Prove You're You. Privately.

Prove you're you - and prove key truths about you - without the need for ID cards, phone-based certificates or any other identifier that can be stolen or misappropriated. And do all this without giving away anything about yourself.

Revolutionary New Technology.

TrigID is a revolutionary new cryptographic technology that preserves your anonymity and privacy, but allows anyone to test the attributes that define your identity. This identity is self-sovereign – which means you have control over those attributes.

Works with Existing Identifiers.

TrigID integrates seamlessly and immediately with all existing analog identification schemes of government and other authorities.

"The internet has transformed how we communicate and do business, opening up markets, and connecting our society as never before. But it has also led to new challenges, like online fraud and identity theft, that harm consumers and cost billions of dollars each year."

Barack Obama.

Former President of the United States

"If we are to reach more than a billion people without proof of identity, we need everyone to work together, including countries, development partners, UN agencies, the private sector and civil society."

Kristalina Georgieva.

Chief Executive Officer, World Bank

"Digital identification can play an important role in achieving the sustainable development goals. It can enable the world’s poorest and most vulnerable people to gain access to critical services, from education to healthcare and financing, while also advancing their legal and political rights."

Amina Mohammed.

UN Deputy Secretary General

"We need a good digital identification service which is reliable, which everybody can rely on. I can sign, I can identify myself, I can access services securely; and I can transact services online."

Lee Hsien Loong.

Prime Minister of Singapore

The First Universal Digital Identity System To Solve Real-World Identity Problems.

Real world problems like finding your medical record when you're lying on an emergency room operating table. Like knowing that the person you're sending your money to is who they say they are, and they really do own that car. Knowing that the person you're getting advice from over the internet really is a genetic counsellor. Or that your election vote actually came from you.

TrigID is the first and only Internet-based way to show that a real-world human is who they say they are. It enforces "one person, one identity" and you can verify that real-world identity with real-world identifiers like driver's license numbers, SSN's, addresses, phone numbers... All without giving anyone those identifiers.

What's more, you can maintain a few passphrases in your head and use one or more of those to prove who you are to anyone, anywhere.

How is this possible? TrigID is a revolutionary, patent-pending "zero knowledge" validator of identity information inspired by geometric triangulation and its entire stucture is baked into public blockchain so it can't be hacked or faked.

This is the piece of Internet infrastructure that the world has been waiting for.

Identity services that TrigID makes possible:


TrigID uses a novel scheme, inspired by geometric triangulation. It takes common identifiers, encrypts them, then reduces their information content to 20 or fewer bits. This “mashing algorithm” makes what we call “Identity Vectors” that are really just arcs in a giant identity graph.

These arcs are no use by themselves. That's why they can encoded into a public blockchain. One 20-bit Mash, for example, can represent more than 2000 possible tokens from identifiers of any type. That's from the US alone, and it's before third parties start adding things like medical record ID's, tax file numbers...

The TrigID graph can only confirm what you already know.

UNSAFE Personally Identifiable Information (PII) is collected

A public "Mashing" algorithm turns PII into SAFE 20-bit Identity Vectors or "arcs"

Testing what you think you know using this graph is "zero knowledge"

Arcs are immutably added to public blockchain as part of an ID token transaction

Dependent Services parse the ID token transaction record to construct a Universal Identity Graph

Two or more arcs are needed to locate an Identity

UNSAFE Personally Identifiable Information (PII) is collected

A public "Mashing" algorithm turns PII into SAFE 20-bit Identity Vectors or "arcs"

Testing what you think you know using this graph is "zero knowledge"

Each arc is immutably added to public blockchain as an ARC transaction

Dependent Services parse ARCs transaction record to construct a Universal Identity Graph

Two or more arcs are needed to locate an Identity

UNSAFE Personally Identifiable Information (PII) is collected

A public "Mashing" algorithm turns PII into SAFE 20-bit Identity Vectors or "arcs"

Each arc is immutably added to public blockchain as an ARC transaction

Two or more arcs are needed to locate an Identity

Dependent Services parse ARCs transaction record to construct a Universal Identity Graph

Testing what you think you know using this graph is "zero knowledge"


ID tokens are a first-class TrigID crypto-infrastructure component. Each token can carry a set of "arcs" or "edges" – lines that connects facts in the Global TrigID blockchain database.

