Verify Identity
Reuse Identity
The financial identity that moves and grows with you.
Get a Portabl ID
Dive in deeper to understand ID verification & security with Portabl.
We're building the future of identity.
ZK & Predicate Proofs
Portabl allows you to express and verify complex verifications and attributes as boolean assertions so you can verify what you need without overcollecting data and increasing privacy risk.
All of the assurance, none of the risk
We think about proofs as an alternate way to express specific assertions without increasing your own PII risk surface area
An extension of global standards
ZK and predicate proofs extend the global W3C standards for Verifiable Credentials.
Advanced cryptography with off-chain data
Just as Verifiable Credentials don’t put PII on chain, our implementation of ‘proofs’ does not involve putting data on- chain either.
Uncoupling sources, attributes, and underlying risk signals to unlock high assurance without overcollection.
Verifications - All proofs start with our underlying KYC and AML verification methods or with credentials issued by participating institutions.
Proof Generation - Portabl generates derived attributes and proofs when certain types of verifications are satisfied. For example, completing identity verification may generate a proof that the user is over 18, 21, or 25.
Flexibly Combine Attributes & Proofs - The encryption and signature methods Portabl uses allows claims to be shared both explicitly and as derived attributes— all you need to do is specify which way you want to consume specific claims.