Manifesto · April 2026

Digital identity is the missing layer of the AI economy

The internet was built without a native identity layer. Every system that came after has been patching around that absence. This is the architecture we are building — and the argument for why it needs to exist.

Get in touch → Download manifesto PDF Explore the technology → Visit blerify.com ↗
Scroll

I  ·  The morning of 2030

It is 7:14 AM.
You don't open an app. You speak.

No password. No CAPTCHA. No two-factor code. No document uploaded to a third party you have never heard of. Just action taken by Agent Karen — who coordinates a set of other agents you authorize for specific actions — with cryptographic evidence of every step.

agent-karen — authorized session · hardware-bound
07:14:22 — Monday · Cryptographically sealed
You "Karen, give me my balances across all accounts, find the most convenient New York to Geneva flight Monday through Friday next week with hotel, recommend the best credit card based on current perks, and book it."
Karen
"Chase Sapphire — 3× miles on this route. Lufthansa LH 404, Monday 5:55 PM, Geneva Tuesday 7:30 AM. Hotel included. $3,478 total. Booked."
Cryptographic receipt generated · Auth proof: 0x4f3d…a91c

Before that agent could act, something had to exist that currently doesn't: a cryptographic proof of who you are, and a cryptographic authorization of exactly what the agent is permitted to do on your behalf. Not a password. Not a session token. Not a confidence score. A mathematical proof — hardware-bound to your device — that no AI can forge and no server breach can expose.

The authentication is deterministic. The signature is either valid or it is not. There is no middle probability. That distinction — deterministic versus probabilistic — is the entire argument for why the current model fails and why this one doesn't.

Two billion people will hold ID wallets by 2030, most with multiple agents acting on their behalf around the clock. The transaction volume this creates is not two billion times the current authentication market. It is two billion humans multiplied by the agents they authorize, multiplied by every action each agent takes per day. Building the infrastructure to process each of those events — at near-zero marginal cost per additional interaction — is what Blerify is doing.


II  ·  Fraud: not a bug, but an architectural problem

The internet was never built with a native way to answer "who is this?"

Every biometric KYC session asks you to prove yourself by uploading your face to a remote server. That server stores a representation of your biometrics. That representation can be stolen, replicated — or now, synthesized from nothing using publicly available tools.

The industry's answer has been more of the same: more data collected, more AI layered on top, more checkpoints added to flows that were already broken. The result is a system where the attack surface grows faster than the defenses, and the defenses are structurally incapable of winning because they are probabilistic and the attacks are not.

$442B
Global financial fraud losses in 2025, per INTERPOL
5 min
A deepfake identity attempt now occurs every five minutes — Entrust / Onfido
244%
Growth in digital document forgeries in a single year — Entrust / Onfido
Today's model
Face uploaded to a remote cloud server you never see again
A confidence score — 94% probability — decides your identity
Better AI defeats the AI defending you
Your data scattered in silos without your control
The cryptographic model
Credential stored in a secure enclave on your own device
Deterministic verification — valid or not, zero ambiguity
Hardware-bound key cannot be generated by any AI
One-tap authentication, no documents uploaded
You own your identity. Always.

A confidence score produced by AI can always be defeated by better AI. The only defense against a synthetic identity is an authentication method that is deterministic — one that produces a valid cryptographic signature or doesn't, with no threshold to game and no model to fool.


III  ·  The solution is a new identity layer that was never built

A credential issued by a trusted institution, held in an ID wallet on the user's own device. Not on a server.

The key pair is generated on-device and never leaves the secure enclave. The verifier receives a cryptographic proof — not the credential itself, not a copy of biometric data. A deepfake cannot forge a hardware-bound key. A synthetic identity cannot produce a signature that was never generated.

🏛
Trusted issuer
(gov / bank)
🔐
ID wallet
on device
Crypto proof
generated
Verifier
confirms
📋
Tamper-proof
receipt

The standards underpinning this — W3C Verifiable Credentials, ISO 18013-5 for mobile driving licences, EUDI Wallet architecture — are ratified and being deployed at national scale. This is not a whitepaper proposal. The standards and the primitives exist. What has been missing is a network layer that connects issuers to verifiers across institutions, borders, and use cases — and a business model that makes building it sustainable.

The business model follows Visa's, not the KYC vendor's. Visa doesn't own the money. It owns the layer that connects the institutions that move it and charges a small fee on every transaction. Every cryptographic authentication is the identity equivalent of that transaction. Every new issuer expands what credentials are accepted. Every new verifier expands where they can be used. Every agent action — measured in trillions per day by 2030 — generates a new event on the same infrastructure, at marginal cost near zero.