Think of these as the transactions in a database transaction log. When you transfer them, the ID transaction becomes part of the TrigID database. When someone wants to use the data, they parse the blockchain and assemble the TrigID graph the same way that a conventional database is assembled from a transaction log backup.

Sure, ID tokens carry value – but the value assigned to them provides economic incentive to build the global identity database. Holders who "spend" their tokens by putting arc data into them are rewarded with more ID tokens. This way the creation of the global identity graph can be crowdsourced.

Curated ID Bounty Program

Get paid to build a free global identity-checking database in blockchain and become part of a $380 billion identity ecosystem *.

The TrigID graph will provide a safe, low-friction solution to many of today's identity-related problems – but only when it's fully populated.

We all want this to happen as soon as possible. To achieve this, a large pool of ID tokens will be set aside to provide a powerful incentive to load data. Use your tokens to load data and you'll get back more than you spend.

Modelling suggests that by the end of 2020, these novel cryptoeconomic incentives will achieve what the World's governments can't - 7.6 billion people with a secure, searchable, provable digital identity.

Our cryptoeconomics team will engage heavily during the community consultation period to make sure the Curated ID Bounty Program is safe, effective and fair when launched.

* 7.6 billion identities valued at $50 each. See Valuing ID Tokens for more analysis.

$380 BILLION Token Ecosystem

Any worthwhile identity service depends on the integrity of stored identity data. To keep this data up-to-date and maintain its integrity, each service needs to be able to add to, or change, the details of identities they service. To do that, they must pass their updates via a curation service. They need ID tokens.

To work with a TrigID curator, these identity services will need a reserve of tokens. Rather than repeatedly buying them on the open market, it makes sense that they should transact with tokens where possible. So they'll encourage the people and organisations consuming those identity services to also transact using ID tokens.

This is a powerful and virtuous circle, and it's the reason that we think that ID tokens can become "the" store of value for the online identity services economy.

Any foundation store of value needs stability - something that has been sorely-lacking in cryptocurrencies to date. To ensure this stability, the TrigID economy will run a Market Maker and use the Token Generation Event to provide it with a large pool of tokens to work with.

This Market Maker will also provide Token Venture Capital to selected identity service providers and Token Aid to identity-focused care organisations. Contact us if you're a VC who'd like to help with this task.


May 14 - Community Consultation begins

June 1 - Pre-sale begins

August 1 - SandBox program begins

August 15 - Personal Apps released

August 22 - Mash Algorithm Beta release

September 3 - Token Generation Event

November 1 - Public database pre-load begins

March 1 - Aid funding applications open

2nd Quarter 2019 - 3 billion identities loaded

4th Quarter 2019 - Curator's bounty pool exhausted

4th Quarter 2020 - Ecosystem steady state achieved


Stephen Young

Chief Architect and CTO

Steve is the architect of the TrigID technology stack, the GraphBase Graph DBMS, and a number of large, highly-structured Relational, noSQL and Semantic databases used by Government and Industry. His job is to make sure everything gets built and that it works.

Abby Clifton

Consensus Officer

Abby is a highly-experienced corporate, government, health sector and university change agent. Her role is to engage with and manage project partners and to ensure that our social and sustainability goals are met.

Vijay Varadharajan

Cybersecurity and Cryptography Advisor

With more than 400 publications and a string of prestigious academic and peak-body appointments, Vijay's role is to ensure that we get maximum benefit from our academic partnerships.

Ritu Steele

Operations Manager

Ritu is a highly-respected finance sector administrator with extensive KYC/AML, lending and systems-development experience. Her job is to keep fiat and token transactions moving smoothly.

Julius Garcia

UX Technical Lead

Julius is a senior Java developer and project manager. He's responsible for the development and maintenance of the server-side "face" of TrigID applications and sites.

