Web3 Identity Primer: From Wallets to Humans

Web3 Identity Primer: From Wallets to Humans

Web3 Identity Primer: From Wallets to Humans

Feb 2, 2026

The Problem: Why Wallets Aren't Enough

Web3 was built on a simple premise: your wallet is your identity. But this creates a fundamental vulnerability: wallets are cheap to create, and humans are not.

What this means in practice:

  • One person can control hundreds or thousands of wallets

  • Incentive programs attract industrial-scale farming operations

  • Governance votes can be bought through Sybil attacks (creating multiple fake identities)

  • Community metrics become meaningless when you can't distinguish real users from bot swarms

The core challenge: How do you verify someone is a unique human without forcing them to doxx themselves?

The Three Approaches to Web3 Identity

There isn't one "right" way to prove you're human. Different use cases need different tradeoffs between privacy, friction, and certainty. Here, ‘identity’ does not mean a fixed real-world identity. It means the minimum signals needed to answer a specific coordination question.

1. Behavioral Signals (What You Do)

Analyze onchain activity patterns to distinguish real humans from coordinated farms.

How it works:

  • Machine learning models evaluate wallet transaction history

  • Patterns like transaction timing, gas usage, and interaction diversity indicate human vs. bot behavior

  • Multiple wallets showing identical behavior patterns get flagged as potential Sybils

Tradeoffs:

  • ✅ Zero user friction–works in the background

  • ✅ Privacy-preserving–no personal data required

  • ❌ New users with minimal onchain history can't be verified

  • ❌ Sophisticated attackers can mimic human patterns

When to use: Pre-filtering large wallet lists, passive screening, or as a first layer before requiring active verification.

Example: Human Passport's Model-Based Detection scores any EVM address for Sybil risk without requiring the user to do anything.

2. Activity-Based Credentials (What You've Proven)

Collect verifiable credentials from various platforms to build up a "humanity score."

How it works:

  • Users voluntarily connect accounts (social media, verified credentials, onchain activities)

  • Each verified activity earns a "Stamp" with a weight

  • Stamps are stored as verifiable credentials, proof that you completed the activity without revealing personal details

  • Projects set threshold scores (e.g., "need 20+ points to participate")

Tradeoffs:

  • ✅ Highly flexible–users choose how to prove humanity

  • ✅ Composable–stamps work across multiple apps

  • ✅ Privacy-friendly–prove you did something without revealing who you are

  • ❌ Requires user action and some friction

  • ❌ Different stamps have different levels of Sybil resistance

When to use: Airdrops, governance, community access, any scenario where you need moderate-to-high confidence and can ask users to take a few verification steps.

Example: Human Passport's Stamp system lets users choose from 50+ verification methods across government ID, social accounts, web3 activity, and biometrics, combining whichever they're comfortable with.

3. Direct Identity Verification (Who You Actually Are)

Zero-knowledge proofs of real-world identity attributes without revealing the underlying data.

How it works:

  • KYC providers or government systems verify your identity

  • Zero-knowledge cryptography creates a proof (e.g., "this person passed KYC" or "this person is over 18")

  • The proof is verifiable onchain without exposing your name, ID number, or any personal details

Tradeoffs:

  • ✅ Highest certainty–hardest for Sybils to fake

  • ✅ Can prove compliance (sanctions screening, age, jurisdiction) privately

  • ❌ Requires trusted verification partners

  • ❌ Higher friction–users must complete KYC or ID verification

  • ❌ Excludes people without government IDs or access to verification services

When to use: High-value scenarios (large airdrops, DeFi compliance, governance rights distribution), or when regulatory requirements demand it.

Example: Human ID enables phone verification, ID document checks, and sanctions screening ("Proof of Clean Hands") using zero-knowledge proofs–you prove compliance without exposing personal data.

