Numbers Protocol is a decentralized infrastructure designed to establish verifiable provenance for digital and real-world assets, ensuring authenticity, origin, ownership, and integrity throughout their lifecycle. Built on a purpose-built Layer 1 blockchain using Avalanche Subnet technology, the protocol functions as a version control system for digital media—akin to Git—by recording immutable on-chain commits that track every modification, transfer, and creation event. Each asset is assigned a unique, cryptographically generated identifier known as a Numbers ID (Nid), compliant with the EIP-7053 standard, which links to an on-chain Asset Profile containing metadata such as creator information, timestamps, geolocation, licensing terms, and ownership history [1]. To ensure content integrity, the protocol generates a cryptographic hash called the integrityCid, stored on the decentralized InterPlanetary File System (IPFS), which acts as a tamper-evident fingerprint. The system supports multi-chain interoperability, allowing assets to be registered on networks like Ethereum, Polygon, and BNB Chain, while anchoring provenance data on the Numbers Mainnet (Jade). A key component of the ecosystem is the Verify Engine API, an AI-powered tool that enables developers and users to search for and verify digital assets across blockchains, detect unauthorized use, and retrieve full asset histories. The native utility token, NUM, facilitates staking, micropayments, governance, and incentivization within a delegated proof-of-stake (DPoS) consensus model. Numbers Protocol also integrates with industry standards such as Coalition for Content Provenance and Authenticity (C2PA) and supports verifiable credentials aligned with W3C standards, enabling trustless authentication and privacy-preserving verification through zero-knowledge proofs. Real-world applications include combating misinformation in journalism, verifying election coverage, protecting intellectual property, and supporting legal evidence in war crime investigations in collaboration with organizations like Starling Lab and Rolling Stone. By combining blockchain, decentralized storage, and open standards, Numbers Protocol establishes a foundational layer for digital trust in the Web3 and AI era [2].
Overview and Core Purpose
Numbers Protocol is a decentralized infrastructure designed to establish verifiable provenance for digital and real-world assets, ensuring authenticity, origin, ownership, and integrity throughout their lifecycle. Functioning as a blockchain-based version control system for digital media—akin to Git—the protocol records immutable on-chain commits that document every creation, modification, and transfer event, creating a transparent and tamper-evident history [2]. This architecture enables trustless verification of digital content, addressing critical challenges posed by misinformation, deepfakes, and AI-generated media in the modern information landscape.
Core Mission and Digital Trust
The primary purpose of Numbers Protocol is to build trust and credibility in the digital content ecosystem by anchoring verifiable provenance to decentralized infrastructure. In an era of escalating digital manipulation, the protocol provides a foundational layer for digital trust, allowing creators, publishers, and institutions to authenticate media without reliance on centralized intermediaries [4]. By leveraging blockchain technology, cryptographic hashing, and open standards, it ensures that once provenance data is recorded, it cannot be altered or deleted, establishing a permanent and transparent record of truth.
This trust architecture supports a wide range of high-stakes applications, including the verification of journalistic content, authentication of election coverage, protection of intellectual property, and preservation of evidence in war crime investigations in collaboration with organizations like Starling Lab and Rolling Stone [2]. The protocol’s mission extends beyond media to improve transaction efficiency for both digital and physical assets in the context of Web3 and machine-to-machine economies, emphasizing open standards, transparency, privacy, and a human-centered approach to digital infrastructure.
Assetization and Digital Identity
A key mechanism within Numbers Protocol is the "assetization" process, which transforms digital media—such as images, videos, and documents—into verifiable Web3 assets. During registration, a commit is created that pins the content to the InterPlanetary File System (IPFS) and records ownership, creator details, and metadata on-chain, ensuring the integrity and authenticity of the asset throughout its lifecycle [6]. Each asset is assigned a unique cryptographic identifier known as a Numbers ID (Nid), compliant with the EIP-7053 standard, which functions as a decentralized identifier (DID) for digital assets, enabling cross-platform searchability and verification [7].
The protocol extends self-sovereign identity (SSI) principles from personal identity to asset-centric provenance, treating each digital entity as having its own verifiable history. This approach shifts the focus from centralized attestation to decentralized, blockchain-anchored records of origin and modification, forming the basis of a trust model rooted in verifiable provenance rather than institutional authority [8].
Integration with Open Standards and Interoperability
Numbers Protocol enhances its utility and reach by aligning with industry-wide standards such as the Coalition for Content Provenance and Authenticity (C2PA), which enables the embedding of tamper-evident metadata directly into media files [9]. This integration allows verification even outside the Numbers ecosystem, making authenticity data accessible to both humans and AI systems. The protocol also supports verifiable credentials in accordance with W3C standards, enabling trustless authentication and privacy-preserving verification through zero-knowledge proofs [10].
By supporting multi-chain interoperability—allowing assets to be registered on networks like Ethereum, Polygon, and BNB Chain while anchoring provenance data on the Numbers Mainnet (Jade)—the protocol ensures broad accessibility and seamless integration across the Web3 ecosystem [11]. This hybrid approach enables developers and enterprises to leverage the security of established blockchains while anchoring trust in a purpose-built, scalable provenance layer.
