VEID is a cryptographic identity system that lets you prove exactly what you need to — without revealing anything you don't. No email. No password. No persistent ID. Just math.
Four cryptographic steps, invisible to the user. The entire flow completes in under 1.5 seconds.
Every design decision in VEID starts from the same question: what's the minimum the other party needs to know?
A QR code tells the scanner your identity. A Glyph proves your identity — and it can't be copied.
Every existing solution makes a trade-off VEID refuses to make.
| Dimension | 🌀 VEID | 🔑 Passkey / FIDO2 | 🪪 SSI / DID | 🦊 Web3 Wallet |
|---|---|---|---|---|
| Anonymous by default | ✓ Per-org derived address | ✗ Discoverable credential | ~ Persistent DID | ~ Pseudonymous |
| Selective disclosure | ✓ ZK proof per field | ✗ Auth only | ✓ W3C VC | ✗ Address only |
| Cross-service unlinkable | ✓ Full | ✗ Same credential per RP | ~ DID rotation needed | ✗ On-chain address is public |
| No blockchain | ✓ Pure crypto | ✓ W3C standard | ~ Some DIDs use ledger | ✗ Requires gas + sync |
| Phishing resistance | ✓ Domain-bound key | ✓ Origin-bound | ~ Wallet UI dependent | ✗ Blind signing attacks |
| Visual identity token | ✓ Animated Glyph | ✗ None | ✗ Static QR at best | ✗ Address string |
| Verifier breach impact | ✓ Zero PII exposed | ✓ Public key only | ~ Issuer-dependent | ~ Address exposed |
| Self-sovereign recovery | ✓ BIP-39 seed phrase | ~ Platform-dependent | ✓ Seed / DID rotation | ✓ Seed phrase |
VEID has been designed against nine distinct attack classes. Eight are fully mitigated cryptographically. One — seed compromise — requires operational security practices.
View all 9 attack simulations in the interactive threat lab →
No experimental cryptography. Every building block is battle-tested and peer-reviewed.
Try the live interactive demo, read the full technical whitepaper, or explore the Developer SDK integration guide.