicant's Ethereum address is added to the on-chain registry, granting them a verified human status.

A core economic mechanism of PoH is the use of deposit bonds and crowdsourced arbitration via Kleros, a decentralized dispute resolution court. To submit a profile, a user must deposit a bond. Challengers must also deposit a bond to dispute a submission. These bonds incentivize honest participation; losing a challenge results in the forfeiture of the bond to the winning party. This system leverages game theory to align economic incentives with truthful verification, making fraudulent attacks costly and impractical.

The most prominent application built on the Proof-of-Humanity registry is the Universal Basic Income (UBI) token. Verified humans can claim a continuous, regular stream of UBI tokens simply for being a registered, unique human. This demonstrates PoH's use case in enabling permissionless, sybil-resistant distribution of resources. Other key applications include decentralized governance (DAO voting), where PoH ensures one-human-one-vote, and authenticated airdrops for projects seeking to distribute tokens to real users rather than bots or farmers.

While innovative, Proof-of-Humanity faces significant challenges regarding privacy, accessibility, and scalability. Submitting a video to a public, permanent ledger raises profound privacy concerns. The process also requires specific resources—a webcam, internet access, and cryptocurrency for gas fees and bonds—which can create barriers to entry. Furthermore, the manual, crowdsourced verification model may not scale efficiently to millions of users. These trade-offs between sybil resistance, decentralization, and inclusivity are central to ongoing development in decentralized identity solutions.

how-it-works
SYBIL RESISTANCE MECHANISM

How Proof-of-Humanity Works

Proof-of-Humanity (PoH) is a decentralized identity verification protocol designed to establish unique human identities on a blockchain, primarily to prevent Sybil attacks where a single entity creates multiple fake identities.

Proof-of-Humanity (PoH) is a Sybil-resistant registry that uses a combination of social verification, video submission, and a decentralized dispute system to issue a unique, non-transferable identity to each verified human. The core mechanism involves a user submitting a short video of themselves alongside personal details, which is then stored on-chain (typically on Ethereum). This submission enters a challenge period where other verified members of the registry can vouch for its authenticity or raise a dispute if they suspect fraud. Successful verification results in the issuance of a Human token, often implemented as an ERC-20 or ERC-721 token, bound to the user's Ethereum address.

The security of the system hinges on its decisive crowdsourcing and economic incentives. Anyone can challenge a submission by depositing a stake. If a challenge is raised, the case is put to a vote in a Kleros court, a decentralized arbitration service. Jurors, who are also staking tokens, review the evidence and vote on the submission's validity. The losing side in the dispute forfeits their stake to the winner, creating a strong economic disincentive for malicious challenges and fraudulent submissions. This creates a robust, self-sustaining system where the community polices itself.

Once verified, a Proof-of-Humanity profile serves as a foundational primitive for decentralized applications (dApps) requiring trusted identity. Key use cases include fair airdrops and token distributions, quadratic funding and voting in DAOs (where one-person-one-vote is essential), and access to exclusive online communities. By cryptographically proving 'liveness' and uniqueness, PoH enables systems that are resistant to bot manipulation and fake accounts, paving the way for more equitable and human-centric digital economies. The protocol is a critical building block in the movement toward decentralized society (DeSoc).

key-features
SYBIL RESISTANCE MECHANISMS

Key Features of Proof-of-Humanity

Proof-of-Humanity (PoH) is a decentralized identity protocol that uses social verification and dispute resolution to create a Sybil-resistant registry of unique humans. Its core features ensure the system's integrity and utility.

01

Social Verification & Vouching

The primary enrollment mechanism where a new applicant must be vouched for by at least one existing, verified member of the registry. This creates a web-of-trust model where each member's reputation is on the line, discouraging malicious or fraudulent submissions. The process typically involves submitting a video and personal details for public verification.

02

Decentralized Dispute Period

Every new submission enters a mandatory challenge period (e.g., several days) where any participant can submit a deposit to dispute its validity. Disputes are resolved via Kleros, a decentralized arbitration court, where jurors review evidence. This crowdsourced moderation ensures the registry's accuracy without a central authority.

03

Sybil Resistance & Uniqueness

The core goal is to prevent a single entity from controlling multiple identities (Sybil attacks). By tying one identity to one verified human through video, social proof, and the cost of disputing, PoH creates a scarce, non-transferable credential. This is fundamental for fair distribution mechanisms like Universal Basic Income (UBI) or quadratic voting.

04

Decentralized Identifier (DID)

Upon successful verification, a user receives a cryptographic proof of their unique humanity, often implemented as an ERC-725/735 identity smart contract on Ethereum. This DID can be used across dApps to prove 'liveness' and uniqueness without revealing unnecessary personal data, enabling privacy-preserving applications.

05

UBI Token Distribution

A key utility of the PoH registry is the distribution of a Universal Basic Income token (e.g., UBI on xDai/Gnosis Chain). Verified humans receive a continuous, equal stream of tokens, creating a permissionless, global basic income system funded by community donations and protocol mechanisms.