The Privacy vs. Certainty Spectrum

Every identity solution sits somewhere on this spectrum:

More Privacy  ←―――――――――――――――――――――→  More Certainty

Lower Friction ←―――――――――――――――――――――→ Higher Friction

[Behavioral ML] → [Activity Stamps] → [ZK Identity Verification]

The key insight: You don't need maximum certainty for every use case. Match your verification requirements to your risk tolerance.

  • Low risk (testnet faucet): Behavioral signals alone might suffice

  • Medium risk (community governance): Require a moderate Stamp score

  • High risk ($100M airdrop): Combine multiple methods: behavioral screening + Stamps + optional ZK verification for edge cases

How Human Passport Combines All Three

Rather than forcing a single approach, Human Passport offers a modular toolkit:

For users with zero friction:

  • Model-Based Detection runs in the background, scoring wallets based on onchain behavior

  • No action required, works immediately

For users in need to verify:

  • Stamps let you choose how to prove humanity: connect social accounts, verify onchain activity, complete biometrics, or pass a government ID check

  • Each stamp adds to your Unique Humanity Score

  • Your choice what to share = build the score your way

For high-assurance cases:

  • Human ID (by human.tech) provides real-time phone/document verification with zero-knowledge proofs

  • Proof of Clean Hands checks sanctions lists without storing personal data

  • Compliance without surveillance

For builders:

  • Access all this via simple APIs or smart contracts

  • Set custom thresholds, create branded verification flows, or embed verification directly in your app

  • Combine methods based on your needs

Real-World Design Decisions

When implementing humanity verification, you'll face these practical questions:

What threshold should you set?

  • Too low: Sybils get through

  • Too high: You exclude legitimate new users

  • Best practice: Start with proven defaults (Human Passport uses 20+ for most cases), then adjust based on your community's feedback and attack patterns

Should verification be required or optional?

  • Required: Maximum protection, but you'll lose some users

  • Optional with incentives: Better for community buy-in ("verified users get 2x rewards")

  • Tiered access: Different features unlock at different verification levels

Onchain or offchain verification?

  • Offchain (API): Flexible, easy to update, works cross-chain

  • Onchain (smart contracts): Composable with other protocols, trustless verification, but less flexible

  • Many projects use both: check offchain for eligibility, then push proof onchain for distribution

How do you handle appeals?

  • False positives happen, real users may get flagged as Sybils

  • Build in an appeals process with human review for edge cases

  • Transparency about the criteria builds trust

The Five Properties of Good Identity

Based on years of defending Gitcoin Grants and securing $512M+ in capital flows, effective web3 identity systems share these characteristics:

  1. Pluralistic – Multiple ways to prove humanity (not everyone has a government ID, smartphone, or extensive onchain history)

  2. Minimal disclosure – Prove eligibility without revealing who you are (zero-knowledge proofs are key)

  3. Reusable – Verify once, use everywhere (your Human Passport works across all integrated apps)

  4. Composable – Identity fits into existing flows (APIs, smart contracts, embeddable components)

  5. Adversarially designed – Built assuming attackers will try to game it (because they will)

What to Avoid: Common Anti-Patterns

❌ Single point of failure

Relying on one verification method means one exploit breaks everything. Worldcoin's iris scanning is powerful but creates a centralized chokepoint.

❌ Retroactive filtering without transparency

Surprising users with opaque exclusions after they've participated destroys trust. Publish eligibility criteria upfront.

❌ Identity as an afterthought

Trying to filter Sybils after your airdrop is announced is late. Build verification into your design from day one for better results.

❌ Privacy theater

Claiming to be "privacy-preserving" while collecting unnecessary data. If you don't need the data, don't collect it. It becomes a liability.

Three Practical Examples

Example 1: Airdrop Protection

Goal: Distribute tokens to real community members, not farming operations

Approach:

  1. Run Model-Based Detection on all eligible wallets (passive screening)

  2. Flag wallets below a certainty threshold

  3. Require flagged users to verify Stamps if they want to claim

  4. Set claim threshold at 20+ Unique Humanity Score

  5. Publish appeals process for false positives. Be prepared to reject still, as Sybils will try to fool you.

Result: Story Protocol protected $98M this way, filtering out industrial farms while maintaining high completion rates among real users. Tip: start verification early, at testnet, continue to mainnet. That worked very well for Story.

