Make Your Digital Identity Tangible

Without Being Seen. The Litentry IdentityHub allows you to aggregate your personal data from blockchains and platforms to manage granular access to dApps.

Launch App
Latest News
Office setting

UX review presentations

How do you create compelling presentations that wow your colleagues and impress your managers?
Read post
Man working at desk

Migrating to Linear 101

Linear helps streamline software projects, sprints, tasks, and bug tracking. Here’s how to get started.
Read post
Man pinning images on wall

Building your API Stack

The rise of RESTful APIs has been met by a rise in tools for creating, testing, and managing them.
Read post
we help you

Exist in a digital world without KYC

Use Multi-chain Data from Web3 + Web2 Platforms

We help you collect the complete picture of your fragmented identity and make it usable.

Get Maximum Privacy & Authorization Control

Our incorruptible hardware infrastructure allows you to stay anonymous when you need to and reveal yourself when you don't. 

Share Interoperable Verifiable Credentials

Take back what is yours with tamper-proof digital data containers that only you own. Share only what you need to.

Litentry Network Apps

Access the dashboard, token transfer, registrar and token monitor

Network Apps
A galaxy of stars resembling a face with a constellation showing data points.
For developers

Ask for & share just what is necessary

Respect the privacy of your perfect user and learn how to effectively reach your target audience without breaking their trust.

Launch App
For Identity owners

Compose your data constellation

“Data Stardust" is the footprint and extension of you traversing the virtual world. They reflect and speak on your remarkable trajectory.

Launch App
Launching Soon

Explore the
IdentityHub

Store your sensitive relationships within a privacy preserving trusted execution environment and leverage your identity inside your favorite dApp.

EVM Compatible

Use an EVM-compatible wallet to sign in to IdentityHub and easily create an IDGraph without directly interacting with the Litentry Parachain while ensuring security.

Partners

Investors

Frequently
Asked Questions

Everything you need to know about the Litentry Protocol and its products.
What are the use cases for your protocol & front-end products?
Litentry's protocol and front-end products are used for any type of identity data generation, computation and transfer where security and privacy are important. Our products allow you to manage your digital identity data scattered across web2 & web3 platforms, generate and manage a verifiable identity with the help of privacy preserving computation.

Some of the use-cases include private & secure identity data injections into NFT’s, dApps & other apps, credit scores & eligibility for under-collateralized lending and other reputation-based benefits. Such as audience selection for quality airdrops based on crypto experience and project contribution, and transportation of reputation & status metrics across Web2 & Web3 platforms.
Does Litentry make use of Zero Knowledge Proofs?
No, Litentry uses a Trusted Execution Enclave (TEE) to protect user data. The TEE is like a blackbox in which the code is open sourced, yet Litentry cannot see what input is given by the identity owner. This ensures that the data is stored, processed and protected in a secure environment. The Intel SGX chipset is used for this purpose, where all verified accounts & addresses are stored in the form of an identity graph.
Can Litentry see the sensitive relationships between
the accounts in my profile?
No, the sensitive relationships between the accounts are stored in the Trusted Execution Environment, which is only accessible when the private key of the identity owner is included in the request to open it. Currently, all the SGX nodes are under the control of Litentry, which minimizes the risk of attacks by malicious nodes. Litentry is actively working towards decentralization, and the eventual decentralization of the nodes is inevitable.
Is it possible to use the protocol without using the Identity Hub?
Currently, the only way to access the Litentry protocol and its features is through the Identity Hub. In the future, Litentry plans to release several SDKs to enable more direct interaction with the protocol.
How are you managing identity data and 3rd partners?
Litentry's protocol infrastructure follows a self-sovereign identity framework, which gives users complete control over their data at every stage of the process. The Identity Hub is unable to access or analyze user data unless they give permission through a cryptographic signature. All data management and sharing is initiated and authorized by the user.

Litentry is an identity middle layer that allows users to reclaim control over their data sovereignty and use, leverage, or benefit from it as they see fit. Third-party partners are encouraged to offer clear benefits and incentives in exchange for data insights from their users.