Decentralized Permissionless Infrastructure for Self-Sovereign Identity

Internet of People (IOP) provides a Self-Sovereign Identity framework based on W3C standards to provide SSI solutions, store schemas, decentralized IDs (DIDs), keys, rights and proof timestamps on a ledger for public verification, keeping verifiable claims (VCs) off-ledger.

The IOP Solution

It’s time to reverse the centralisation, the indiscriminate commodification of data, and in particular the erosion of personal privacy that sadly have become hallmarks of today’s digital world. It is time for the open, borderless, and secure identity verification of self-sovereign identity.

The IOP Network is the new open standard for digital identity – built on fundamentals provided by organizations such as W3C to provide decentralized self-sovereign identity and trust solutions via an interdependent ecosystem of open protocols, decentralized tools, and services built with the latest cryptographic technologies and secured by the permissionless Hydra blockchain and token.

The IOP stack give anyone full control over their identities and their personal and professional connections. Anyone can use IOP to present verifiable claims without the need for a third party or compromising their privacy. This will revolutionize a wide range of industries, as well as providing access to proof of identity, credentials, and ownership to billions of currently underserved people.

“Self-sovereign” means self-ownership of the individual identity holder.
It is a model for managing digital identities in which an individual or entity has sole ownership over the ability to control their accounts and personal data.

Open. Fair. Trustless. Private. Simple!

Read about IOP

Read about the Hydra Blockchain and Token

Read about the Delegates


IOP Community Report 2020.12.31 – A year in review

IOP Community Report 2020.12.31 – A year in review

IOP Community Report 2020 Q4 Reminder: Our goal for 2021 is to become the de facto easiest and cheapest open-source standard for gatekeeper-free DID & SSI solutions. Our key selling points include state of the art crypto features with the lowest barriers of entry....

IOP Community Report 2020.04.30

IOP Community Report 2020.04.30

This is an interim report between the quarterly status reports and yearly letter to the community. Reminder: Our goal for 2021 is to become the de facto open source standard for gatekeeper-free DID & SSI solutions. The last quarter was a success for our project...

IOP Community Quarterly Report 20.1

IOP Community Quarterly Report 20.1

This is the first quarterly status report in 2020. Reminder: The goal for 2021 is making the IOP Stack the de-facto open-source standard for gatekeeper-free DIDs, SSIs, public and private Personas. We make you own your data again and put the power back into your hands...

Relevant Markets

Identity and Access Management

Many companies and other organizations need to manage identity and access for employees and visitors to their sites, with yearly global spending in excess of $8bn [13]. But current approaches are extremely expensive, inflexible, and often exhibit glaring security vulnerabilities. Using IOP’s identity protocols, companies are able to issue identity cards and adjust access rights on the fly, as well as easily grant and revoke visitor access thanks to standardization. This concept can easily be extended from physical to digital access. For example, managing access rights to shared company drives and other digital resources from a users’ own device.


Online learning is poised to revolutionize the way we learn and open up educational opportunities to billions of currently underserved people around the world. But qualifications earned via e-learning platforms currently have a poor reputation, even when affiliated with established brick and mortar institutions. Part of this is resistance to change, but it’s also undeniable that online credentials are hard to track and easy to forge for both unscrupulous users and institutions alike. IOP’s technology allows universities and students to track and prove attendance, grades, and degrees as well as less tangible factors such as quality of education and student satisfaction using mutually provided verifiable claims. Future employers can easily verify grades and credentials with the issuing entity without the danger of personal user data falling into the wrong hands or companies overreaching their boundaries and asking for more data than they really need.

Regulatory Technology

For many businesses, complying with ever-changing data regulations is costly and time consuming, especially when operating across multiple jurisdictions. Companies must find a way to gather, process, and then securely store user data such that they can prove compliance — often for audits that occur many years after the fact. For many smaller businesses, these costs are so high that they are forced out of the market. With IOP’s approach to identity and verifiable claims, regulatory compliance is streamlined and risk is reduced for both users and companies. Because data tends to stay under full user control, it is easy to prove that it has been handled properly. At the same time, by completely separating personal data from the ownership of a digital identity, IOP supports far more secure and stringent data protection rules than are currently implemented in most countries around the world.


Harvesting personal data isn’t just bad for users: it can also become a massive liability for companies, who may not have the expertise to properly store and secure that data. Data breaches are a daily occurence, despite yearly cybersecurity spending approaching $100bn (as estimated by Gartner [12]). IOP provides significant cybersecurity benefits over existing centralized approaches. At a basic level, making local storage and full user control the default for all data significantly reduces the risk of hacking or accidental exposure of data. Beyond that, IOP provides numerous opportunities for companies wishing to offer security as a service. For example, companies could provide secure backup for users’ claims and credentials or give them the ability to share and access credentials from the cloud. Unlike current cloud-based approaches, data security would not be compromised as all data would be encrypted before transmission to the service provider.