01 / Binary gate
Use a simple human-or-bot rule when speed matters most.
Good for signup throttling, access control, and spam reduction where you just need a pass/fail decision.
Get API Keys
Enter your email and we’ll send you a secure Firebase sign-in link.
Secure Email Link
Open the sign-in link we sent to your email to finish in this browser.
Finish Sign-In
This sign-in link was opened in a different browser or device. Re-enter the email address that requested it to finish securely.
Proof-of-humanity infrastructure
One SDK for developers who need to stop bots and sybil attackers without forcing every user through invasive KYC.
Meta-protocol input
World • Humanity Passport • BrightID • Gitcoin • moreHeadlines
One integration surface
IAH acts like a normalization layer for proof-of-humanity protocols. Instead of wiring protocol after protocol into your app, you integrate once and choose the human signals that matter for your product.
Open the full signal catalogSignal Catalog
Mix lightweight trust inputs like GitHub, Discord, wallets, phone, and email with stronger personhood signals like World, Gitcoin Passport, Humanity Passport, BrightID, and GoodDollar.
View every signalSocial & identity
GitHub Google X Discord Instagram Telegram EmailWallets & POH
EVM wallet Solana wallet World Gitcoin Passport Humanity Passport BrightID GoodDollarBeyond binary checks
01 / Binary gate
Good for signup throttling, access control, and spam reduction where you just need a pass/fail decision.
02 / Weighted trust
Reward stronger signals, down-rank weak ones, and tune your threshold by product surface, geography, or risk class.
03 / KYC only when necessary
Keep the default experience lightweight, then trigger fully-KYC’d verification only where regulation or fraud pressure truly demands it.
Built for builders
Ship human verification in hours, not quarters. Use IAH to gate signups, govern communities, protect rewards, or score trust across your product.
import { IAHSDK, configureIAHSDK } from "@iah/sdk";
configureIAHSDK({
baseUrl: "https://passport.cubid.me/api/v2",
walletConnectProjectId: "your_project_id",
});
const iah = new IAHSDK("iah_demo", "api_key");
const verdict = await iah.fetchScore({ user_id: user.id });
if (verdict.score >= 72) unlockAccess();
For AI Developers
AI products leak value fast when users burn through the free tier, spin up a new email address, and come right back for more. IAH lets you start conservative, then expand access only for users who show stronger proof of personhood.
That means you stop the bleeding and get something useful in return: a better signal about who your users actually are.
Anonymous signup
Small starter quotaSome personhood signal
More messages, more creditsStrong proof of personhood
Highest trial quota or premium accessPricing
Start with low-friction proof-of-humanity checks, then pay for full KYC only when you intentionally use it.
Human-first infrastructure
IAH gives developers a calmer way to verify personhood: fewer invasive checks, broader protocol coverage, and better control over risk.
See our privacy postureField Guide
The IAH Field Guide
Keep scrolling to see a working atlas of I-am-Human: use cases, signals, integration notes, privacy posture, process, comparisons, and proof points, all right here in one continuous document.
Signal layers resolving into one human-readable trust surface.
Use Cases
IAH works best where abuse compounds: rewards, reputation, governance, rate limits, and allocation systems. The point is not to identify everyone. The point is to make low-trust surfaces expensive to fake and high-trust users easier to reward.
Gaming
Gaming economies suffer when smurfs, bots, and farming rings can create fresh identities faster than your game can build trust. IAH gives studios a way to start every player with a light allowance and progressively unlock ranked ladders, withdrawals, tournaments, or quest rewards as proof signals strengthen.
Voting
Token balances and wallet counts do not tell you whether the same operator controls fifty votes. IAH lets communities layer personhood checks on top of onchain governance so "one member, one meaningful voice" becomes enforceable without requiring full KYC for every participant.
AI apps
If your free tier is only protected by email, your real pricing model is "how many aliases can someone create." With IAH, apps can start everyone with a little, then unlock more messages, generations, credits, or API calls as users present stronger personhood signals.
Airdrops
Airdrop mechanics attract swarms of throwaway accounts. IAH helps projects shape eligibility around composite human scores rather than a single brittle proof source, so distribution can stay open while the cost of sybil behavior rises sharply.
Microlending
Microlending breaks when the same actor can default, re-register, and repeat. IAH lets lenders calibrate risk tiers around signal quality so smaller first loans remain accessible while abuse patterns trigger additional review or stronger verification.
