TruAnon uses Weavechain for Verifiable

Proof of Identity

to increase customer trust

Challenge

How to prove TruAnon’s verified identity ownership attributes from within external applications.

Solution

Create signed verifiable credentials using Weavechain so users can cryptographically prove ownership without exposing private data.

Industry
Identity Management

Website
truanon.com

Headquarters
New York, NY

Founded
2020

TruAnon is a distributed identity platform that builds trust. It lets people create, automate, and update their identity without compromising privacy. This keeps identity safe from being bought and sold while helping us connect with other trustworthy people while using social media online.

CHALLENGE 1

Bringing TruAnon certifications to other apps

After verifying asset control, TruAnon reflects confidence from confirmed accounts and profiles that owners choose to publicly present. This unbiased Rank/Score quantifies the legitimacy of these claims in real time.

Weavechain lets those users easily issue QR codes and Verifiable Credentials of asset ownership signed by TruAnon using W3C cryptographic standards that can be used in other applications. For example a private attestation that I live in New York City and own the @oelnaggar LinkedIn profile. Or a public attestation that I’m the owner of my LinkedIn profile, and that I'm a verified human having a high public trust score. This can even be used to answer private questions from properties such as my healthcare or employment accounts.

CHALLENGE 2

Creating private, partial presentations of ownership

The most sensitive identity attestations should be private and highly specific. TruAnon lets users choose any combination of their data and use Weavechain to issue a signed, private Presentation of their Verifiable Credential for sensitive data sharing. For example, a user could apply for a loan by submitting a Presentation with a validated home address and a validated @microsoft.com Email address to prove their employment. That same user could attest that they’re a Microsoft employee who owns the @cryptolover Twitter handle before speaking at a conference. This pattern lets you bridge the gap between privacy and trust.