Why now

Two forces are making this shift inevitable.

This is not a trend. These are structural, irreversible shifts — one driven by the acceleration of attack, the other by the mandate of law. Together they create a narrow window where the right architecture wins everything.

Force 1
Threat acceleration
AI has made the current model untenable

The cost of generating synthetic identities, deepfaked liveness captures, and forged documents is falling toward zero. Every month that passes makes legacy biometric KYC weaker and more expensive to operate. Every credential shared with AI agents is vulnerable to theft and lacks a binding to an authorized owner.

Cost to generate a convincing synthetic identity
2020
$10,000+
Sophisticated actors only
2022
$500
Organized crime
2024
$50
Any motivated actor
2026→
Anyone, anytime
The attack surface grows faster than probabilistic defenses can adapt · A deepfake every 5 minutes · 244% growth in document forgeries (2024) · Entrust / Onfido 2025
AI attacks are deterministic. Probabilistic defenses cannot win a deterministic fight.
Force 2
Regulatory mandate
Governments are mandating the replacement

The EU requires digital ID wallets for public services by December 2026 and large private-sector platforms by 2027. The US has deployed mobile driver's licenses in 25+ states, with DHS acceptance at 250+ TSA checkpoints. NIST has issued guidance for financial institutions. 10+ countries in Latin America and the Caribbean are implementing ISO 18013-5 credentials by end of 2026.

Global deployment timeline — ISO 18013-5 & EUDI Wallet
🇪🇺
European Union
EUDI Wallet · eIDAS 2.0 regulation in force
Regulation published — 2024
Public services mandatory — Dec 2026
Large private platforms — 2027
450M citizens
🇺🇸
United States
mDL deployed · NIST guidance issued
mDL active in 25+ states
DHS acceptance — 250+ TSA checkpoints
NIST guidance — financial institutions
335M citizens
🌎
Latin America
ISO 18013-5 rollout underway
10+ countries implementing by end of 2026
Cross-border interoperability planned
670M citizens

IV  ·  You cannot delegate what you cannot prove

Agent authorization without verified human identity is not a feature gap. It's a liability.

An AI agent acting without a cryptographically verifiable authorization chain has no audit trail, no legal standing, and no way to prove after the fact that the action was sanctioned. Before any agent can act on your behalf, three questions must be answerable with mathematical certainty — not inference, not session context.

01
Who authorized this action?
Cryptographically proven, hardware-bound to a specific verified device
02
What are the precise boundaries of that authorization?
Explicitly defined scope — amount, category, confirmation threshold
03
Is there cryptographic evidence that cannot be repudiated?
Tamper-proof receipt — designed to be legally admissible, traceable to the verified human
Your authorized agents · ID wallet 0x4f3d…a91c
Identity verified
✈️
Agent 1 — travel
May book flights and hotels. No additional confirmation required. Each action produces a signed cryptographic receipt.
Autonomous
$3,000
per transaction
🛍️
Agent 2 — shopping
May purchase on Amazon. Electronics and books only. Confirmation required above $200. All actions produce tamper-proof audit evidence.
Confirm above $200
$800
per month
📊
Agent 3 — finance
May read balances across all linked accounts. May not initiate transfers. Every query produces a signed receipt traceable to this authorization.
Read-only
reads / day

Every agent action will produce a cryptographic receipt — a signed record of what was done, when, under which authorization, by which agent. Not a server log that can be modified. Not a platform's internal audit trail that can be withheld. A tamper-proof record anchored to the holder's verified identity, carrying timestamp, device state, and geolocation — designed to be legally admissible and to satisfy non-repudiation requirements in banking, finance, and government that existing KYC products are structurally incapable of meeting.

The question of the next decade is not whether AI agents will act on your behalf. They already do. The question is whether those actions will be authorized, bounded, and auditable — or whether they will operate in the same identity vacuum the internet has always had, now running at agent speed and agent scale.


The authors
Marcos Allende López
Marcos Allende López
Co-author
LinkedIn
Andrew Piscione
Andrew Piscione
Co-author
LinkedIn
This document is timestamped on the Avalanche blockchain · Content, authorship, and date are cryptographically proven
Verify on-chain
0x47c5bc90f176af16f0c93eb4708f3c38b95c0bc46cc84be1b68e71e5da804710

Blerify

The identity layer for the internet. Making identity as secure as necessary, as convenient as possible.

The shared infrastructure layer that lets every institution, every platform, and every agent answer the only question that has never had a reliable answer: who authorized this — and can you prove it cryptographically?

Get in touch → Download manifesto PDF Explore the technology → Visit blerify.com ↗