Example 2: L2 Governance Protection

Goal: Ensure Optimism's Citizens' House represents real humans, not Sybil attackers

Approach:

  1. Required Human Passport verification for all 4,205 badgeholders

  2. Verification integrated into governance participation flow

  3. Badgeholders choose verification methods that fit their privacy preferences

Result: Optimism's retroactive public goods funding protected from manipulation while maintaining decentralized governance principles

Example 3: Proof of Clean Hands

Goal: Distribute tokens compliantly, without collecting personal data

How Ika used it:

  1. User connects wallet and checks airdrop eligibility

  2. Eligible users verify via Human ID (ZK-based KYC + sanctions screening against OFAC, EU, FATF, Interpol, etc.)

  3. Upon passing, user mints a Proof of Clean Hands SBT on Sui

  4. User returns to Ika portal and claims airdrop; no personal data exposed

Result: Ika blocked sanctioned entities and restricted jurisdictions while preserving privacy for legitimate users. No honeypot or backdoor ~ just cryptographic compliance.

Where Identity Is Heading

Expect these trends over the next 6–12 months:

  • Embedded verification flows – Stamp collection integrated directly into apps, no redirects

  • Multi-layered strategies – Combining behavioral ML + Stamps + optional ZK verification (Human ID) based on risk level

  • Interoperable credentials – Your verified stamps work across ecosystems

  • AI agent identity – Distinguishing human users from autonomous agents (and verifying who an agent acts on behalf of) is an emerging challenge the industry is still solving

  • Regulatory convergence – EU Digital Identity Wallets and similar frameworks will set expectations for reusable, portable credentials

Getting Started: Next Steps by Role

If you're launching an airdrop:

  1. Start with Human Passport's Model-Based Detection to pre-filter your wallet list

  2. Set a Stamp threshold (20+ is standard), decide between Passport App or Embed

  3. Publish the eligibility criteria before announcing the drop

  4. Build an appeals process for edge cases

  5. Request Data Services analysis for already existing wallet lists from different sources before distribution

If you're building a protocol:

  1. Read the technical docs to understand integration options

  2. Decide which verification tier fits your risk model

  3. Consider embedding Stamps directly in your onboarding flow (Passport Embed is perfect for it) or use one of the community tools integrating Passport in the background

If you're designing governance:

  1. Use Onchain Passport verification for trustless voting

  2. Set different score thresholds for different governance actions

  3. Make verification optional but incentivized to avoid excluding early community members

If you're evaluating solutions:

  • Human Passport is modular, meaning you can start with one tool and add others as you scale

  • Over 120 projects have integrated it across airdrops, grants, governance, and community tools

  • The same system defending Gitcoin Grants is available via simple APIs or directly through smart contracts

The Bottom Line

Identity in web3 isn't about KYC or surveillance. It's about answering one question at scale:

"Who is this system for?"

If the answer is "humans," then you need infrastructure to distinguish real participants from industrial farming operations and duplicate identities.

The good news: you can do this while preserving privacy, user choice, and decentralization. The tools exist. The tradeoffs are well understood. The question is whether you build identity into your product now–or retrofit it later after the Sybils show up.

Ready to build Sybil-resistant infrastructure?

The age of pretending wallets are people is ending. Identity is the new coordination primitive.

Subscribe to our newsletter

Subscribe to our newsletter

Subscribe to our newsletter

Proof of Personhood

© 2025 Human Passport part of human.tech.
All rights reserved.

Proof of Personhood

© 2025 Human Passport part of human.tech.
All rights reserved.

Proof of Personhood

© 2025 Human Passport part of human.tech.
All rights reserved.

Proof of Personhood

© 2025 Human Passport part of human.tech.
All rights reserved.