Proof-of-humanity infrastructure

I Am Human i-am-human.app

Verify humans. Not passports.

One SDK for developers who need to stop bots and sybil attackers without forcing every user through invasive KYC.

Meta-protocol input

World • Humanity Passport • BrightID • Gitcoin • more
World 32
Passport 24
GitHub 13
Wallet 18

Headlines

One integration surface

Plug into many proof systems through one clean developer API.

IAH acts like a normalization layer for proof-of-humanity protocols. Instead of wiring protocol after protocol into your app, you integrate once and choose the human signals that matter for your product.

Open the full signal catalog
World Humanity Passport vSelf Idena Civic-style KYC More protocols as they emerge

Signal Catalog

Identity, social, wallet, and proof signals in one place.

Available now 18 signals

Mix lightweight trust inputs like GitHub, Discord, wallets, phone, and email with stronger personhood signals like World, Gitcoin Passport, Humanity Passport, BrightID, and GoodDollar.

View every signal

Social & identity

GitHub Google X Discord Instagram Telegram Email

Wallets & POH

EVM wallet Solana wallet World Gitcoin Passport Humanity Passport BrightID GoodDollar

Beyond binary checks

Set thresholds, blend signals, and decide how human is human enough.

01 / Binary gate

Use a simple human-or-bot rule when speed matters most.

Good for signup throttling, access control, and spam reduction where you just need a pass/fail decision.

02 / Weighted trust

Combine protocol scores into a composite trust model.

Reward stronger signals, down-rank weak ones, and tune your threshold by product surface, geography, or risk class.

03 / KYC only when necessary

Escalate to full identity checks for the highest-risk flows.

Keep the default experience lightweight, then trigger fully-KYC’d verification only where regulation or fraud pressure truly demands it.

See more in the algorithm

Built for builders

The SDK should feel easier than building your own bot stack.

Ship human verification in hours, not quarters. Use IAH to gate signups, govern communities, protect rewards, or score trust across your product.

JavaScript SDK Threshold mode
import { IAHSDK, configureIAHSDK } from "@iah/sdk";

configureIAHSDK({
  baseUrl: "https://passport.cubid.me/api/v2",
  walletConnectProjectId: "your_project_id",
});

const iah = new IAHSDK("iah_demo", "api_key");
const verdict = await iah.fetchScore({ user_id: user.id });

if (verdict.score >= 72) unlockAccess();

For AI Developers

Stop free-credit farming before it eats your model budget.

AI products leak value fast when users burn through the free tier, spin up a new email address, and come right back for more. IAH lets you start conservative, then expand access only for users who show stronger proof of personhood.

That means you stop the bleeding and get something useful in return: a better signal about who your users actually are.

01

Anonymous signup

Small starter quota
Enough to try the product, not enough to drain it.
02

Some personhood signal

More messages, more credits
Increase usage as trust improves.
03

Strong proof of personhood

Highest trial quota or premium access
Reserve the generous path for users who are harder to fake.

Pricing

Cheap to start. Predictable when you scale.

Free up to 10,000 MAUs
$100 / month above that $1.50 per fully KYC’d user

Start with low-friction proof-of-humanity checks, then pay for full KYC only when you intentionally use it.

Human-first infrastructure

Build for real people without treating every user like a suspect.

IAH gives developers a calmer way to verify personhood: fewer invasive checks, broader protocol coverage, and better control over risk.

See our privacy posture

Field Guide

The IAH Field Guide

Let's get into the weeds

Keep scrolling to see a working atlas of I-am-Human: use cases, signals, integration notes, privacy posture, process, comparisons, and proof points, all right here in one continuous document.

Signal layers resolving into one human-readable trust surface.

01

Use Cases

Where one human should count as one human.

IAH works best where abuse compounds: rewards, reputation, governance, rate limits, and allocation systems. The point is not to identify everyone. The point is to make low-trust surfaces expensive to fake and high-trust users easier to reward.

Gaming

Protect progression, matchmaking, and reward loops from burner accounts.

Gaming economies suffer when smurfs, bots, and farming rings can create fresh identities faster than your game can build trust. IAH gives studios a way to start every player with a light allowance and progressively unlock ranked ladders, withdrawals, tournaments, or quest rewards as proof signals strengthen.

  • Gate ranked or tokenized modes behind stronger personhood thresholds.
  • Let casual onboarding stay lightweight for real players.
  • Use different thresholds for chat, rewards, and competition.

Voting

Move beyond wallet voting when you need a cleaner signal of personhood.

Token balances and wallet counts do not tell you whether the same operator controls fifty votes. IAH lets communities layer personhood checks on top of onchain governance so "one member, one meaningful voice" becomes enforceable without requiring full KYC for every participant.

  • Run binary human-gates for elections and grants.
  • Require stronger signals only for high-stakes ballots.
  • Use whitelists and grey lists for fraud review before counting votes.