Aiden Tallo

Design & UI

Aiden is a regular swiss army knife of design and UI skills. His job is to make sure that TrigID applications and sites look good and are easy to use.

Keith Omiping

Senior Java Developer.

Keith is a recognised new technology troubleshooter. He works deep in the TrigID server code making sure that it works correctly with our specialised GraphBase data curation layer.

Kirill Kazachenko

API & Android Team Lead

A highly-experienced Mobile and Java developer, Kirill manages our Android development and makes sure that both mobile versions of the TrigID Personal app communicate well with the TrigID API.

Rhea Lopez

Community Manager

Rhea is an accomplished academic and industry researcher and her experience coordinating clinical trials stakeholders makes her perfectly suited to her role as manager of the TrigID community consultation process.

Vincent Bacalso

iOS Developer.

Vince is a talented and inventive Apple developer who regularly brings valuable new perspectives to our mobile development. He looks after the iOS version of the TrigID Personal app.


Development partner FactNexus Pty Ltd is providing a modified version of the GraphBase Graph DBMS to support curation of the TrigID graph.

Newcastle University's Advanced Cyber Security Engineering Research Centre (ACSRC) is providing assessments and mathematical proofs to inform TrigID algorithms and architectures.

Sound cryptoeconomic advice will be key to the success of the TrigID project and to the Identity-related services that depend upon it. We'll announce this partner soon.


The TrigID Personal App

Available soon on the Apple App Store and Google Play Store. The TrigID Personal app allows you to claim your identity and ensure the accuracy of your key information. You can buy the ID tokens you need with an in-app purchase.

You can also use TrigID Personal to validate the personal information of anyone else. Just key in the personal information that person claims – the app will Mash it and validate it against on-chain arcs. The app will also validate a face image or voice print.

Use it to maintain your own TrigID secret phrases and private keys. Each is paired with a public key, so you can use it to verify your identity when dealing with banks, telcos and other entities the have KYC requirements. If you ever feel a phrase or key has been compromised, you can just remove it and add another.

During the community consultation period TrigID Personal will run against the TrigID sandbox.

Discuss the TrigID Personal App at

Valuing ID Tokens

How much is an identity worth?

It depends on what a buyer is able to do with it. We do have some useful examples to base an assessment on: Facebook bought Instagram for $28 a user, then WhatsApp for $42 per user. That was nearly five years ago.

Today, identity thieves will spend as much as $100 for comprehensive Identity data. In the US the average cost per identity-theft-related fraud is just over $1000. Simple Identity theft insurance costs $25-$60 annually. Add a little protection and monitoring and that becomes $100-$400.

These and many more facts suggest that $50 is a more than reasonable estimate of the value of a digital identity, so that's what we use in our calculations.

Take a look at the services that TrigID makes possible - the value of a universal and curated database of identity is immediately apparent. Your ID token is ultimately paying for the curation and maintenance of identity records, and that curation is what's making the TrigID identities valuable.

There's a one US dollar value in just the simple cleansing part of data curation (de-duping, attribute validation), so we've assessed the token's initial value to be USD $1.00. The market, however, will ultimately determine the worth of the Curation service and the ID token - as it does with all tradable commodities.

Discuss token valuation at

ID Tokenomics

A cryptocurrency token economy is a powerful tool for influencing behaviour and getting work done. This power is even more revolutionary than the "blockchain" technology that makes it possible.

Predicting the behaviour of a token economy over time can be challenging, however. A token that behaves like money or a security makes for a simple model, but a token that has an actual use has an economy that is far more difficult to model and manage.

