No items found.
Our blog

Get the latest Civic news and updates

What is Proof of Humanity (PoH)?

Proof of Humanity (PoH) is a way to verify that users are real and unique individuals, helping prevent bots, fraud, and Sybil attacks in Web3 systems.

Insights
Civic Team
March 28, 2025

Proof of Humanity (PoH) is a verification framework that confirms a participant in a system is both a real human and uniquely identifiable. Builders use it to stop multiple registrations, identity fraud, and manipulation in decentralized environments.

Digital systems are vulnerable to Sybil attacks, where a single entity creates multiple identities to gain an unfair advantage, and traditional verification methods like CAPTCHAs or email authentication are becoming ineffective against automation and AI-powered bots. PoH aims to establish trust in decentralized applications through verified human participation.

PoH belongs to a broader category of verification mechanisms called “Proof-of-X,” which validate different identity attributes based on specific criteria—such as Proof of Reputation for assessing trustworthiness and Proof of Responsibility for confirming credentials or privileges.

Proof of Personhood (PoP) and Proof of Humanity (PoH) both verify that an entity is human. However, while PoP mostly focuses on distinguishing humans from bots, it can also include uniqueness verification (as discussed by Vitalik Buterin). PoH, on the other hand, explicitly requires uniqueness, so no one can register multiple times, which makes PoH a stronger mechanism for Sybil resistance.

 

How Proof of Humanity Works

PoH systems verify users through two broad categories: material (physical) verification and immaterial (behavioral) verification. Some implementations use a hybrid approach, combining multiple methods to increase reliability and Sybil resistance.

Biometric Verification

By analyzing physical characteristics that are difficult to replicate, biometric verification provides an efficient way to prove humanity. Current methods include:

  • Facial recognition, iris, or retinal scanning – Leveraging stable and unique  patterns.
  • Fingerprints and palm vein scanning – Using infrared technology to detect biological markers.
  • Voice recognition – Identifying individuals through vocal characteristics.

These methods require specialized hardware such as cameras, fingerprint scanners, and multispectral sensors. One of the most discussed biometric verification devices is the Orb, which uses iris scanning to verify uniqueness. The future may see increased use of behavioral biometrics (typing, scrolling, walking patterns), ECG-based verification using wearables and even brainwave authentication.

While biometric verification is effective, it raises ongoing concerns about privacy, data security, and accessibility, with user control over biometric data remaining a key challenge. Certain countries have gone as far as blocking or banning such data collection. 

Reputation and Behavior-Based Verification

Instead of biometrics, some systems analyze a person’s history, activity, and social connections to verify uniqueness.

  • Reputation-based verification – Aggregates identity credentials, on-chain activities, and past interactions to establish credibility. In some cases, government-issued IDs may be incorporated when privacy and regulatory concerns can be overcome.
  • On-chain activity scoring – Examines blockchain transaction patterns, decentralized application participation, and wallet history to detect organic user behavior.
  • Behavioral and social graph analysis – Uses human-only verification challenges and trusted network connections to confirm identity.

These methods offer alternatives to biometric verification but face challenges related to privacy, accessibility, and biases in assessing legitimacy.

Preserving Privacy of PoH Verification

Ensuring Proof of Humanity while protecting user privacy is a major challenge. Many PoH systems require identity verification, but collecting and storing such sensitive personal data contradicts the principles of decentralization and self-sovereign identity. Balancing strong verification with user autonomy should be a key priority for Web3 identity systems.

To address this, PoH implementations are increasingly using privacy-preserving cryptographic techniques. Zero-Knowledge Proofs (ZKPs) let users prove their humanness and uniqueness without revealing personal information. Some systems also use Anonymized Multi-Party Computation (AMPC) to verify identities collectively without exposing individual data. On-device processing and end-to-end encryption further minimize data exposure by ensuring that sensitive information never leaves the user's device unprotected. These implementations, however, can be expensive due to the added compute overhead of ZKPs. 

 

Proof of Humanity (PoH) – Top 10 Use Cases

1. Fair Token Distribution

Blockchain-based airdrops, staking rewards, and incentive programs are often exploited by bots. PoH ensures tokens and rewards reach real participants, promoting fairness in community-driven projects.

2. Governance & Voting

PoH prevents Sybil attacks in DAOs and decentralized governance by ensuring each vote belongs to a unique human. This supports one-person-one-vote systems, quadratic voting, and community decision-making.

3. Web3 Reputation & Identity Systems

By verifying uniqueness, PoH allows users to build trustworthy on-chain reputations for DeFi lending, credit scoring, and digital credentials—all without relying on centralized identity providers.

4. Gaming & Metaverse Applications

PoH prevents multi-accounting, bot-driven farming, and unfair play in blockchain-based games. It also enhances NFT drops, metaverse access, and in-game governance, ensuring participation from real users.

5. Peer-to-Peer Marketplaces & Commerce

Trust is key in decentralized marketplaces, freelance platforms, and rental services. PoH verifies that participants are real people, reducing fraud in P2P transactions and escrow services.

6. Decentralized Social Media & Content Platforms

Fake accounts and bot-driven spam are common in Web3 communities. PoH helps maintain authentic engagement by ensuring that users are real.

7. Anti-Spam & Security Solutions

Traditional bot detection methods like CAPTCHAs are becoming ineffective. PoH provides a decentralized way to verify humanness, improving security in login authentication, Web3 messaging, and Sybil-resistant applications.

8. Securing Blockchain Consensus Mechanisms

PoH strengthens one-person-one-vote blockchain consensus models and prevents wealth-based centralization in proof-of-stake and delegated voting systems.

9. Privacy-Preserving KYC & Digital Identity

PoH allows users to verify age, citizenship, or eligibility while minimizing data exposure. Privacy-enhancing techniques like zero-knowledge proofs (ZKPs), on-chain attestations, and self-sovereign identity (SSI) models enable identity verification without centralized data storage.

10. Universal Basic Income (UBI) & Social Benefits

PoH can be used in blockchain-based UBI initiatives to ensure funds are distributed only to verified individuals, preventing fraudulent claims and duplicate registrations.

 

Building Human-Centric Systems in Web3

As decentralized systems grow, verifying humanity without compromising privacy will be essential to building fair, secure, and inclusive ecosystems. Implementing Proof of Humanity with privacy-preserving techniques can help Web3 stay true to its values—resisting manipulation while respecting individual rights.