AI apps

Replace email-based trial limits with quota ladders tied to personhood.

If your free tier is only protected by email, your real pricing model is "how many aliases can someone create." With IAH, apps can start everyone with a little, then unlock more messages, generations, credits, or API calls as users present stronger personhood signals.

  • Stop repeated free-tier drains from recycled inboxes.
  • Reward stronger users instead of punishing everyone equally.
  • Collect useful trust context without jumping straight to KYC.

Airdrops

Make farming harder without excluding legitimate new users.

Airdrop mechanics attract swarms of throwaway accounts. IAH helps projects shape eligibility around composite human scores rather than a single brittle proof source, so distribution can stay open while the cost of sybil behavior rises sharply.

  • Require one or several proof sources instead of just wallet age.
  • Use cumulative scoring for higher-value reward tiers.
  • Escalate to stronger proof only for suspicious clusters.

Microlending

Reduce repeat abuse in systems where small loans must stay cheap to issue.

Microlending breaks when the same actor can default, re-register, and repeat. IAH lets lenders calibrate risk tiers around signal quality so smaller first loans remain accessible while abuse patterns trigger additional review or stronger verification.

  • Start with low-value issuance for weak signals.
  • Increase limits for users with more durable personhood evidence.
  • Route suspicious overlaps into manual or KYC review.

Learn-2-earn / x-to-earn

Keep incentive programs open without making them bot magnets.

Educational programs, quest systems, and other earned-reward products need reach, but reach alone invites abuse. IAH lets operators make completion rewards depend on progressively stronger trust signals, not just click-through behavior.

  • Unlock completion rewards only after human checks clear.
  • Use different thresholds for attendance, submissions, and payouts.
  • Preserve simple onboarding for legitimate first-time users.

Social media

Score trust for accounts, not just content.

Moderation systems usually react to behavior after spam has already spread. IAH gives social products a front-door trust signal they can combine with behavioral data for rate limits, verification tiers, creator programs, or monetization access.

  • Apply lower posting limits to weak or fresh identities.
  • Unlock creator tools as trust rises.
  • Use personhood signals to improve community safety, not just badge users.

UBI

Support recurring distributions where duplicate humans are the core failure mode.

UBI-style systems cannot tolerate one operator claiming many times. IAH helps programs mix stronger personhood protocols with lighter social and contact signals, giving operators a flexible trust threshold rather than a single all-or-nothing rule.

  • Pair recurring claims with durable human signals.
  • Greylist suspicious clusters before funds move.
  • Maintain a documented escalation path to stronger verification.

ICOs

Shape allocations around human uniqueness, not just wallet multiplicity.

Token sales and waitlists are especially vulnerable to sybil clustering. IAH lets projects mix region rules, proof-of-humanity signals, and selective KYC escalation so allocations become more resistant to wallet splitting and repeated registration.

  • Prevent one actor from absorbing outsized retail allocation.
  • Introduce selective KYC only where legal or risk thresholds require it.
  • Keep the majority of the flow lightweight for legitimate participants.
02

Signals

Identity, wallet, social, payment, and personhood inputs under one SDK.

The value of IAH is not one magical source. It is the ability to combine multiple signals, keep pace with protocol changes, and tune the right level of friction for the job.

Available now

Live signals already supported by the IAH stack.

GitHub, Google, X, Discord, Lens, Fractal, EVM wallet, Solana wallet, World, Farcaster, Gitcoin Passport, Humanity Passport, Instagram, phone, Telegram, GoodDollar, BrightID, and email.

These span social graph, direct contact, wallets, and personhood-native protocols so apps can mix lighter and stronger evidence in one trust model.

Available on request

Deeper trust inputs for products with stronger fraud or compliance pressure.

Stripe, PayPal, Wise, Revolut, credit card, LinkedIn, DNS, Persona, Onfido, Sumsub, Snapshot, ENS, Steam, Airbnb, Uber, Circles, Polkadot Unique ID, and Humanode.

The catalog is meant to grow with the product. If a trust source matters to your workflow, the integration surface should not have to be rebuilt from zero.

Composition

Use one strong signal, many weak signals, or a weighted blend.

Different apps care about different failure modes. Some only need "not obviously a bot." Others need a much stronger guess that one account maps to one human. IAH is designed for this spread.

  • Binary mode for fast gating.
  • Threshold mode for weighted scoring.
  • Escalation mode for selective KYC and manual review.
03

About

A dev infrastructure front-end for the human layer of the internet.

IAH exists because proof-of-humanity is too fragmented for most teams to integrate directly. We are building the connective layer, the scoring surface, and the operator tooling around that fragmented ecosystem.

Team

Product, protocol, and trust-systems builders.