Empowering Creators and the Digital Economy
At its core, Numbers Protocol aims to empower creators by enabling fair monetization models through verifiable ownership and licensing. The system supports two types of Non-Fungible Tokens (NFTs): Custody NFTs, which represent full ownership and control, and License NFTs, which grant specific usage rights without transferring ownership, facilitating flexible and transparent licensing models [12]. These mechanisms, combined with automated royalty distribution via smart contracts, ensure that creators retain control and receive compensation when their content is used or resold.
The native utility token, NUM, plays a central role in the ecosystem by facilitating staking, micropayments, governance, and incentivization within a delegated proof-of-stake (DPoS) consensus model [13]. This economic layer supports network security and decentralization while rewarding users who verify and archive content with verified provenance.
Through its comprehensive approach to verifiable provenance, Numbers Protocol establishes a decentralized standard for digital authenticity, positioning itself as a critical infrastructure for trust in the Web3 and AI era [2].
Blockchain Infrastructure and Network Architecture
Numbers Protocol is built on a purpose-built Layer 1 blockchain known as the Numbers Mainnet (Jade), which is constructed using Avalanche Subnet technology. This dedicated blockchain infrastructure serves as a decentralized, immutable ledger for recording the provenance, ownership, and modification history of digital and real-world assets. Unlike general-purpose blockchains, Numbers Mainnet is optimized specifically for digital media provenance, offering high throughput, sub-second finality, and low transaction costs while maintaining environmental sustainability through energy-efficient consensus mechanisms [15]. The network operates with Chain ID 10507 and is accessible via the RPC endpoint https://mainnetrpc.num.network, enabling integration with wallets such as MetaMask and development environments [16].
Numbers Mainnet: A Purpose-Built Layer 1
The Numbers Mainnet functions as a permissioned public blockchain, meaning it is transparent and open for reading and verification by anyone, but restricts contract deployment to approved use cases—primarily digital media provenance—to preserve ecosystem integrity and prevent spam [16]. This hybrid model balances decentralization with operational efficiency, ensuring that the network remains secure, scalable, and resistant to abuse. The use of Avalanche Subnet technology allows Numbers Protocol to benefit from Avalanche’s high-performance consensus mechanism, enabling rapid transaction finality and support for real-time applications such as live media capture and AI-generated content logging [15]. Looking ahead, the protocol plans a gradual transition toward a fully permissionless model as the ecosystem matures, further enhancing decentralization and accessibility [19].
Multi-Chain Interoperability and Token Bridging
While the Numbers Mainnet serves as the authoritative source of provenance, the protocol supports multi-chain interoperability to ensure broad accessibility and flexibility. The native utility token, NUM, exists across multiple blockchain networks, including as an ERC-20 token on Ethereum, a BEP-20 token on BNB Chain, and on other EVM-compatible chains such as Polygon and Avalanche C-chain [20]. Users can transfer NUM tokens between these networks using cross-chain bridges like Chainport.io, enabling seamless liquidity and participation in the ecosystem regardless of the underlying blockchain [20]. This bridging capability enhances cross-chain flexibility and supports a unified economic model across diverse Web3 environments.
On-Chain Commit Logs and Provenance Anchoring
At the core of the blockchain architecture are on-chain commit logs, which function analogously to version control systems like Git. Each time a digital asset is created, modified, or transferred, a cryptographic "commit" is recorded on the Numbers Blockchain. These commits include timestamps, actor identities, transaction hashes, and references to the asset’s integrityCid, forming a tamper-evident, auditable trail of the asset’s lifecycle [22]. This mechanism ensures non-repudiation and trustless verification, allowing any party to reconstruct the full history of an asset from its initial state to its current form. The commit system is supported by specialized smart contracts, including the Commit Contract, Asset Contract, and NFT Contract, which manage provenance tracking, royalty distribution, and ownership rights [23].
Integration with Decentralized Storage and Cryptographic Integrity
To ensure content integrity, the blockchain anchors metadata and cryptographic proofs while storing the actual media content off-chain using the InterPlanetary File System (IPFS). When an asset is registered, its content and associated metadata are hashed and stored on IPFS, generating a content identifier (CID) known as the integrityCid. This root hash is then embedded in an on-chain commit, creating a verifiable link between the blockchain record and the decentralized file [24]. Any alteration to the file results in a different CID, breaking the chain of trust and making unauthorized changes immediately detectable. To enhance reliability and long-term persistence, storage is often backed by Filecoin, ensuring redundancy and durability across the decentralized web [25].
Developer Access and Network Configuration
Developers can interact with the Numbers blockchain through standardized tools and interfaces. The network is compatible with the Ethereum Virtual Machine (EVM), allowing seamless integration with existing Web3 development stacks, including Hardhat, Truffle, and thirdweb [26]. Wallets like MetaMask can be configured to connect to the Numbers Mainnet by adding the network with Chain ID 10507 and the designated RPC URL, enabling users to sign transactions and manage assets directly [16]. For programmatic access, developers use RESTful APIs to submit commits, retrieve asset histories, and verify provenance, abstracting blockchain complexity while maintaining full control over data integrity [28]. This developer-friendly infrastructure lowers the barrier to entry for building decentralized applications (dApps) focused on digital authenticity, media verification, and intellectual property protection.