06

Governance & Reputation

A verified human identity can serve as a governance primitive. Because it's Sybil-resistant, it can be used for one-person-one-vote systems in DAOs or for weighting community signals. The act of vouching and participating in disputes builds a user's reputation within the ecosystem.

primary-use-cases
PROOF-OF-HUMANITY

Primary Use Cases

Proof-of-Humanity (PoH) is a Sybil-resistance mechanism that cryptographically verifies unique human identity, enabling applications that require one-person-one-vote or one-person-one-wallet guarantees.

02

Decentralized Governance (1P1V)

PoH secures decentralized autonomous organization (DAO) voting by implementing a one-person-one-vote (1P1V) model instead of one-token-one-vote. This prevents wealthy token holders from dominating governance and aligns decision-making with human stakeholders rather than capital. It's critical for plural funding and community-driven proposals where equitable voice is paramount.

03

Sybil-Resistant Social Networks

Social media and content platforms use PoH to combat bots, spam, and coordinated disinformation campaigns. By requiring verified human identity for participation, platforms can foster higher-quality discourse and authentic community engagement. This underpins the vision for decentralized social graphs and user-owned social networks where reputation is tied to a proven human identity.

04

Fair Launch & Token Distribution

In initial coin offerings (ICOs) or token generation events (TGEs), PoH prevents whale domination and bot-driven sniping during public sales. By restricting participation to verified humans, projects can ensure a more decentralized and fair initial distribution of tokens, which is a key factor for long-term network health and security.

05

Anti-Collusion & Fraud Prevention

PoH systems create a barrier against large-scale collusion and fraud in decentralized applications. By making it costly and difficult to create fake identities, they protect mechanisms like quadratic voting, retroactive public goods funding, and bounty programs from being gamed. This is essential for maintaining the integrity of financial and reputational systems.

PROOF-OF-HUMANITY GUIDE

Comparison of Sybil-Resistance Methods

A technical comparison of primary mechanisms used to prevent Sybil attacks in decentralized identity and governance systems.

Mechanism / MetricProof-of-Humanity (PoH)Proof-of-Stake (PoS) IdentitySocial Graph AnalysisCentralized Verification

Core Sybil-Resistance Basis

Unique human verification (e.g., video submission, social vouching)

Economic stake (bonded capital)

Web-of-trust and connection analysis

Trusted third-party KYC/AML

Decentralization Level

Semi-decentralized (consensus on verification)

Fully decentralized (consensus-native)

Semi-decentralized (graph-based)

Centralized

Identity Uniqueness Guarantee

High (1 person = 1 identity)

None (1 entity = N identities)

Probabilistic (based on graph density)

High (1 legal entity = 1 identity)

Initial Cost to Acquire Identity

$0-100 (gas + potential deposit)

$1000 (stake requirement)

$0 (protocol-native)

$10-50 (verification fee)

Resistance to Automated Bots

High

Low (bots can hold stake)

Medium

High

Censorship Resistance

Medium (subject to governance)

High

Medium

Low

Primary Use Case

Universal basic income, democratic governance

Validator selection, protocol governance

DeFi sybil-resistant airdrops, reputation

Regulated DeFi, institutional access

ecosystem-usage
PROOF-OF-HUMANITY

Ecosystem Usage & Implementations

Proof-of-Humanity (PoH) is a Sybil-resistance mechanism that uses social verification and identity attestations to create a registry of unique humans for decentralized applications.

01

Universal Basic Income (UBI)

A primary application of Proof-of-Humanity is the distribution of a Universal Basic Income (UBI) token. Verified humans on the registry receive a regular, unconditional stream of currency, funded by a continuous token mint. This creates a crypto-native social safety net and explores economic models where identity, not capital, is the basis for distribution.

  • Example: The Proof of Humanity protocol on Ethereum issues UBI tokens to registered participants.
02

Sybil-Resistant Governance

PoH registries provide a foundational layer for one-person-one-vote governance systems in DAOs and protocols. By linking a single verified identity to a wallet, it prevents Sybil attacks where a single entity creates multiple fake identities to manipulate votes. This enables more democratic and legitimate quadratic funding and token-curated registries.

  • Key Benefit: Replaces capital-weighted (token-based) voting with human-weighted voting for specific community decisions.
03

Social Recovery & Wallet Security

Proof-of-Humanity enables social recovery mechanisms for smart contract wallets (like Safe). Instead of relying on a single seed phrase, users can designate verified humans from their trusted network as guardians. These guardians can collectively help recover access to a wallet if keys are lost, creating a more resilient and user-owned security model.

  • Mechanism: Integrates with EIP-4337 (Account Abstraction) to allow recovery via multi-sig approvals from verified identities.
04

Airdrops & Fair Launches

Projects use PoH registries to conduct fair airdrops and community distributions that target unique individuals rather than wallets. This mitigates sybil farming where bots or whales create thousands of addresses to hoard tokens. Eligibility is based on proven humanness, ensuring a broader, more equitable distribution of new tokens to a genuine user base.

05

Decentralized Identity (DID) Foundation

A verified PoH profile acts as a core Decentralized Identifier (DID). This reusable, sovereign identity can be linked to verifiable credentials for KYC, professional attestations, or reputation scores across different dApps. It creates a user-controlled alternative to centralized identity providers, forming the bedrock of a web3 social graph.