The team sits at the intersection of developer tooling, crypto identity, fraud systems, and product operations. That mix matters because proof-of-humanity is not just a protocol problem. It is a developer-experience and policy problem too.

IAH is structured to be legible to founders and usable by engineering teams, not just identity researchers.

History

Born from the gap between existing POH protocols and real product needs.

Most proof-of-humanity tools ask products to choose one protocol and inherit its assumptions. Real products usually need a more adaptive model: multiple signals, risk-specific thresholds, and the ability to escalate only when it is worth the friction.

IAH began as that missing layer: not another standalone proof system, but a meta-protocol for working with many of them.

04

FAQ

Questions from developers, operators, and users.

The most common confusion is whether IAH is a single proof protocol. It is not. It is the infrastructure layer that lets teams work with many proof sources without rebuilding the stack every quarter.

Developer FAQ

How much work is integration and do we need to pick one protocol?

Do we need to choose one proof provider?

No. The point of IAH is that you can start with several and change weighting later.

Can we start with a binary gate?

Yes. Many teams begin with pass/fail and graduate to scoring once they see abuse patterns.

Can we reserve KYC for only a subset of users?

Yes. Selective escalation is one of the core operating models.

User FAQ

What do end users actually see and control?

Do users have to reveal their legal identity?

Not by default. Apps can ask for lighter signals and only escalate where their policy requires it.

Can users refuse certain signals?

Yes. Apps choose what they require, but users still control what they connect or disclose.

Can an app demand more data than it needs?

IAH is designed to make scoped asks possible, so apps can request a threshold or category rather than raw identity by default.

Operations FAQ

How do we handle suspicious users, false positives, and support loops?

What happens when signals conflict?

Conflicts should usually reduce confidence, not automatically trigger a hard block.

Can teams review edge cases manually?

Yes. Greylisting exists for exactly that operational middle zone.

What if one protocol changes policy or availability?

Because IAH is multi-source, teams can adapt weighting instead of rebuilding their whole trust stack.

05

How To Work With Us

Fast discovery, opinionated setup, measurable pilot, then production hardening.

The fastest path is usually not "connect every signal." It is scoping your abuse problem, selecting the minimum viable trust model, and running a controlled rollout before turning every dial.

Discovery

Start with the abuse model, not the integration wishlist.

We map what is being abused, what the unit economics are, and which actions really need stronger proof. That usually reveals where lightweight signals are enough and where escalation needs to exist from day one.

Pilot

Roll out a narrow trust policy, then watch it against real traffic.

Most teams begin with one or two product surfaces: signup, reward claim, withdrawals, or free-tier expansion. That keeps the signal model legible and lets the team tune thresholds with evidence instead of intuition.

Production

Expand coverage, add review paths, and document governance.

Once the pilot is stable, teams usually add more signals, formal whitelisting and greylisting rules, and stronger audit trails for support and compliance-sensitive decisions.

06

SDK How To

Install it, point it at the backend, then tune the trust model.

The SDK is designed to be boring in the best sense: configure the service once, request the checks you need, and keep the backend defaults unless you have a reason to override them.

Install

Drop in the package and initialize the runtime config.

npm install @iah/sdk

import { IAHSDK, configureIAHSDK } from "@iah/sdk";

configureIAHSDK({
  baseUrl: "https://passport.cubid.me/api/v2",
  apiRootUrl: "https://passport.cubid.me/api",
  walletConnectProjectId: "your_project_id",
});

const iah = new IAHSDK("dapp_id", "api_key");

Tweak behavior

Use config and thresholds to match friction to product risk.

Major tuning surfaces include backend URLs, provider project IDs, created-by app IDs, wallet settings, and the thresholds or escalations your application applies to returned scores.

  • Keep defaults if you are using the shared backend as-is.
  • Override provider settings if your app needs its own project IDs.
  • Keep policy outside the SDK where possible so thresholds stay editable.

Major options

Binary checks, weighted scores, and selective escalation.

Teams typically expose three modes in product logic: a low-friction human gate, a richer cumulative score, and an escalation path for cases where regulation or fraud severity justifies stronger proof.

07

The IAH Algorithm

Sybil resistance is a layered scoring and routing problem.

IAH does not claim a perfect oracle for humanness. It combines heterogeneous signals, weighs them by usefulness, and routes users into allow, grey, or block states based on the product’s policy.

Sybil resistance

Increase the cost of faking many users without over-burdening real ones.

The algorithm should be read as a cost shaper. Weak identities get less access, more scrutiny, or smaller limits. Stronger identities unlock more of the product. Suspicious overlaps are slowed down before damage compounds.

Whitelisting, greylisting, blacklisting

Three operating states for real-world trust systems.

  • Whitelist: strong signals or operator-approved identities with broader access.
  • Greylist: conflicting or incomplete signals that need more proof or manual review.
  • Blacklist: repeated abuse, duplicate behavior, or explicit operator blocks.

