Onboarding
Last updated
Last updated
Tythe introduces a new standard for identity and verification — one where privacy is protected, but credibility is still enforced.
Traditional KYC/KYB systems require full data disclosure. Tythe replaces that model with ZK-KYH (Know Your Human) for individuals and ZK-KYB (Know Your Business) for organizations — methods for proving human uniqueness or organizational legitimacy using zero-knowledge proof privacy.
For Individuals: ZK-KYH – Know Your Human
ZK-KYH enables individuals to prove:
• That they are real
• That they are unique
• Without revealing who they are
Tythe supports the following ZK-KYH methods:
• (formerly Polygon ID)
• (World)
• (Humanity Protocol)
To further validate contribution claims, individuals can optionally verify:
Ownership of their X (Twitter) and GitHub accounts using (zkTLS powered) — generating ZK-proof attestations without exposing platform credentials.
ZK-KYH is optional for basic participation — but required to unlock full TRIS functionality, including DISC Score building, Credonation, and visibility in credibility-gated environments.
For Organizations: ZK-KYB – Know Your Business
ZK-KYB enables on-chain organizations to verify:
• Their existence
• Their wallet ownership
• Their project metadata and smart contract control
Off-chain organizations will eventually onboard through traditional KYB with regulated providers — but that layer is not enforced at launch.
A Privacy-First Onboarding Philosophy
• Tythe does not collect or store any user data
• ZK verification providers handle all proofs — Tythe only receives outcome metadata
• Identity proofs are modular, consent-driven, and revocable
• Your identity belongs to you — your credibility belongs to the network
“It is the glory of God to conceal a matter; to search out a matter is the glory of kings.”
— Proverbs 25:2
In addition, Tythe supports ZK-proof based social verification via (zkTLS powered) — enabling organizations to prove ownership of official communication channels (e.g., X accounts) without exposing credentials. This is especially useful in validating reputation and anchoring off-chain proof of presence.