Digital Asset Registration and Provenance Tracking
Numbers Protocol enables robust digital asset registration and end-to-end provenance tracking by combining blockchain immutability, cryptographic verification, and decentralized storage. The system functions as a version control mechanism for digital media—akin to Git—where every creation, modification, and transfer is recorded as an immutable on-chain "commit," ensuring a transparent and tamper-proof history of an asset’s lifecycle [2]. This architecture allows creators, organizations, and developers to establish verifiable authenticity, ownership, and integrity for digital content in a trustless environment.
Assetization Process and Initial Registration
The foundation of provenance tracking begins with the assetization process, which transforms raw digital files into verifiable Web3 assets. During registration, a digital file—such as an image, video, or document—is processed through the Initial Asset Registration API, which generates a permanent, on-chain record of its existence and origin [6]. This process involves:
- Cryptographic hashing of the file content to generate a unique digital fingerprint.
- Metadata extraction, including creator identity, timestamp, geolocation, and device information.
- Pinning of content to the InterPlanetary File System (IPFS) for decentralized, censorship-resistant storage.
- On-chain anchoring of a commit record that references the content and its metadata.
This initial registration establishes the asset’s provenance at the moment of creation, creating a verifiable "birth certificate" that can be referenced throughout its lifecycle. The process supports a wide range of media types, including PNG, JPEG, GIF, and video files, with future expansion planned for audio and PDF documents [31].
Commit-Based Version Control and Provenance History
Numbers Protocol implements a Git-like version control system through its commit mechanism, which tracks every change to a digital asset over time. Each "commit" represents a state transition—such as an edit, transfer, or license update—and is recorded as an immutable entry on the Numbers Blockchain [32]. These on-chain commit logs include:
- Timestamps of each action
- Wallet addresses of actors involved (creator, owner, licensee)
- Updated metadata and integrity proofs
- References to the new content state via IPFS
This structured history enables full auditability, allowing users to reconstruct the complete evolution of an asset and verify its chain of custody. Developers can retrieve this history programmatically using the Read Commits API or the Nit module, a command-line tool that mimics Git workflows for media files [33]. The ability to track modifications ensures non-repudiation and supports use cases such as legal evidence, media verification, and intellectual property disputes.
Integrity Verification via Cryptographic Fingerprinting
To ensure content integrity, Numbers Protocol generates a cryptographic proof known as the integrityCid, a content identifier derived from the asset’s metadata and file hash [24]. The integrityCid includes:
- SHA-256 hash of the original content
- MIME type
- Creation timestamp
- Device fingerprint
- Geolocation data
- Creator identity (if available)
This proof is stored on IPFS and anchored on-chain within each commit, creating a tamper-evident link between the content and its provenance record. Any alteration to the file—even a single pixel change—results in a different hash, immediately invalidating the original integrity proof. This mechanism allows for automated detection of unauthorized modifications, ensuring that digital content remains authentic and unaltered since registration.
Asset Profiles and Verifiable Credentials
Each registered asset is assigned an Asset Profile, a digital certificate that functions as a "LinkedIn for media," containing a comprehensive, machine-readable summary of its provenance [35]. The profile includes:
- Creator and ownership history
- Licensing terms and usage rights
- Full commit timeline
- Links to on-chain records and off-chain content
The Asset Profile aligns with the W3C Verifiable Credentials Data Model, enabling interoperable, trustless authentication of digital assets across platforms [36]. These credentials can be cryptographically signed and verified without relying on centralized authorities, supporting privacy-preserving verification in high-stakes contexts such as journalism, legal proceedings, and AI training data validation.
AI-Powered Verification and Theft Detection
Numbers Protocol enhances provenance tracking with the Verify Engine API, an AI-powered tool that enables content-based search and verification across blockchains [37]. This system allows users to:
- Search for assets using a file upload, URL, or Numbers ID (Nid).
- Detect exact or visually similar content to identify unauthorized use.
- Retrieve full asset histories and verify authenticity in real time.
The API includes a Theft Detection feature that monitors for potential misuse of registered content, such as unauthorized NFT minting or commercial repurposing [38]. This capability empowers creators to enforce their rights and enables platforms to automate compliance with licensing terms.
Integration with Industry Standards
Numbers Protocol ensures broad interoperability by supporting key industry standards:
- C2PA (Coalition for Content Provenance and Authenticity): Enables embedding of provenance metadata directly into media files, allowing verification even when shared off-chain [9].
- EIP-7053: Defines the standard for on-chain indexing of media and receipt history, ensuring compatibility with Ethereum-based ecosystems [1].
- IPFS CIDv1: Uses content-addressed identifiers for decentralized storage, ensuring data integrity and persistence [24].
These integrations allow provenance data to travel with the asset across platforms, preserving verifiability regardless of distribution channels. This is particularly critical in the age of generative AI, where distinguishing original human-created content from synthetic derivatives is essential for ethical and legal compliance.
By combining cryptographic hashing, decentralized storage, and blockchain-anchored commit logs, Numbers Protocol delivers a comprehensive solution for digital asset registration and provenance tracking—ensuring authenticity, transparency, and long-term integrity in the Web3 and AI era [2].