These are some of the ID-Token-related issues we've had to address and will continue to address during the Community Consultation period:

  • • How many ID tokens do we need if we're giving them away as a reward for populating a 7,600,000,000 person Identity Graph?
  • • How many can we let get into circulation before oversupply destroys their incentive value?
  • • How much of the Graph can we populate before this happens and we have to close down the bounty program?
  • • What submission rate can we permit before the Ethereum Virtual Machine starts to choke?
  • • How much time do we need to allow for confirmation of new Identities and new Mashes?
  • • How much of the Graph should Curators pre-load using readily-accessible sources?
  • • Once the Graph is fully loaded, how many ID tokens are needed to support edits, births and deaths?
  • • What happens if too many ID Token speculators choose to HODL?
  • • How do we ensure that the poorest and least-advantaged get their identity created and maintained?
  • • How do we prevent a threatened actor (say Facebook or Google) from using their purchasing power to stifle the project?

Scenario planning and modelling has led us to this strategy:

  • • A pool of 1,000,000,000 tokens used by one or more Curators to manage the Curated ID Bounty Program.
  • • A pool of 1,000,000,000 tokens used by an ID Token Market Maker to ensure that ID tokens remain available and at a price that refects their utility value.

Discuss token economics at

Community Consultation

The six-month period leading up to the first Curated ID Bounty Program load event will be a period of intense consensus-building between ID token stakeholders and other interested parties. Discussion will take place at and there is much to examine:

Mash Algorithm optimisation including; how it handles multi-token identifiers and junk words, collision distribution strategies, Mash sizes and multi-Mash requirements

Vulnerabilites and risks for the TrigID graph itself and for services that rely on it. Also new remote attacks the graph makes possible – like the Dictionary Filter Attack discussed below.

Curated ID Bounty Program features and rules including; bounty schedules for first arcs and confirmations, pre-testing services, validation escrow, bounty schedule changes and new mechanisms as the Identity graph approaches steady state.

Strong Proof of Identity

Creating a few personal passphrases is a great way to allow a service locate you in their database, but it doesn't prevent people pretending to be you. A sophisticated bad actor can read the Mashes from blockchain and then give something that generates a collision. To prevent impersonation, you need to register a public key with the TrigID Identity Graph.

If a service wants to prove you're you, there are a few steps they need to take behind the scenes. They need to create a message, encrypt it with your public key, then get you to decrypt it with your passphrase (or private key).

If you don't trust the service with your phrase or private key even for the few milliseconds it takes to decrypt the message (and you shouldn't, unless it's an emergency) you can use a trusted key intermediary service or use an app that will decrypt the message and send it back to the service. The TrigID Personal app can do this for you.

Discuss at

Verifying an identity's claims

Locating and confirming an identity is a highly-reliable event. For a 20-bit Mash, the chances of locating the wrong identity in the US from an SSN and Drivers Licence number is less than the chances of winning a typical national lotto game six times in a row. And it only gets harder, the more Mashes you use.

But that's not true for information about an identity. 20 bits represents about a million vertices in the TrigID graph. For unique Unsafe values (Let's say SSNs on the US population) – the 20 arcs that point to typical TrigID will cover around 2000 values (SSNs).

That will mean a one in 500 false positive error rate. If you're testing (say) Fred's proof-of-age for a bar, one error in 500 hundred is probably OK. But if you're testing whether you have the right medical record number for Fred, only a zero error rate is acceptable.

The solution to this false-positive-error problem is two-factor verification of the truth or fact claimed. The same "triangulation" mechanism used to locate a TrigID can be used to verify a "truth".

Any fact that you're wishing to confirm unequivocally using the TrigID graph will need to be entered with two arcs. In the case of Fred's medical record, it will need two numbers - which could, of course, be existing Mash values.

Discuss at

The Dictionary Filter Problem

In a Dictionary Attack a large list or "dictionary" of values is sequentially applied against an application in the hope of finding one that the application will accept. Usually the dictionary contains passwords and the "attack" hopes to gain access to some account.

The strategy can, however, also be used for other purposes. A bad actor – pretending to be Fred – could, for example, apply to set up a bank account using a dictionary of SSNs. With more than 300,000,000 SSNs in use, however, such an attack is never going to work.

If a bad actor knows enough about Fred to isolate his TrigD vertex, however, he can use the TrigID graph to turn that 300,000,000 SSNs into just 2000 – as we saw in the exercise above. 2000 applications spread over several days could well result in one that's successful.

