XHS Adaptive PoH

Adaptive Proof of Humanity is broken down into four key areas, which we explore below, starting with deduplication.

Deduplicaiton

Deduplicaiton refers to the process of ensuring that each individual is uniquely represented within the system, preventing duplicate entries or identities. This is crucial for maintaining the integrity and trustworthiness of the protocol.

Here's how deduplication works in this context

  1. Identity Verification: When an individual registers for an adaptive proof of humanity on XSTAR, their identity is verified through three main methods; biometric data, social media account analysis and in person meetups.

  2. Cross-Referencing: XSTAR cross-references new registrations with existing records to detect and eliminate duplicates. This involves checking for matching or similar information across different data points.

  3. Algorithmic Checks: Provided by our third party issuers ‘Regula & Facetec’, five advanced algorithms are used to identify patterns and anomalies that may indicate duplicate identities.

  4. Face Liveness Detection: Uses unique session parameters to prevent tampering and detects attacks like printed photos, masks, and screen replays.

  5. Image Quality Assessment: Validates photos against standards to ensure high-quality images for verification.

  6. Real Age Verification: Utilizes neural networks to accurately predict age ranges.

  7. Facial Attribute Evaluation: Identifies attributes like masks, glasses, and head coverings.

  8. Enhanced Face Identification: Improves face search and verification in databases for reliable identity checks.

By implementing deduplication, proof of humanity protocols can ensure that each person is represented only once with a failure rate above 1 in 124 million (Facetec), thereby enhancing the reliability of the system, preventing fraud, and maintaining the protocol's overall credibility.

Understanding the importance of Authentication

To make proof of humanity credentials effective, it is crucial to ensure that these credentials cannot be easily transferred to others, such as bots, to prevent fraud. This is especially important to protect individuals who may not fully understand the repercussions of selling their credentials. This challenge is inherent in all identity systems. Effective authentication can thwart fraudsters from using credentials, even if the user is unaware or attempts to collude with them.

When issuing proof of humanity, issuers only need to confirm that the individual is unique, without requiring additional personal information. However, each proof of humanity credential must be uniquely tied to its owner. Even if the credentials themselves are non-transferable, the devices they are stored on, like wallets and phones, can be transferred. Therefore, for high-integrity applications, it is essential to authenticate the user as the rightful owner of the proof of humanity credential, preventing unauthorized use. This is similar to the process followed during airline boarding, where a gate assistant verifies both the possession of a valid travel document and the individual's identity against the document.

Account recovery

Recovery mechanisms are essential in proof of humanity protocols to ensure users can regain access to their digital identities if they lose private keys or devices. Without robust recovery processes, users risk being permanently locked out, which undermines trust and discourages participation. Effective recovery protocols enhance security, protect users, and increase overall system stability and confidence, promoting wider adoption and sustainability of decentralized networks.

To this end their are 3 main areas of recovery, ranging from easiest (User managed backup) to most difficult (Re-issuance) Let's dive into re-Issuance: When regaining access to the original credential through the issuer is not possible or desirable (e.g., due to identity theft), re-issuance offers a solution by invalidating the previous credential and issuing a new one. This process is similar to freezing a credit card and ordering a replacement. Importantly, having a re-issuance mechanism for rotating keys makes it financially unviable to illegitimately acquire someone else’s proof of humanity credentials, as the rightful holder can always recover their credentials and invalidate the compromised ones. However, this mechanism does not protect against all cases of identity transfer, particularly those involving collusion or coercion.

Slashing, expiry & bad behavior control mechanisms

Beyond periodic authentication, the XSTAR protocol implements a robust mechanism to detect and penalize misbehavior. During the operational phases, any actions that compromise the network's integrity—such as submitting invalid proposal types or attempting to execute false transactions—will trigger our scalable XHS (XSTAR Humanity Score) slashing mechanism. This system dynamically adjusts penalties based on the severity and frequency of the violations, ensuring that malicious activities are swiftly and effectively mitigated.

Adding to this, to ensure active participation and accountability, users are required to authenticate their identities every six months. Failure to do so will result in a slash penalty, incentivizing consistent engagement and discouraging complacency.

The XHS score serves as a comprehensive measure of a user's reputation and trustworthiness within the network. Users who engage in fraudulent or disruptive behavior will see their XHS scores significantly reduced, impacting their ability to participate in governance and access certain network features. This not only deters potential bad actors but also upholds the overall security and reliability of the protocol.

To further enhance the system's resilience, the slashing mechanism includes layers of verification and appeals, allowing users to contest penalties in cases of erroneous detection or extenuating circumstances. This balanced approach ensures that genuine users are not unduly penalized while maintaining stringent checks against fraudulent activities.

In summary, our penalty and misbehavior detection framework is designed to foster a secure, reliable, and participatory ecosystem. By enforcing regular authentication and implementing a scalable slashing mechanism for misbehavior, we uphold the highest standards of trust and integrity in our Proof of Humanity protocol.

Last updated