Identity and Verification: Numbers ID and Asset Profiles
Numbers Protocol establishes a robust identity and verification framework through its core components: the Numbers ID (Nid) and Asset Profiles. These elements function as the backbone of digital asset authentication, enabling verifiable provenance, tamper-evident tracking, and trustless verification across decentralized ecosystems. By combining cryptographic identifiers with rich on-chain metadata, the protocol ensures that every digital asset—from images and videos to AI-generated content—can be uniquely identified, authenticated, and traced throughout its lifecycle.
Numbers ID (Nid): A Decentralized Identifier for Digital Assets
The Numbers ID (Nid) is a cryptographically generated, globally unique identifier assigned to each digital asset registered on the Numbers Protocol. Compliant with the EIP-7053 standard, the Nid functions as a decentralized identifier (DID) for digital and real-world assets, embodying principles of self-sovereignty, persistence, and verifiability [7]. Unlike traditional identifiers tied to centralized registries, the Nid is anchored on the Numbers Blockchain—a Layer 1 network built using Avalanche Subnet technology—ensuring immutability and resistance to tampering [15].
Each Nid is derived from a cryptographic hash of the asset and its associated metadata, creating a content-based fingerprint that binds the identifier directly to the asset’s integrity. This design eliminates reliance on centralized authorities for identity resolution, instead leveraging the blockchain as a decentralized ledger where the Nid serves as a permanent reference point. The identifier enables cross-platform searchability and verification, allowing developers and users to retrieve an asset’s full history using tools such as the Verify Engine API [37].
Although Numbers Protocol does not implement W3C DID syntax (e.g., did:method), the Nid aligns with the functional goals of decentralized identity by supporting trustless authentication, persistent referencing, and interoperability with verifiable credentials [46]. It can be incorporated into credential systems as a subject or issuer identifier, enhancing its utility in self-sovereign identity (SSI) frameworks focused on asset provenance rather than personal identity [7].
Asset Profiles: Digital Certificates of Authenticity
An Asset Profile is a comprehensive digital certificate that functions as a "passport" or "LinkedIn page" for a digital asset, storing verifiable metadata about its provenance, ownership, and usage rights [35]. Each profile is linked to a Numbers ID and contains critical information such as:
- Creator identity and wallet address
- Timestamp of creation and geolocation data
- Device information (e.g., camera model)
- Licensing terms and usage permissions
- Ownership history and transfer records
- A complete log of modifications (commits)
These profiles are stored both on-chain and off-chain, with metadata anchored on the Numbers Blockchain and content preserved via the InterPlanetary File System (IPFS), a decentralized storage network [1]. This hybrid architecture ensures data durability, censorship resistance, and long-term accessibility while maintaining cryptographic integrity.
Asset Profiles support version control through a Git-like commit system, where each modification to the asset is recorded as an immutable on-chain event. These commit logs include timestamps, actor identities, and cryptographic hashes, forming a transparent, auditable trail of the asset’s evolution [22]. Users can query this history via APIs to reconstruct the asset’s state at any point in time, enabling forensic-level verification of authenticity and chain of custody.
Integration with Verifiable Credentials and Zero-Knowledge Proofs
Numbers Protocol enhances the trustworthiness of Asset Profiles by aligning with the W3C Verifiable Credentials Data Model v2.0, enabling interoperable issuance and validation of claims about asset ownership, authenticity, and rights [36]. These credentials are cryptographically signed by the issuer and can be independently verified without reliance on a central authority, supporting privacy-preserving authentication.
To further protect sensitive data, the protocol integrates zero-knowledge proofs (ZKPs), allowing stakeholders to verify aspects of an asset—such as origin, ownership, or integrity—without exposing underlying metadata [2]. For example, a journalist can prove that a photo was taken at a specific time and location without revealing the full chain of custody or associated personal information. This capability is particularly valuable in high-stakes applications like legal evidence, war crime documentation, and AI-generated content verification, where balancing transparency with privacy is essential [4].
Identity Resolution and Recovery Without Centralized Registries
Unlike traditional identity systems that depend on centralized resolution services, Numbers Protocol resolves asset identities through on-chain commit records and decentralized storage. When a user queries a Nid, the system retrieves all associated commits from the blockchain, reconstructs the Asset Profile, and validates authenticity using digital signatures and hash comparisons [33]. This trustless resolution model replaces centralized directories with a transparent, verifiable process that aligns with W3C DID resolution principles [55].
In cases of lost access to private keys, the protocol supports evidentiary recovery—the ability to prove past and current ownership through immutable public records. While direct cryptographic control cannot be restored without the original key, the permanent on-chain history allows third parties to validate claims of ownership, which is particularly useful in intellectual property disputes or legal proceedings [2].
Long-Term Usability and Interoperability
Numbers Protocol is designed for long-term usability in a decentralized digital economy. The permanence of Nid and Asset Profile records ensures that provenance data remains accessible and verifiable indefinitely, supporting applications in media, AI, and physical asset tokenization [57]. The protocol supports multi-chain interoperability, allowing assets registered on Ethereum, Polygon, or BNB Chain to have their provenance anchored on the Numbers Mainnet (Jade), ensuring cross-chain consistency [11].
Through its integration with open standards like Coalition for Content Provenance and Authenticity (C2PA) and IPFS CIDv1, the protocol ensures compatibility with existing content authentication frameworks and decentralized storage ecosystems [59]. This interoperability enables seamless verification even when files are shared off-chain, maintaining integrity and traceability regardless of distribution channels.