We call this the Dictionary Filter Problem. Once a TrigID graph is loaded and live, governments, banks, and other custodians of your identity will need their applications to be much more vigilant.

Discuss at

Ensuring Data Integrity

The Curated ID Bounty Program provides a powerful incentive to load identities and their attributes. Those same bounties, however, are an incentive to load fake identities and attributes or attributes without sufficient notability.

This is one of the key reasons for giving an ID token a value and requiring that the ID be spent to deliver data. Most fraudulent submissions will be detectable using graph analysis techniques. Get caught and your bounties and your valuable submitted ID tokens will be forfeited.

Some of the program features that will be used to ensure data integrity:

  • • All bounty program submissions must be provably linked to a TrigID.
  • • Confirmation bounties for independent second, third and fourth duplicate submissions.
  • • Validation periods that allow time for confirmation submissions and collusion testing.
  • • Foundation Identity Record requirements including a minimum arc count and at least one Attestation Relationship
  • • Extended validation escrow.

The details of these and other rules and strategies will be communicated and fine-tuned during the community consultation period.

On a smaller scale, there will always be those who wish to create the equivalent of a "false passport" to support illegal activity. There's no way to prevent this, but the Universal Identity Graph will make it easier to track the use of such false identities.

Discuss at

Towards an Identity Oracle

A blockchain Smart Contract is a powerful piece of software, but there are limits to its reach. If it needs data, that data has to be already in the blockchain machine and available to the Smart Contract in a form that it can use. If the contract needs to check an identity, for example, it has to rely on an external application to observe that need, go fetch the identity information and then feed it back to the contract. That external application is referred to as an "oracle".

There is no broadly useful oracle for identity. If there were, a whole new world of automated, immediate, incorruptible and cheap-to-transact commerce would be possible. Automated bank account creation and border protection. Automated transfer of everything from cars to houses. Automated payment of social security entitlements and insurance claims.

A populated TrigID Identity Graph makes such an oracle possible. What's more, since TrigID gets its data from the blockchain, it's possible for the identity oracle to be trustless and decentralized. All that's needed is the software to make it run. Our development partner FactNexus Pty Ltd has undertaken to open-source a TrigID-focussed version of its GraphBase DBMS for this purpose.

Discuss at h

Built Blockchain-Agnostic

TrigID will initially be implemented over the Ethereum blockchain. Ethereum is powerful, proven and popular but there are concerns about its scalability and its overly-centralised governance.

The TrigID project has been built to be blockchain-agnostic and easy-to-migrate. This means there's no need for it to confine its records to a single distributed ledger. EOS, NEO, Cardano, Dfinity, IOTA are all potentially suited and there are many other public distributed ledgers in the pipeline. One or more of these can be a suitable new home for TrigID Mash data should the need arise.

Discuss at h

Why TrigID is Different

The biggest difference between TrigID and any other digital identity technology – blockchain-based or otherwise - is that TrigID lets Personally Identifiable Information (PII) be safely stored and used in public. That PII can be publicly audited and validated, and it points to one, and only one, identity for every human. Putting it in public blockchain means that It can't be tampered with, it must be maintained by consensus and that it can be used by everyone.

No other digital identity technology – blockchain-based or otherwise – can make these claims.

How TrigID compares with a few of the many public-key based identity technologies

Glossary of Terms

Graph: A set of objects and the relationships that join them. Not a chart.

Arc: A relationship between the vertices (or nodes) of a graph. Sometimes called an "edge".

Attestation Relationship: A relationship between TrigID graph identities that attests to those identities. Usually a parent-child, sibling or legal guardian relationship.

Bounty Program: A program where rewards are given for successfully performing a task.

ERC20: A technical standard used for smart contracts on the Ethereum blockchain.

Mash: A product of the Mash algorithm. The algorithm takes an unsafe personal identifier and turns it into one or more safe reduced-information Mash values.

Public Key: From a pair of keys, the one that can encrypt a message. The other "private" key can decrypt the message. Used for authentication.

