Crypto needs a way to prevent hackers and bad actors (like North Korea’s Lazarus group bad) from using privacy protocols to funnel stolen funds without compromising privacy for everybody else. This article provides an overview of how Zeronym’s Clean Hands verification solves this long-standing chall
“Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know. Privacy is the power to selectively reveal oneself to the world.” – Cyph
Zeronym is a zero knowledge identity verification protocol developed by Holonym Foundation. It provides privacy-preserving proof of personhood, biome...
There is no free lunch, unless maybe you are a Sybil. [sic]” — M.F. As long as free money is on the table, there will always be sophisticated actors ...
Learn about how ZKPs are securing sensitive user data against hackers, AI, and other bad actors. This introduction is part of a series to explain what ZKPs are and how you can use them.
Building things is so much more fun when you’re in the same room with other developers. That’s why blockchain conferences are such havens for hackath...
Dear Holonym Community,The first quarter of 2024 was bigger than ever us! More than 80 percent of our total users joined by the end of Q1, indicating...
Announcing Mishti Network, the first personhood AVS for private key derivation using biometrics, rate limiting nullifiers, and programmable privacy for compliance.
Crypto as a coordination mechanismThe network state could soon move from a concept stage to mainstream adoption, given the increasing options for tok...