Developer Tools, APIs, and SDKs
Numbers Protocol provides a comprehensive suite of developer tools, API, and software development kit designed to streamline the integration of verifiable digital provenance into decentralized applications (dApps), content management systems, and enterprise platforms. These tools empower developers to implement features such as metadata anchoring, provenance tracking, and asset verification with minimal friction, leveraging a modular architecture built on blockchain, decentralized storage, and AI-powered search capabilities [60].
Core APIs for Provenance and Verification
At the heart of the developer ecosystem are several RESTful API that abstract complex blockchain interactions into simple, secure endpoints. These APIs require a valid Capture Token for authentication, which developers obtain by creating a Capture account, ensuring controlled access and usage tracking [61].
The Verify Engine API is a cornerstone of the verification infrastructure, enabling AI-powered detection of exact or visually similar digital assets across supported blockchains such as Numbers, Ethereum, and Polygon [37]. Through the Asset Search API, developers can upload a file, provide a URL, or input a Numbers ID (Nid) to retrieve the full asset history, including ownership, licensing, and modification records [63]. This functionality supports use cases such as copyright enforcement, deepfake detection, and content authentication in journalism.
For provenance tracking, the Initial Asset Registration API allows developers to create the first immutable record of a digital asset, generating a unique Numbers ID (Nid) and anchoring metadata on the blockchain [6]. This process includes pinning the asset to the InterPlanetary File System (IPFS) and optionally backing it up with Filecoin for long-term persistence. Subsequent modifications are recorded using the Commit via API, which submits on-chain "commits" that function like version control in Git, preserving a tamper-evident history of changes [28].
To retrieve historical data, the Read Commits via API enables developers to query the complete commit log of an asset, reconstructing its evolution over time [33]. This audit trail is critical for legal evidence, media verification, and supply chain transparency.
Nit: Git-Like SDK for Web3 Assets
The Nit module is a command-line interface (CLI) and software development kit that brings familiar Git-style workflows to digital asset management in Web3 [67]. With Nit, developers can initialize repositories (nit init), commit changes (nit commit), and push asset histories to the blockchain using simple terminal commands. This abstraction layer handles wallet integration, API key management, and blockchain interactions, significantly lowering the barrier to entry for developers.
Nit integrates with the integrityCid system, a cryptographic identifier that ensures data integrity by hashing asset metadata and content into a single verifiable root stored on InterPlanetary File System (IPFS) [24]. Developers can use the nit log command to inspect an asset’s version history or programmatically access commit data via the Read Commits via Nit Module API [69]. This Git-like paradigm makes provenance tracking intuitive and scalable, especially for media-heavy applications.
Metadata, Storage, and Token Management Tools
Numbers Protocol offers specialized utilities for handling metadata generation and decentralized storage, essential for non-fungible token (NFT) minting and on-chain verification. The Create Metadata on IPFS API automates the generation and pinning of JSON metadata files to InterPlanetary File System (IPFS), ensuring permanent, censorship-resistant access [70]. The XMP Parser Tool extracts embedded metadata from image files (e.g., EXIF, XMP tags), which can then be anchored to the blockchain as part of the provenance record [71].
For token-based access and micropayments, the Fetch NUM Balance API retrieves a user’s NUM token balance across all connected networks (Ethereum, BNB Chain, Numbers Mainnet), enabling dynamic service access controls [72]. The Transfer NUM from Custodial Wallet API allows developers to programmatically move tokens between custodial and non-custodial wallets, facilitating automated payments and incentive distribution [73].
Open-Source Projects and Low-Code Integrations
To accelerate adoption, Numbers Protocol maintains an open-source ecosystem on GitHub under the numbersprotocol organization [74]. Key repositories include nit (Git for Web3 assets), numbers-network (core smart contracts), capture-lite (a verifiable photo-sharing app), and numbers-c2pa (integration with the Coalition for Content Provenance and Authenticity (C2PA) standard) [74].
For no-code developers, the Nit Bubble Plugin enables integration with the Bubble visual programming platform, allowing users to build provenance-enabled applications without writing code [76]. This low-code approach democratizes access to blockchain-based verification tools, supporting rapid prototyping and deployment.
Integration with Web3 and EVM Ecosystems
Numbers Protocol is designed for seamless interoperability with Ethereum Virtual Machine (EVM)-compatible chains such as Ethereum, Polygon, and Avalanche C-chain [20]. Developers can deploy mirrored smart contracts across these networks while anchoring provenance data on the Numbers Mainnet (Jade), a purpose-built Layer 1 blockchain using Avalanche Subnet technology [15]. This hybrid model combines the security of established chains with the efficiency of a dedicated provenance ledger.
The protocol is also integrated with third-party platforms like thirdweb, enabling developers to prototype and deploy dApps using pre-built components and low-cost testnet environments [26]. Wallet integration is simplified through UI components like the ConnectButton from thirdweb’s Connect SDK, supporting popular wallets such as MetaMask and WalletConnect [80].
NFTs and Digital Ownership Models
Numbers Protocol redefines digital ownership by integrating non-fungible tokens (NFTs) into a comprehensive provenance framework that distinguishes between full custody and usage rights. Unlike traditional NFT models that conflate ownership with licensing, Numbers Protocol introduces a dual-token architecture to enable granular control over digital assets, supporting both creator sovereignty and flexible content monetization [12].