Learn-2-earn / x-to-earn
Educational programs, quest systems, and other earned-reward products need reach, but reach alone invites abuse. IAH lets operators make completion rewards depend on progressively stronger trust signals, not just click-through behavior.
Social media
Moderation systems usually react to behavior after spam has already spread. IAH gives social products a front-door trust signal they can combine with behavioral data for rate limits, verification tiers, creator programs, or monetization access.
UBI
UBI-style systems cannot tolerate one operator claiming many times. IAH helps programs mix stronger personhood protocols with lighter social and contact signals, giving operators a flexible trust threshold rather than a single all-or-nothing rule.
ICOs
Token sales and waitlists are especially vulnerable to sybil clustering. IAH lets projects mix region rules, proof-of-humanity signals, and selective KYC escalation so allocations become more resistant to wallet splitting and repeated registration.
Signals
The value of IAH is not one magical source. It is the ability to combine multiple signals, keep pace with protocol changes, and tune the right level of friction for the job.
Available now
GitHub, Google, X, Discord, Lens, Fractal, EVM wallet, Solana wallet, World, Farcaster, Gitcoin Passport, Humanity Passport, Instagram, phone, Telegram, GoodDollar, BrightID, and email.
These span social graph, direct contact, wallets, and personhood-native protocols so apps can mix lighter and stronger evidence in one trust model.
Available on request
Stripe, PayPal, Wise, Revolut, credit card, LinkedIn, DNS, Persona, Onfido, Sumsub, Snapshot, ENS, Steam, Airbnb, Uber, Circles, Polkadot Unique ID, and Humanode.
The catalog is meant to grow with the product. If a trust source matters to your workflow, the integration surface should not have to be rebuilt from zero.
Composition
Different apps care about different failure modes. Some only need "not obviously a bot." Others need a much stronger guess that one account maps to one human. IAH is designed for this spread.
About
IAH exists because proof-of-humanity is too fragmented for most teams to integrate directly. We are building the connective layer, the scoring surface, and the operator tooling around that fragmented ecosystem.
Team
The team sits at the intersection of developer tooling, crypto identity, fraud systems, and product operations. That mix matters because proof-of-humanity is not just a protocol problem. It is a developer-experience and policy problem too.
IAH is structured to be legible to founders and usable by engineering teams, not just identity researchers.
History
Most proof-of-humanity tools ask products to choose one protocol and inherit its assumptions. Real products usually need a more adaptive model: multiple signals, risk-specific thresholds, and the ability to escalate only when it is worth the friction.
IAH began as that missing layer: not another standalone proof system, but a meta-protocol for working with many of them.
FAQ
The most common confusion is whether IAH is a single proof protocol. It is not. It is the infrastructure layer that lets teams work with many proof sources without rebuilding the stack every quarter.
Developer FAQ
No. The point of IAH is that you can start with several and change weighting later.
Yes. Many teams begin with pass/fail and graduate to scoring once they see abuse patterns.
Yes. Selective escalation is one of the core operating models.
User FAQ
Not by default. Apps can ask for lighter signals and only escalate where their policy requires it.
Yes. Apps choose what they require, but users still control what they connect or disclose.
IAH is designed to make scoped asks possible, so apps can request a threshold or category rather than raw identity by default.
Operations FAQ
Conflicts should usually reduce confidence, not automatically trigger a hard block.
Yes. Greylisting exists for exactly that operational middle zone.
Because IAH is multi-source, teams can adapt weighting instead of rebuilding their whole trust stack.
How To Work With Us
The fastest path is usually not "connect every signal." It is scoping your abuse problem, selecting the minimum viable trust model, and running a controlled rollout before turning every dial.
Discovery
We map what is being abused, what the unit economics are, and which actions really need stronger proof. That usually reveals where lightweight signals are enough and where escalation needs to exist from day one.
Pilot
Most teams begin with one or two product surfaces: signup, reward claim, withdrawals, or free-tier expansion. That keeps the signal model legible and lets the team tune thresholds with evidence instead of intuition.
Production
Once the pilot is stable, teams usually add more signals, formal whitelisting and greylisting rules, and stronger audit trails for support and compliance-sensitive decisions.
SDK How To
The SDK is designed to be boring in the best sense: configure the service once, request the checks you need, and keep the backend defaults unless you have a reason to override them.
