Make Your Digital Identity Tangible

Without Being Seen. The Litentry Identity Hub allows you to aggregate your personal data from blockchains and platforms to manage granular access to dApps.

Get Early Access
we help you

Exist in a digital world without KYC

Use Multi-chain Data from Web3 + Web2 Platforms

We help you collect the complete picture of your fragmented identity.

Get Maximum Privacy & Authorization Control

Our incorruptible hardware infrastructure allows you to stay anonymous when you need to and reveal yourself when you don't. 

Share Interoperable Verifiable Credentials

Take back what is yours with tamper-proof digital data containers that only you own. Share only what you need to.

For Identity owners

Compose your data constellation

“Data Stardust" is the footprint and extension of you traversing the virtual world. They reflect and speak on your remarkable trajectory.

Get Early Access
For developers

Ask for & share just what is necessary

Respect the privacy of your perfect user and learn how to effectively reach your target audience without violating their trust.

Get Early Access
Launching Soon

Explore the
Identity Hub

Store your sensitive relationships within a privacy preserving trusted execution environment and leverage your identity inside your favorite dApp.

Paving the way for identity based social & economic innovations

Unlocking verifiable personal data in a private and secure way

Latest News
Office setting

UX review presentations

How do you create compelling presentations that wow your colleagues and impress your managers?
Read post
Man working at desk

Migrating to Linear 101

Linear helps streamline software projects, sprints, tasks, and bug tracking. Here’s how to get started.
Read post
Man pinning images on wall

Building your API Stack

The rise of RESTful APIs has been met by a rise in tools for creating, testing, and managing them.
Read post



Asked Questions

Everything you need to know about the Litentry Protocol and its products.
What are the use cases for your protocol & front-end products?
Any type of identity data generation, computation and transfer where security and privacy is important. Litentry allows you to gather all of your digital identity data scattered across web2 & web3 platforms, to generate and manage a verifiable identity with the help of privacy preserving computation.
Our use-cases include but are not limited to:
1. Private & secure identity data injections into NFT’s, dApps & other apps.
2. Credit scores & eligibility for under-collateralized lending and other reputation based benefits
3. Audience selection for quality airdrops based on crypto experience and project contribution
4. Transportation of reputation & status metrics across Web2 & Web3 platforms

To explore other use cases and innovative experiments, please get in touch with us.
Does Litentry make use of Zero Knowledge Proofs?
No, we don't. 
We use a different technology, called a Trusted Execution Enclave (TEE), to protect your data.
You can imagine the TEE as a blackbox in which the code is open sourced, yet we can not see what input is given by the identity owner. It ensures that the data is stored, processed and protected in a secure environment. For this purpose, we use the Intel SGX chipset. This chip/storage is where all verified accounts & addresses are stored in the form of an identity graph.
Can Litentry see the sensitive relationships between
the accounts in my profile?
No, these are stored in the Trusted Execution Environment.
The environment is only accessible when the private key of the identity owner is included in the request to open it. Currently, all the SGX nodes are under the control of Litentry, which minimizes the risk of attacks by malicious nodes. While the SGX network nodes are not yet decentralized, Litentry is actively working towards decentralization and the eventual decentralization of the nodes is inevitable.
Is it possible to use the protocol without using the Identity Hub?
Currently, the only way to access the Litentry protocol and its features is through the Identity Hub. We have designed the Identity Hub to provide a seamless experience for both identity owners and dApps or services that want to offer identity-based experiences. In the future, we plan to release several SDKs to enable more direct interaction with the protocol.
How are you managing identity data and 3rd partners?
Our protocol infrastructure follows a self-sovereign identity framework, which gives users complete control over their data at every stage of the process. The Identity Hub is unable to access or analyze user data unless they give us permission through a cryptographic signature. This means that all data management and sharing is initiated and authorized by the user.

While we encourage our third-party partners to offer clear benefits and incentives in exchange for data insights from their users, Litentry is an identity middle layer that allows users to reclaim control over their data sovereignty and use, leverage, or benefit from it as they see fit. If users wish to do so, Litentry will provide opportunities for them to benefit from their data under their own authorization.