Custody NFTs: Anchoring Full Ownership
At the core of Numbers Protocol’s ownership model is the Custody NFT, a non-transferable, soulbound token that represents complete ownership and control over a digital asset. This NFT functions as the foundational proof of authorship and is minted during the initial assetization process, which transforms raw media files—such as images or videos—into verifiable Web3 assets [82].
The Custody NFT is tied to the asset’s Numbers ID (Nid), a unique identifier compliant with the EIP-7053 standard, ensuring cross-platform interoperability and persistent referencing. Because it is non-transferable, the Custody NFT cannot be sold or reassigned, preserving the creator’s ultimate authority over the asset. This design aligns with principles of self-sovereign identity, where creators retain long-term control regardless of how the content is distributed or licensed [12].
License NFTs: Enabling Flexible Usage Rights
Complementing the Custody NFT are License NFTs, which represent transferable usage rights without conveying full ownership. These tokens allow creators to license their work for specific purposes—such as commercial use, redistribution, or display—while retaining copyright and the ability to issue additional licenses. Each License NFT is minted by the holder of the corresponding Custody NFT and contains embedded metadata defining the scope, duration, and conditions of use [12].
This model supports dynamic licensing scenarios in the creator economy, enabling revenue streams through syndication, fractional licensing, and secondary market royalties. The License NFTs are implemented using ERC-721-compatible smart contracts, extended with custom properties such as royalty configurations and provenance metadata, ensuring transparency and automated payments during resale [85].
Smart Contracts and Royalty Enforcement
Ownership and licensing operations are governed by a suite of on-chain smart contracts deployed across multiple EVM-compatible chains, including Ethereum, Polygon, and the Numbers Mainnet (Jade) [20]. These contracts enforce rules around NFT minting, transfers, and royalty distribution, ensuring that creators receive compensation whenever their content is resold or reused.
The Asset Contract manages monetization and copyright enforcement, while the Collection Contract enables grouping of related assets for streamlined licensing. By anchoring these mechanisms on a blockchain built with Avalanche Subnet technology, Numbers Protocol ensures high throughput, low transaction costs, and environmental sustainability—critical for scalable adoption in high-volume content ecosystems [15].
Integration with Developer Tools and Marketplaces
Developers can integrate the dual NFT model into decentralized applications (dApps) using the Numbers Protocol SDK and RESTful APIs. The Nit command-line tool, designed as a Git-like system for media files, allows for version-controlled asset management and seamless NFT minting directly from the command line [67]. Meanwhile, the Verify Engine API enables third-party platforms to validate whether an NFT on OpenSea or another marketplace is backed by legitimate provenance data rooted in the original creator’s capture event [63].
This infrastructure supports interoperability with existing NFT marketplaces and digital asset management (DAM) systems, allowing creators to prove authenticity and ownership even when assets are shared off-chain. Furthermore, integration with Coalition for Content Provenance and Authenticity (C2PA) standards ensures that provenance data remains machine-readable and verifiable across platforms, reinforcing trust in digital ownership claims [59].
Real-World Applications in Intellectual Property
The dual NFT model has practical implications for intellectual property (IP) protection, particularly in the context of AI-generated content and media verification. For instance, photojournalists using the Capture App can mint a Custody NFT at the moment of capture, establishing irrefutable proof of origin for use in legal proceedings or war crime investigations [91]. Similarly, musicians and artists can issue License NFTs to streaming platforms or galleries, ensuring transparent royalty tracking and preventing unauthorized reproduction.
By decoupling ownership from usage rights, Numbers Protocol enables a more equitable and sustainable digital economy—one where creators maintain control, users gain clear licensing terms, and platforms can verify authenticity through decentralized, tamper-proof records [2].
Privacy, Consent, and Regulatory Compliance
Numbers Protocol is designed with privacy, user consent, and regulatory compliance as foundational principles, aligning its decentralized architecture with major data protection frameworks such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). By embedding privacy-by-design and privacy-by-default practices into its core infrastructure, the protocol ensures that users retain control over their digital content and personal data while enabling verifiable authenticity and ownership [8].
Privacy-by-Design and Data Minimization
The protocol adheres to the principle of data minimization, a key requirement under both GDPR and CCPA, by recording only essential metadata related to digital provenance rather than storing large volumes of personal information on-chain. This metadata includes timestamps, geolocation, device information, and creator identifiers, but avoids capturing or exposing sensitive personal data unnecessarily [8]. The actual media content is stored off-chain using the InterPlanetary File System (IPFS), with only cryptographic hashes—such as the integrityCid—anchored on the blockchain. This separation ensures that while provenance remains immutable, access to the underlying content can be controlled and restricted, supporting user privacy and minimizing exposure risks.
This architecture reflects a commitment to decentralized identity principles, where users maintain sovereignty over their digital presence without relying on centralized authorities. The use of verifiable credentials aligned with W3C standards further enhances privacy, enabling authentication and provenance verification without revealing unnecessary personal details [46].