Self-sovereign Identity: Identity that can be managed by self and can't be controlled by any authority.

Zero Knowledge: A protocol where no knowledge is transferred between communicating parties.


Automated Anonymous Know-Your-Customer (KYC)

Received a photo of a license? Want to know whether there's a Joe Lunchox, DOB: 02/02/1990 at address: 34 Fifth St, Sometown? TrigID will tell you.

You can then ask Joe for out-of-wallet "something they should know" information – like a phone number and e-mail address he owns, or his current TrigID secret phrase . The TrigID Graph will verify his answers.

Alternatively, you can interact with him using a video calling app and verify his face-image or voice print.

TrigID also makes possible a single repository of KYC information, or a gateway that uses a federated query to find that information. Any entity that wants to set up such a service should start aggregating and collecting information for it now so that they can be first to offer it.

Any service will be able to use TrigID to match collected records and cleanse any identifiers. Ideally, though, it should retain its KYC information anonymously, to comply with increasingly stringent regulatory privacy requirements. It can achieve this by assembling and maintaining it's own private Identity Graph and attaching anonymised KYC data to each identity.

Discuss this service at

Anti-Money-Laundering (AML)

Any entity tasked with detecting and prosecuting money-laundering activity can also maintain their own private Identity graph. The "one person, one identity" guarantee will dramatically simplify data-matching and cleansing tasks and ensure that reported KYC data is more valuable. Known network relationships can be superimposed over the graph and new ones inferred using country, town, street address or family name dictionary filters.

Discuss this service at

Crime & Terrorism Prevention

The Universal Identity Graph will make it much harder for criminals and terrorists to hide their activities. The Graph won't tell an enforcement entity anything they don't already know, but it will make it signficanlty easier to use what they know.

The anonymity provided by the Identity Graph means that any enforcement entity can make anonymous alert frameworks available to their agents - secure in the knowledge that key intelligence won't be accidentally or deliberately used to "tip off" a suspect.

A pre-existing, community-maintained Identity Graph will significantly reduce the burden of keeping these alert frameworks up-to-date with current phone numbers, addresses, email addresses and other easily-changed identifiers.

Discuss this service at

Patient and health-record identification

Every year, a quarter of a million people die from medical error in the US alone. They die because they don't receive the right care at the right time.

Most of these errors are the result of systemic problems – poorly-coordinated care and lack of timely information, both caused in-part by fragmented and incomplete records.

Lack of timely information also leads to waste. Tests and imaging are regularly repeated unnecessarily and more than 10% of hospital expenditure is spent correcting preventable mistakes. According to a 2012 National Academy of Medicine report, thirty percent of US health care spending is wasted on unnecessary or poorly-delivered services and other needless costs.

Inability to find or match fragmented health records is a major problem. In a 2014 assessment, the Office of the National Coordinator for Health Information Technology in the US found that the best error rate is around seven percent. Worse still, the error rate is usually more than ten percent within a healthcare entity, and double that when entities exchange with each other.

We can do better and the free TrigID Personal app is a start. Post-load, the app will let any admissions desk, triage nurse or doctor quickly and easily identify patients with 100% accuracy. And at no cost.

Discuss this service at

Data integration and health record sharing

Precision medicine – treatment designed specifically for the individual - is the future of healthcare. Precision, however, needs data - data that comes from a variety of sources. Not just from fragmented medical records, but from our phone and wearables and our daily observations and measurements.

Put all this data together and teams of specialists and analysts from all over the world can contribute to our health care. Pool it, and Deep Learning algorithms and other AI strategies can discover new treatments and new cures.

What's stopping this from happening now? The fear that personal identifying information (PII) will get into the hands of identity thieves. Every month, it seems, we hear of some new hack that compromises millions of identities.

Remove the PII from all medical and related records and there's nothing for identity thieves to steal.

Anyone who cares for our health can then use TrigID to enable safe, secure sharing of what's guaranteed to be your data.