  • Standard: Often implements W3C Decentralized Identifier standards.
security-considerations
PROOF-OF-HUMANITY

Security & Trust Considerations

Proof-of-Humanity (PoH) is a Sybil resistance mechanism that uses social verification to establish unique human identity on-chain, enabling fair distribution and governance. This section details its core security assumptions, attack vectors, and trust models.

01

Sybil Resistance Core

The primary security goal of PoH is Sybil resistance, preventing a single entity from creating multiple fraudulent identities. It achieves this by linking a unique on-chain identity (like a profile or token) to a verified off-chain human through methods such as:

  • Video verification and biometric liveness checks.
  • Social graph vouching from existing trusted members.
  • Government ID submission (often via zero-knowledge proofs for privacy). This creates a cost (social, reputational, or procedural) to identity creation that is prohibitive for large-scale attacks.
02

Centralization & Censorship Risks

PoH systems often introduce trusted third parties or centralized arbiters, creating potential attack vectors:

  • Verifier Centralization: A single entity (e.g., the verification provider) can become a bottleneck or censor.
  • Governance Attacks: Control over the registry's upgrade mechanism could allow malicious changes to verification rules.
  • Legal Coercion: Verifiers may be compelled by legal jurisdictions to deactivate specific identities. Decentralized or community-governed verification processes are used to mitigate these risks.
03

Identity Theft & Fraud

PoH registries are targets for identity theft and submission fraud. Key vulnerabilities include:

  • Deepfakes & Spoofing: Using AI-generated media to bypass video verification.
  • Document Forgery: Submitting falsified government IDs.
  • Vouching Collusion: Groups conspiring to vouch for fake profiles. Countermeasures involve multi-modal verification, time delays, stake-based slashing for false vouches, and continuous monitoring for duplicate biometric data.
04

Privacy & Data Leakage

Verification requires submitting sensitive personal data (video, ID documents). The security of this data is paramount.

  • On-Chain Exposure: Storing raw data on-chain is highly risky. Solutions use hash commitments or zero-knowledge proofs (ZKPs) to prove verification without revealing underlying data.
  • Verifier Trust: Users must trust the verification entity not to misuse or leak their biometric data. Decentralized Identifiers (DIDs) and self-sovereign identity models aim to return control to the user.
05

Economic & Game-Theoretic Security

PoH systems often incorporate economic stakes to secure the registry.

  • Staked Deposits: Users lock collateral (e.g., ETH) that can be slashed if they are found to be fraudulent or act maliciously.
  • Challenge Periods: New registrations enter a challenge period where anyone can dispute them by putting up a stake, triggering a decentralized dispute resolution (e.g., Kleros court).
  • Exit Costs: The time and cost to create a new identity acts as a deterrent against cheap, disposable Sybils.
PROOF-OF-HUMANITY

Common Misconceptions

Proof-of-Humanity (PoH) is a Sybil-resistant identity verification system, but its mechanisms and guarantees are often misunderstood. This section clarifies the most frequent points of confusion.

No, Proof-of-Humanity is not a blockchain consensus mechanism for ordering transactions. It is a Sybil resistance protocol that creates a registry of verified, unique humans. While consensus mechanisms like Proof-of-Work (PoW) or Proof-of-Stake (PoS) secure the ledger's state, PoH provides a foundational social layer of verified identity. It is often used to allocate resources (like voting power or airdrops) in a one-person-one-vote model, preventing a single entity from creating thousands of fake accounts to game the system.

PROOF-OF-HUMANITY

Technical Details

Proof-of-Humanity (PoH) is a decentralized identity verification protocol designed to establish unique human identities on a blockchain, primarily to combat Sybil attacks and enable fair distribution of resources.

Proof-of-Humanity (PoH) is a Sybil-resistant identity verification system that registers unique humans on the Ethereum blockchain through a combination of video submission, social verification, and a challenge period. A user submits a short video of themselves, a profile, and deposits a stake. Registered members of the system then vouch for or challenge the submission's authenticity. If a submission passes a successful challenge period without being proven fraudulent, the applicant is added to the on-chain registry, granting them a unique, soulbound identifier used to prove their humanity in other applications.

PROOF-OF-HUMANITY

Frequently Asked Questions

Proof-of-Humanity (PoH) is a Sybil-resistant identity verification system that uses social verification and video submissions to create a registry of unique human participants on the blockchain. It is a foundational component of decentralized identity and governance.

Proof-of-Humanity (PoH) is a decentralized identity verification protocol that uses a combination of social verification and video submissions to create a Sybil-resistant registry of unique human beings. The process involves a user submitting a video of themselves, a deposit, and a request for registration. Existing, verified members of the registry (called "vouchers") can vouch for the applicant. The submission then enters a challenge period where any other user can dispute its validity by submitting a deposit. If no valid dispute is raised, the applicant is added to the on-chain registry and receives a unique identifier, proving they are a verified human. This mechanism prevents a single entity from creating multiple fake identities (Sybil attacks).

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Proof-of-Humanity: Definition & Sybil Resistance | ChainScore Glossary