User Consent and Control Mechanisms
User consent is a central component of Numbers Protocol’s approach to digital rights. The registration process for digital assets—facilitated through tools like the Capture App—is opt-in and requires explicit user approval before any content is pinned to decentralized storage [96]. This ensures that creators maintain granular control over when and how their content is recorded, shared, or verified. Users can also manage visibility settings and access permissions, reinforcing their autonomy in accordance with GDPR’s requirement for informed, specific, and freely given consent.
The protocol supports dynamic updates to asset metadata, allowing creators to modify licensing terms or signal changes in usage rights over time. While the blockchain records remain immutable, these updates enable evolving consent expressions, such as restricting commercial use or withdrawing permission for redistribution. This functionality supports CCPA’s consumer rights, including the ability to opt out of data sales and request disclosure of how personal information is used.
Addressing the Right to Erasure in an Immutable System
One of the most significant challenges for blockchain-based systems under GDPR and CCPA is reconciling the right to erasure (also known as the “right to be forgotten”) with the inherent immutability of distributed ledgers. Numbers Protocol addresses this tension through a layered data model: while cryptographic hashes and provenance records are permanently stored on the Numbers Blockchain, the actual media files reside off-chain in decentralized storage networks like IPFS and Filecoin [6].
In practice, this means that although the on-chain reference (e.g., the integrityCid) persists, the associated content can be deleted or de-referenced from off-chain storage, rendering it inaccessible. This technical capability allows for effective implementation of erasure requests without compromising the integrity of the provenance system. Additionally, the protocol supports mechanisms such as commit updates and asset history management via API, enabling users to manage their digital footprint and signal withdrawal of consent [11].
Regulatory Alignment and International Standards
Numbers Protocol aligns with international regulatory expectations by adhering to recognized standards for information security and digital trust. It complies with ISO/IEC 27001 for information security management, ensuring robust safeguards for data confidentiality, integrity, and availability [11]. This alignment strengthens its credibility in cross-border deployments and supports interoperability across jurisdictions with differing data governance models.
Furthermore, the protocol integrates with the Coalition for Content Provenance and Authenticity (C2PA) standard, which embeds tamper-evident metadata directly into media files. This allows provenance and consent information to travel with the content even when shared off-chain, enhancing transparency and traceability in global distribution channels [9]. Such interoperability supports compliance with evolving regulatory demands for content authenticity, particularly in media, journalism, and AI-generated content ecosystems.
Privacy-Preserving Verification with Zero-Knowledge Proofs
To further enhance privacy while maintaining verifiability, Numbers Protocol explores the integration of zero-knowledge proofs (ZKPs), a cryptographic technique that allows one party to prove the validity of a statement—such as ownership or content integrity—without revealing the underlying data [8]. For example, a journalist could cryptographically verify that a photo was taken at a specific time and location without disclosing the full chain of custody or associated personal information.
This approach supports high-stakes applications such as legal evidence in war crime investigations or authentication of election coverage, where verifying authenticity must be balanced with protecting sensitive data. By enabling trustless, privacy-preserving verification, the protocol ensures that stakeholders can validate digital claims without compromising confidentiality.
Equitable Access and Inclusion in Low-Resource Contexts
Beyond regulatory compliance, Numbers Protocol is designed to promote equitable access and prevent the exclusion of marginalized communities, especially in regions with limited digital infrastructure. Its decentralized architecture supports offline functionality: once assets are registered, their provenance can be verified without continuous internet connectivity, making it viable for use in remote or conflict-affected areas [2].
The protocol’s use of Avalanche Subnet technology ensures low transaction costs and energy efficiency, reducing economic and environmental barriers to participation. Unlike centralized digital ID systems that often exclude individuals lacking formal documentation, Numbers Protocol focuses on content provenance rather than personal identity, avoiding bureaucratic exclusion and supporting digital sovereignty for underserved populations [103].
Conclusion
Numbers Protocol navigates the complex landscape of privacy, consent, and regulatory compliance through a combination of technical innovation, standards alignment, and human-centric design. By minimizing data collection, supporting user-controlled consent, and enabling practical responses to erasure requests, it reconciles the demands of immutability with the rights enshrined in GDPR and CCPA. Its integration of verifiable credentials, zero-knowledge proofs, and open standards like C2PA ensures that privacy is preserved without sacrificing transparency or trust. As digital content becomes increasingly central to legal, journalistic, and creative domains, Numbers Protocol offers a compliant, inclusive, and privacy-preserving foundation for the future of digital provenance.
Use Cases and Real-World Implementations
Numbers Protocol has been deployed across a diverse range of high-impact domains, establishing verifiable provenance for digital content in contexts where authenticity, trust, and accountability are paramount. By anchoring immutable records of origin, ownership, and modification history on a decentralized blockchain, the protocol enables tamper-proof verification of digital assets, supporting applications in journalism, legal evidence, election integrity, intellectual property protection, and governmental transparency. These real-world implementations demonstrate how decentralized provenance systems can address systemic challenges related to misinformation, content manipulation, and digital rights enforcement.
War Crime Investigations and Human Rights Documentation
One of the most significant real-world applications of Numbers Protocol is in the documentation of war crimes and human rights violations. The protocol was deployed in Ukraine to securely catalog and preserve digital evidence of atrocities, ensuring that photojournalistic and video content used in international accountability efforts maintains an unbroken chain of custody [91]. In collaboration with the Starling Lab and Rolling Stone, Numbers Protocol provided a blockchain-based infrastructure that verifies the authenticity of media at the point of capture, making it admissible in legal and humanitarian contexts [4]. This use case underscores the protocol’s role in safeguarding truth in conflict zones, where digital evidence is often subject to tampering, denial, or suppression.
