33.3.1 – Blockchain-based Identity

2025.10.06.
AI Security Blog

What if you could anchor your claim to humanity to an immutable public ledger? This is the central proposition of blockchain-based identity systems for Proof-of-Humanity (PoH). By creating a decentralized, tamper-resistant record of a verified human, these protocols aim to solve the Sybil problem once and for all. For a red teamer, this shifts the attack surface from manipulating transient application-level checks to subverting the very foundation of a user’s digital existence.

The Core Architecture: DIDs, VCs, and Immutability

To understand the vulnerabilities, you must first grasp the components. These systems are not monolithic; they are a stack of interoperable standards designed for self-sovereign identity. The goal is to give individuals control over their digital identity, independent of any central authority like a government or corporation.

Kapcsolati űrlap - EN

Do you have a question about AI Security? Reach out to us here:

Decentralized Identifiers (DIDs)

A DID is a globally unique, persistent identifier that you create and control. Think of it as a permanent phone number for your digital self that isn’t tied to any single service provider. It’s typically a string of characters derived from a public cryptographic key, like did:example:123456789abcdefghi. The DID itself is just an address; its power comes from the document it points to, which contains public keys and service endpoints for interacting with the identity.

Verifiable Credentials (VCs)

A Verifiable Credential is a digital certificate, cryptographically signed by an issuer, that makes a claim about an identity (the “subject”). In the context of PoH, the crucial VC is one that states, “The holder of DID [X] has been verified as a unique human.” This credential is what a service requests to grant access. The beauty of this model is that the service can verify the issuer’s signature on the blockchain without ever needing to communicate directly with the issuer, preserving privacy and efficiency.

The Promise of Sybil Resistance

The combination of these elements on a blockchain creates a powerful anti-Sybil mechanism. Because the ledger is public and immutable, it’s possible to ensure that a single human verification event is tied to only one DID. An application can then query the blockchain to confirm a user possesses a valid, non-revoked “humanity” credential. This moves the trust from the application to the decentralized network and the integrity of the initial human verification process.

The Onboarding and Verification Lifecycle

The entire system’s security hinges on the moment a digital identity is linked to a physical person. This process, often called onboarding or attestation, is the primary target for any sophisticated adversary. The typical lifecycle involves several key actors.

User Verifier Blockchain Service 1. Proof Request 2. Issue VC 3. Present VC 4. Verify Issuer & Status

Figure 1: Simplified flow of creating and using a blockchain-based PoH credential.

  1. Proof Request: The user initiates a verification process with a trusted Verifier (an “oracle”). This could involve a video call, a biometric scan, or social vouching from existing members.
  2. VC Issuance: Upon successful verification, the Verifier issues a Verifiable Credential, signs it with their private key, and often records the issuance or its hash on the blockchain. The VC is sent to the user’s digital wallet.
  3. Presentation: The user presents their DID and the PoH credential to a service (e.g., a decentralized voting app, a social network).
  4. Verification: The service uses the public information on the blockchain to verify the signature of the issuer on the credential and check if the credential has been revoked. If valid, the user is treated as a verified human.

Red Team Engagement: Attack Vectors and Vulnerabilities

As a red teamer, your goal is to acquire a valid “human” credential for an AI or to obtain multiple credentials for a single operator. The architecture, while robust cryptographically, has several socio-technical weak points.

Attack Vector Description Red Team Objective
Onboarding Oracle Manipulation The initial human verification process is the most vulnerable link. This involves fooling the system or person that attests to a user’s humanity. Generate a valid PoH credential for a synthetic identity (AI) by using deepfakes to pass liveness checks, social engineering human verifiers, or using stolen identity documents.
Private Key Compromise The user’s private key is the sole controller of their DID. Stealing the key means stealing their verified human identity. Gain control of a legitimate user’s PoH credential through phishing, malware, or exploiting vulnerabilities in their wallet software or social recovery mechanisms. Use the stolen identity to perform malicious actions.
Sybil Farming & Collusion This involves exploiting the system’s rules to generate multiple “human” identities. This can be done by finding low-cost or easily corruptible verifiers. Create a network of seemingly independent human accounts controlled by a single entity. This could involve paying individuals in low-cost regions to get verified and hand over their keys (“identity mules”).
Privacy & Correlation Attacks While DIDs offer pseudonymity, on-chain actions are often public. Correlating a PoH credential with other transactions can de-anonymize a user. Trace a user’s on-chain activity back from their PoH credential to uncover other wallets, financial transactions, or DAO memberships, effectively breaking their privacy and potentially enabling targeted attacks.

Defensive Postures and Countermeasures

Defending these systems requires a multi-layered approach that acknowledges the human element as a critical part of the security chain. Purely technical solutions are insufficient.

  • Robust Liveness Detection: Onboarding processes must go beyond simple photo or video matching. They should incorporate interactive challenges (e.g., “turn your head left and say this random phrase”) that are difficult for current deepfake models to handle in real-time.
  • Decentralized Verification: Instead of a single company, use a decentralized network of human jurors (e.g., Proof of Humanity, Kleros) who stake tokens to vouch for applicants. This makes large-scale collusion more expensive and difficult to coordinate.
  • Periodic Re-attestation: Require users to periodically prove their “liveness” to maintain their credential’s validity. This mitigates the impact of key theft, as a stolen identity would eventually expire without the original human’s biometric input.
  • Privacy via Zero-Knowledge Proofs (ZKPs): The most powerful defense for privacy. A user can prove they hold a valid PoH credential without revealing the credential itself or their DID. This breaks the link between the proof of humanity and their on-chain activity.
// Pseudocode for a service checking a ZKP-based PoH
function authenticateUser(userProof, publicInputs) {
    // publicInputs could include the service's unique challenge string
    // The verifier contract address is known publicly
    verifierContract = getContract(VERIFIER_ADDRESS);

    // The service does not see the user's DID or VC.
    // It only verifies that the proof is valid against the public inputs.
    isValid = verifierContract.verifyProof(
        userProof,
        publicInputs
    );

    if (isValid) {
        // User is a verified human, but we know nothing else about them.
        return grantAccess();
    } else {
        return denyAccess();
    }
}
                

Ultimately, blockchain-based identity represents a formidable tool for PoH, but its security is not absolute. As red teamers, your focus should be on the seams between the cryptographic certainty of the blockchain and the fallible, exploitable world of human verification.