Verify Identity
Reuse Identity
The financial identity that moves and grows with you.
Get a Portabl ID
Dive in deeper to understand ID verification & security with Portabl.
We're building the future of identity.
Decentralized Identifiers
DIDs provide a secure way of ensuring verifiers, issuers, and end users are who they say they are without exposing sensitive data. DIDs offer a second layer of authentication that ensures both data security in transit and underlying identities of the user and relying party,
A better identifier
DIDs do the heavy lifting of binding end-users to their secure credentials. This means that data can only be controlled by the end user and that attempted use of sensitive data without DID-based verification is unauthorized.
Standards-based
DIDs have been a W3C recommendation since 2022. Today we use DID:KEY and DID:WEB, with support for other DID methods on the horizon
A deterministic trust anchor
DIDs provide cryptographic proof about their subjects. When combined with Verifiable Credentials, DIDs help prove that the data belongs to the subject and only the subject. This is one way we’re fighting the misuse of stolen data.
Pseudonymous & privacy-preserving
DIDs themselves do not reveal any sensitive information for KYC and AML contexts. However, a DID provides the groundwork for trusted interactions
How it works
Methods - Portabl uses multiple DID methods, including DID:ION, a Layer 2 network based on the Sidetree protocol. DID:KEY is also used, with plans to support DID:DHT.
Anchor - Anchoring a DID generates a unique proof of existence, acting as a unique identifier like DNS for entities. It can be done with or without blockchain.
Hash - Anchoring converts data into cryptographic hashes to prove existence while keeping data private. This can be done through simple or on-chain hashing.
Transact - The DID enables secure recordkeeping and change tracking. When hashes are recorded on a blockchain, changes are immutably time-stamped without leaking sensitive information.
We simplify and abstract the cryptography
Portabl simplifies DID management for businesses and consumers. No cryptography background is needed, allowing users to use Portabl like any other social login without technical knowledge.
DIDComm — secure messaging and 2-way authentication
DIDs power a second form of authentication that provides a secure channel for information sharing that is ATO- and MITM-proof
Tamper-resistant record keeping
The sequence of data changes over time is tied to the DID. This provides a powerful way to evaluate attribute reputation, provenance, and change history over time.