Install
npm install @iah/sdk
import { IAHSDK, configureIAHSDK } from "@iah/sdk";
configureIAHSDK({
baseUrl: "https://passport.cubid.me/api/v2",
apiRootUrl: "https://passport.cubid.me/api",
walletConnectProjectId: "your_project_id",
});
const iah = new IAHSDK("dapp_id", "api_key");
Tweak behavior
Major tuning surfaces include backend URLs, provider project IDs, created-by app IDs, wallet settings, and the thresholds or escalations your application applies to returned scores.
Major options
Teams typically expose three modes in product logic: a low-friction human gate, a richer cumulative score, and an escalation path for cases where regulation or fraud severity justifies stronger proof.
The IAH Algorithm
IAH does not claim a perfect oracle for humanness. It combines heterogeneous signals, weighs them by usefulness, and routes users into allow, grey, or block states based on the product’s policy.
Sybil resistance
The algorithm should be read as a cost shaper. Weak identities get less access, more scrutiny, or smaller limits. Stronger identities unlock more of the product. Suspicious overlaps are slowed down before damage compounds.
Whitelisting, greylisting, blacklisting
Most systems fail when they collapse everything into allow or deny. The grey zone is where operational intelligence lives.
User Privacy
Privacy is not only a legal posture here. It is part of the product philosophy. Many apps do not need raw identity. They need a scoped answer or a score.
What we collect
The system may collect connected social, wallet, or contact proofs, metadata needed to verify them, and operational evidence tied to scoring or review. The goal is to store what is necessary to support the chosen trust model, not everything that could be asked.
What we share
Apps should be able to request a score, a threshold result, or a category of trust instead of full raw identity by default. That keeps the data surface smaller and makes proportionality possible.
What users control
Users should be able to decide whether they want to stay at a lighter trust tier or connect stronger evidence for more access. That makes trust a negotiable product surface instead of a hidden extraction mechanism.
What apps can ask for
Good policy matches proof strength to risk. Low-value actions can often run on lighter signals. High-value payouts, regulated flows, or governance-critical actions may justify stronger requests.
Compare Us
The key distinction is orchestration. We are the layer that lets product teams consume, score, and evolve trust across multiple personhood inputs instead of betting everything on one protocol’s worldview.
IAH vs Humanode
Humanode offers one proof path with its own assumptions and strengths. IAH is useful when a product wants to work with Humanode-like signals alongside other sources and tune policy at the application layer.
IAH vs Idena
If a product loves Idena, it can use it. If it also needs social, wallet, or regulated verification inputs, IAH provides the surface for combining those without rebuilding the trust stack.
IAH vs BrightID
Products rarely stop needing policy once proof is available. They still need thresholds, escalation, allowlists, reviews, and the ability to compare multiple sources over time.
IAH vs any single protocol
Single-protocol strategies are clean until your product needs a different region rule, trust tier, or fallback source. IAH is designed so your product policy can evolve without a full rewrite.
Case Studies
These scenarios are illustrative, but grounded in the kinds of product problems teams bring to us: repeated signups, reward farming, governance manipulation, and low-trust monetization.
Case study / Arcade Orbit
The studio kept casual play open, but tied tournament rewards and rare drops to a blended score using wallets, social accounts, and personhood protocols. Reward abuse dropped while onboarding stayed soft for new players.
Case study / Civic Loop
Rather than rejecting suspicious voters outright, the community routed them into a review lane. That cut false-positive anger and still prevented obvious duplicate clusters from affecting the vote.
Case study / Model Harbor
Anonymous users received a tiny free quota. Users with stronger proof got larger trial pools and faster queues. Credit leakage dropped, and the team learned which trust signals actually mapped to long-term paid conversion.
Reviews
These are representative voices from the kinds of builders IAH is meant for: founders, product leads, and developers dealing with real abuse pressure.
Founder / AI infra
Before IAH, abuse policy was basically guesswork. After rollout, we had a real ladder for allocating quota and a much better read on which users were actually worth extending.
Product lead / governance
Most tools only gave us yes or no. The middle zone let us act like operators instead of bouncers.
CTO / incentives platform
We did not want to own five protocol integrations and their policy changes forever. IAH let us stay focused on the product.
Operations / community app
Once we had whitelists, greylists, and explicit escalation rules, both teams could reason about edge cases the same way.
Proof-of-humanity infrastructure
One SDK for developers who need to stop bots and sybil attackers without forcing every user through invasive KYC.
Meta-protocol input
World • Humanity Passport • BrightID • Gitcoin • more