World privacy FAQs
Dive into the FAQs
To make this happen, the protocol is constantly being upgraded. This means that the privacy and security of the system keep improving.
The protocol’s goals are simple but powerful:
World uses anonymous cryptographic fragments to ensure there is no centralized database of biometrics anywhere.
World uses unlinkable attestations to disentangle and anonymize the digital actions of users.
Unlike legacy networks, you don’t have to take anyone’s word for these promises — the protocol proves them in public, release by release.
World is built with trust-minimized technologies that limit misbehavior—including by the development team. This means eliminating centralized control over the system wherever possible and trusting users to be the best stewards of their own data.
World minimizes the data footprint of users in the protocol as much as possible. This often requires the invention of new technologies, which are then open sourced so others may audit and adopt them.
World always biases for opening up protocol systems. This means making core components accessible for external auditors and reviewers. The more this happens, the more secure the protocol.

It captures images of your face and eyes to create a unique code, a mathematical representation that confirms you’re a real, distinct human. That code is immediately divided into secret shares — pieces that look completely random on their own and reveal nothing about you or the original code.
These shares are then securely compared across independent compute nodes using Anonymized Multi-Party Computation (AMPC) to ensure no one has registered more than once and no node learns anything about the underlying code.
That means no biometric data is ever stored or shared by World.