Discuss this service at

Safer Peer-to-Peer Commerce

Identity theft is part of a much larger problem - Identity Fraud. If a bad actor "borrows" your identity for a single transaction, it's generally not considered to be theft of your identity, but it can be costly and damaging nonetheless. Last year in the US alone, nearly 17 million people reported that they were victims of identity fraud.

If a seller isn't who they claim to be, you have no comeback if the goods are stolen or the services aren't what was sold to you. If a buyer fails to complete payment and your own goods or services have already been delivered you have no way to chase them down.

Is the person you're transacting with really who they say they are? Is that the person you're sending money to the same person that's on the registration papers of the car you're buying? Does the credit card number you're being given really belong to the person you're sending your goods to?

Download the free TrigID Personal app and you'll be able to answer all of these questions. Before transacting with a buyer or seller, check the truth of the details they provide. Phone them and check their voice print. Skype them or facetime them and check their face image vector against the Graph.

Discuss this service at

Identity for Everyone

More than a billion third-world humans have no identity. Without an identity, you don't count. You're no-one. You can't get access to health care, education, financial services or state-provided social benefits. 170 million of these no-ones are children. Children who can't be identified and tracked are routinely kidnapped and sold as a sex slaves.

Nowhere is this more heartbreaking than in the world's refugee camps. Refugees are people who once had homes, friends and identities defined by the country they've been forced to leave. Now they struggle just to get their daily rations of food and supplies in an identityless environment where criminal elements can easily steal their share.

TrigID is identity you're given as soon as you have a name and a parent, and you can strengthen it at any time with attestations provided by governments and other third parties. And once you have it, you can't lose it or have it taken away.

Discuss this service at

Financial Inclusion

Two billion of the world's adults are what's referred to as "unbanked". They don't have a bank account of any kind. This means that they can't safely save or borrow money or enter into trading arrangements.

There's no way for them to buy a house or vehicle for their family, save for their children's education, buy insurance or undertake anything but the simplest of cash businesses. Benefits that that those of us in the developed world take for granted.

It should be no surprise then to learn that financial inclusion is considered to be a key enabler of the seventeen Sustainable Development Goals.

Part of the problem is that without adequate proof of identity you just can't open a bank account. Or obtain the credit card that gives you immediate use of what's in that bank account.

TrigID gives you an identity you can prove. With that, perhaps you don't even need a credit card. That's an opportunity, and great news for the three billion people who live on less that $2.50 a day, because the credit card fees alone would make commerce using them unsustainable.

Discuss this service at

Fraud-proof electronic voting

One eligible identity, one incorruptible vote, delivered from the comfort of home. This is the promise of electronic voting. Improve the democratic process by speeding up and reducing the cost of elections and improving voter turnout. To date, however, achieving such voting utopia has proven to be too difflcult.

The unique provable identity provided by the TrigID Identity graph will, however, remove enough of the problems associated with remote electronic voting to make it a reality

No ballot-stuffing, no impersonation of people dead or alive and no misrecording or destruction of votes.

The TrigID Identity Graph paired with a dedicated distributed voting ledger will make remote electronic voting a reality. Read the whitepaper or visit the forum to see how it could look.

Discuss this service at

Safe National Identification

At first glance, a national identification system with ID cards sounds like a great idea. Join fragmented records into one big database so that government can deliver care and services better. Track crminals and terrorists. Reduce illegal immigration and social security fraud.

Current systems just aren't good enough. Every day thousands of people are inconvenienced, marginalized, given wrong or inadequate care or have their identities stolen.

We need something better.

But do we really trust government enough to give them complete control of our identity? A centralised database that knows all about us is a powerful tool for government officers, but do we really believe that every government employee will use that power honestly and with our best interests at heart?

Can they make and keep that database accurate? According to the US Attorney General a third of US criminal records have information that is wrong. If government can't manage the records of the most dangerous people in our society, what hope is there for our records? Errors will mean bad credit, travel restrictions, false arrests...