Most systems fail when they collapse everything into allow or deny. The grey zone is where operational intelligence lives.

08

User Privacy

Collect as little as possible, disclose only what is needed, and keep control with the user where you can.

Privacy is not only a legal posture here. It is part of the product philosophy. Many apps do not need raw identity. They need a scoped answer or a score.

What we collect

Signals, evidence references, and the minimum data needed to produce a trust decision.

The system may collect connected social, wallet, or contact proofs, metadata needed to verify them, and operational evidence tied to scoring or review. The goal is to store what is necessary to support the chosen trust model, not everything that could be asked.

What we share

Prefer scoped outcomes over raw personal data.

Apps should be able to request a score, a threshold result, or a category of trust instead of full raw identity by default. That keeps the data surface smaller and makes proportionality possible.

What users control

Connected proofs, escalation paths, and whether stronger evidence is worth the unlock.

Users should be able to decide whether they want to stay at a lighter trust tier or connect stronger evidence for more access. That makes trust a negotiable product surface instead of a hidden extraction mechanism.

What apps can ask for

Only ask for stronger proof when there is a clear product reason.

Good policy matches proof strength to risk. Low-value actions can often run on lighter signals. High-value payouts, regulated flows, or governance-critical actions may justify stronger requests.

09

Compare Us

IAH is not trying to be the only proof source. It is trying to make many proof sources usable.

The key distinction is orchestration. We are the layer that lets product teams consume, score, and evolve trust across multiple personhood inputs instead of betting everything on one protocol’s worldview.

IAH vs Humanode

Humanode is a protocol. IAH is an aggregation and decision layer.

Humanode offers one proof path with its own assumptions and strengths. IAH is useful when a product wants to work with Humanode-like signals alongside other sources and tune policy at the application layer.

IAH vs Idena

Idena is one signal source. IAH treats it as one part of a broader trust graph.

If a product loves Idena, it can use it. If it also needs social, wallet, or regulated verification inputs, IAH provides the surface for combining those without rebuilding the trust stack.

IAH vs BrightID

BrightID is valuable as a proof layer. IAH is valuable as the operator layer above it.

Products rarely stop needing policy once proof is available. They still need thresholds, escalation, allowlists, reviews, and the ability to compare multiple sources over time.

IAH vs any single protocol

The main difference is adaptability.

Single-protocol strategies are clean until your product needs a different region rule, trust tier, or fallback source. IAH is designed so your product policy can evolve without a full rewrite.

10

Case Studies

Examples of how this system looks when it is actually used.

These scenarios are illustrative, but grounded in the kinds of product problems teams bring to us: repeated signups, reward farming, governance manipulation, and low-trust monetization.

Case study / Arcade Orbit

An onchain game cut quest farming by moving rare rewards behind composite human thresholds.

The studio kept casual play open, but tied tournament rewards and rare drops to a blended score using wallets, social accounts, and personhood protocols. Reward abuse dropped while onboarding stayed soft for new players.

Case study / Civic Loop

A community election used greylisting instead of hard denial to keep edge cases from becoming support disasters.

Rather than rejecting suspicious voters outright, the community routed them into a review lane. That cut false-positive anger and still prevented obvious duplicate clusters from affecting the vote.

Case study / Model Harbor

An AI image app replaced email-only trials with personhood-based quota ladders.

Anonymous users received a tiny free quota. Users with stronger proof got larger trial pools and faster queues. Credit leakage dropped, and the team learned which trust signals actually mapped to long-term paid conversion.

11

Reviews

What teams say when human verification stops being a one-off integration nightmare.

These are representative voices from the kinds of builders IAH is meant for: founders, product leads, and developers dealing with real abuse pressure.

Founder / AI infra

"We finally had a way to stop free-credit churn without turning signup into a KYC funnel."

Before IAH, abuse policy was basically guesswork. After rollout, we had a real ladder for allocating quota and a much better read on which users were actually worth extending.

Product lead / governance

"The greylist alone changed how we run elections."

Most tools only gave us yes or no. The middle zone let us act like operators instead of bouncers.

CTO / incentives platform

"One SDK was the difference between actually shipping this and shelving it for another quarter."

We did not want to own five protocol integrations and their policy changes forever. IAH let us stay focused on the product.

Operations / community app

"It gave support and fraud operations a shared language."

Once we had whitelists, greylists, and explicit escalation rules, both teams could reason about edge cases the same way.

Proof-of-humanity infrastructure

I Am Human i-am-human.app

Verify humans. Not passports.

One SDK for developers who need to stop bots and sybil attackers without forcing every user through invasive KYC.

Get Started

Meta-protocol input

World • Humanity Passport • BrightID • Gitcoin • more
World 32
Passport 24
GitHub 13
Wallet 18