How it works
Technical details
Last updated
Technical details
Last updated
Our multi-layered infrastructure provides a UX friendly solution to detecting bots and bad actors who farm incentives with multiple or mass accounting. This includes detecting: 1. Farming via manual efforts: Bad actors make multiple accounts on multiple browsers on their devices to farm the same incentives. Our protocol can detect such multiple account and map it to the main user, blocking all the illegitimate ones and only allowing the main account to receive the incentives. 2. Device based automated farming: Using automation tools and libraries, all the manual work is automated via bots and sybil attacks are created. We are also successful in detecting such automated user behaviors and achieve the same filtering and mapping accuracy. 3. Cloud based automated farming: Similar to device based automation but much more vast and mass sybil attacks are executed using this method. Such high end detection, filtering and mapping without revealing users' true identity and keeping them anonymous, is possible utilizing our multi-layered solution:
Invisible Verifications: Through our deep research and experimentations revolving around bots, browsers & hardware devices, we have developed a seamless way to detect potential bot traffic that operates undetected in the background and requires zero user interactions. This includes several sub-layers and signals which we validate through and derived parameters are verified.
On-chain footprint: We analyze users' on-chain data and derive a humanity score based on the activity intensity, timeline and on-chain value generated. However, this layer is in-effective when it comes to new web3 users or less "degen" users, so this is a conditional layer and is only taken into account when the user is not a web3 newbie and already has decent on-chain experience. *this layer is still experimental and WIP.
Reclaim Web2 apps data: Powered by Reclaim Protocol, we utilize their infrastructure to help users generate ZK proofs of their usage data from web2 apps. Currently we are incorporating Uber rides ZK proof via reclaim with the condition that the user must have done atleast 1 ride. This layer defines the proof of personhood of user using decentralized cryptography powered by Reclaim.
Defining Uniquity of a user: Now utilizing all the above mentioned factors like all invisible verifiers, on-chain data (optional), user's uber account and rides proofs, we generate a UUID which is uniquely defined for every real user. Using our effective detection and filtering techniques, all bot/sybil accounts created are detected and are mapped to the main user which is the attacker's primary (the first) account, blocking all rest of the illegitimate ones and only allowing single main account. 1 real user = 1 address per app = 1 UUID using x no. of devices logged in
V1 is currently in early alpha at https://v1.truehuman.xyz , things might break so feel free to report those to us. Current version only works in desktop/laptop
V2 is currently in the pipeline and soon will be released with the highest bot & sybil detection, filtering and mapping accuracies, and adding a new layer that utilizes decentralized cryptography and is as easy as to do an OTP verification but takes even lesser time.