A centralised government database would be an irresistable target for criminal identity thieves. Lobby groups too - employers, landlords, insurers, credit agencies, private investigators and more would demand access to what is, after all, a publicly-owned resource. Give them access, and we've given them the power to discriminate en masse

TrigID promises a better way. Findability, checkability and the power to put decentralised records together when needed - without loss of privacy. The power to keep our own records and the records of those we care about correct. Able to work with today's analog identifiers and tomorrow's digital and biometric identifiers. Decentralised, immutable and unhackable.

It's the right kind of database for national – and global – identity.

Discuss this service at

Decentralized Social Networks

Facebook carries the identity – together with the interests, politics, religion, fetishes and buying behaviour - of more than two billion people. If you're a member, it knows about pages you've looked at all over the web. It knows where your phone has been, it analyses what's in the photos you take. It keeps every message you've ever sent to, or received from, anyone. It knows the name and number of everyone on your phone even if they're not Facebook friends. It knows more about you than your government does.

No matter how well-meaning the team at Facebook might be, that's too much power in the hands of one central enterprise. When they make a mistake, it hurts too many people - as we've seen with the recent Cambridge Analytica debacle.

What's more, Facebook's success has created an unassailable near-monopoly. If we want to easily and digitally interact with our friends as a group then Facebook or one of its assets is the way we must do it.

The price we pay for this utility is a monocultural, Facebook-only view of our social world – a stale blue landscape lacking the innovation and vibrancy that comes from competion. A world where privacy is a second-class citizen.

TrigID can change this. How? Your social network is something that exists separate from Facebook, and the TrigID Identity Graph makes it possible for you to define your social graphs independent of any social network.

At its heart Facebook, LinkedIn and other social-network-based applications are just blogs - with news and message feeds to and from your network.

Imagine a world where you could pick your own on-line social presence and social view from any of hundreds of options. One that suits your personality, your feed, advertising (including your own) and privacy preferences. Each of your friends can pick a presence that's entirely different.

Then each of you can just plug in your secure, anonymous TrigID-referenced social graph and get the social network experience you choose. With no centralized monolith to spoil the party.

Discuss this service at

Universal Data De-identification

Since 2013, nearly 10 billion data records have been lost or stolen world-wide. That's five million a day. In 2017, there were more than 1500 data breaches in the US alone, at an average cost to the organization breached of over seven million dollars.

Experts agree, no matter how much security you have in place, if you're big enough to be a target you will eventually be breached.

A data breach is not an organization's only data-related risk. Each year brings increasingly stringent regulations designed to protect individual privacy. Europe's new General Data Protection Regulation (GDPR) and the US Health Information Portability and Accountability Act (HIPAA) are important examples. These regulations stipulate costly management processes for Personally Identitiable Information (PII) and promise stiff penalties if you fail to comply.

The only way to be certain that identity thieves can't steal PII and that you fully comply with PII-related statute is to not store that PII at all.

TrigID makes it possible to de-identify any and all personal records. To accurately find a person's records at any time, the organisation just needs to keep a local TrigID sub-graph that connects record keys. Or use a service that does it for them.

Discuss this service at

Data Cleansing

De-identification using TrigID is a powerful and effective strategy for privacy if all you need to do is locate a record or confirm something about an identity. Some personal data, however, can't be de-itentified and still be useful. Mailing lists (physical and email), for example, need to retain the addresses or mail can't be delivered.

Keeping list information accurate is a significant problem for most enterprises. 20% of PII records in a typlcal set have at least one attribute that is wrong. These errors compromise analytics and decision making and often lead to wrongful disclosure, waste and embarassment – for example when sending mail to a wrong address or misspelling a name.

A populated and well-maintained TrigID Identity graph will make it possible to test the accuracy of PII by testing all of the identity's attributes against the graph. If they're commonly-used atrtibutes, like name, SSN, phone number, address or drivers license number, and they fail - they're probably wrong. This process will also find duplicates and uncover fake identities and addresses.

The TrigID graph also supports cleansing of misspellings. The Mash algorithm generates a Soundex Mash for each spoken string, allowing many misspelled attributes to be matched.

Discuss this service at