Score Utility
At Tythe, credibility isn’t just measured — it’s enforced as an access layer.
Platforms can use DISC Scores, and metric-specific thresholds to control who gets to do what, when, and where. This transforms raw credibility into real utility.
Score-Based Access
Tythe enables platforms to enforce access logic based on verified credibility — without ever exposing personal identity or sensitive data.
Every DISC Score is:
• Numerical (7–100)
• Rating-categorized (Poor → Excellent)
• Metric-tagged (Financial, Creative, Secutrity, etc.)
• And publicly referenceable via TRIS metadata
Integrated platforms can implement any of the following score-based access models:
1. Minimum Score/Rating Thresholds
E.g., Only allow users with DISC Score ≥ 62 (Very Good) to participate.
This model enables credibility-gated onboarding — e.g.
• Access to DePIN infrastructure
• Premium DeFi modules
• Contributor applications for DAOs
2. Metric-Specific Filters
E.g., Require Financial metric ≥ 0.25 and Compliance ≥ 0.15 for treasury access.
Platforms can define criticality-weighted entry gates for features where specific behavior types matter more than overall trust. Perfect for:
• Launchpads
• Governance proposals
• Risk-sensitive vaults or token issuance
3. Flag-Based Blocking (Signals)
E.g., Restrict BAD-status TRIS (Score 1–6) from validation, proposal creation, or payouts.
Enables hard gating based on:
• Cred Watch flags
• Protocol BAD Status
• Historical dispute outcomes or violation triggers
This prevents malicious users from re-entering under new wallets or identities — while still maintaining privacy integrity.
Real-World Applications
• DAOs
→ Restrict proposal access to high-ranking, verified contributors
• Service Marketplaces
→ Allow only credible freelancers to pitch or onboard
• dApps
→ Gate premium features behind verified credibility behavior
• DeFi Protocols
→ Require compliance and financial score for higher yield, leverage, or staking tiers
Why This Model Matters
• Creates a reputation-gated Web3
• Reduces bot access, fraud, and risk across ecosystems
• Replaces token-based access with merit-gated credibility
• Enforces behavioral integrity without surveillance or central control
“Blessed is the one who listens to me, watching daily at my gates, waiting beside my doors.”
— Proverbs 8:34
Last updated