Election Integrity and Media Verification
Numbers Protocol has played a critical role in verifying media coverage during major democratic elections, helping to combat misinformation and ensure public trust in electoral processes. It was used to authenticate news content from outlets like Reuters during the 2020 U.S. Presidential Election, as well as the 2024 elections in Taiwan and Indonesia [4]. In Taiwan, the protocol supported China Times through its Capture Eye technology, enabling real-time verification of political reporting and enhancing transparency in a high-stakes media environment [107]. By providing immutable records of when, where, and by whom digital content was created, Numbers Protocol helps distinguish legitimate journalism from synthetic or manipulated media, reinforcing democratic institutions in the face of disinformation campaigns.
Governmental Transparency and Legislative Accountability
Governments have adopted Numbers Protocol to ensure the integrity and public accessibility of official information. In Taiwan, blockchain verification powered by Numbers Protocol was used to authenticate legislative reform content during periods of political unrest, ensuring that official communications remained auditable and resistant to tampering [108]. This application demonstrates how decentralized provenance systems can support governmental transparency by making public records verifiable and immutable, even in politically volatile environments. The protocol’s ability to provide a neutral, trust-minimized layer of verification makes it a valuable tool for public sector applications, including the archiving of legal documents, public service announcements, and policy communications.
Web3 Creator Economy and Intellectual Property Protection
Numbers Protocol empowers digital creators—artists, photographers, musicians, and content producers—by enabling them to establish verifiable ownership and track the usage of their work in the Web3 ecosystem. Through on-chain provenance records, creators can prove authorship, monitor unauthorized reproductions, and enforce licensing terms [4]. The protocol supports transparent royalty distribution and integrates with the Verify Engine API to detect potential misuse of content, including unauthorized NFT minting or redistribution [38]. This functionality is particularly crucial in the age of generative AI, where training data and synthetic outputs challenge traditional notions of copyright and attribution. By providing cryptographic proof of origin, Numbers Protocol helps protect creators’ rights and enables new models for fair compensation and attribution-based micropayments.
Journalism and News Media Authentication
In the field of journalism, Numbers Protocol combats the proliferation of deepfakes and AI-generated misinformation by embedding verifiable provenance into news content at the point of creation. The protocol’s integration with camera systems and editorial workflows allows journalists to generate tamper-evident records that include device information, geolocation, and timestamps, all anchored on the Numbers Blockchain [2]. This capability was recognized by the Google News Initiative, which awarded a grant to Numbers Protocol in October 2025 to advance content provenance infrastructure for media organizations [112]. By functioning as a decentralized “GitHub” for digital media, the protocol enables publishers to authenticate visual evidence, verify sourcing, and maintain credibility in an era of synthetic content.
E-Commerce and Brand Integrity
In e-commerce, Numbers Protocol enhances brand integrity by authenticating product content such as images, 3D models, and marketing videos. Brands can register original product visuals on the blockchain, creating a verifiable asset profile that includes creation timestamp, geolocation, and licensing terms [113]. This allows retailers and consumers to confirm that product representations have not been altered or falsely attributed, reducing the risk of fraud and counterfeit listings. The protocol’s support for decentralized storage via the InterPlanetary File System (IPFS) and integration with Filecoin ensures long-term availability and integrity of digital product content, while the Verify Engine API enables automated detection of unauthorized use across online marketplaces.
Integration with Developer and Enterprise Workflows
Numbers Protocol supports seamless integration into existing content creation and distribution ecosystems through a comprehensive suite of developer tools, API, and SDK. Enterprises and developers can embed provenance functionality into content management system (CMS) and digital asset management (DAM) platforms using tools such as the Initial Asset Registration API, Commit via API, and Asset Search API [6]. These tools operate on a pay-per-use model secured by Capture Token and are designed to work across EVM-compatible chains like Ethereum and Polygon, ensuring scalability and interoperability [37]. This developer-friendly stack lowers the barrier to entry for organizations seeking to implement digital provenance without overhauling existing infrastructure, making it accessible for both startups and large institutions.
Alignment with Industry Standards and Regulatory Frameworks
Numbers Protocol enhances its real-world applicability by aligning with open industry standards such as the Coalition for Content Provenance and Authenticity (C2PA), which enables tamper-evident metadata to be embedded directly into media files [9]. This integration ensures that provenance data remains machine-readable and verifiable even when content is shared off-chain, supporting cross-platform compatibility. The protocol also adheres to regulatory frameworks like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), implementing privacy-by-design principles, data minimization, and user consent mechanisms to protect digital rights [8]. This dual focus on technical robustness and regulatory compliance positions Numbers Protocol as a foundational layer for ethical and legally defensible digital content ecosystems.
Interoperability and Integration with Standards
Numbers Protocol is designed from the ground up to ensure broad interoperability and seamless integration with established industry standards, enabling verifiable digital provenance to function across diverse platforms, blockchains, and regulatory environments. By aligning with open protocols and decentralized infrastructure, the protocol bridges the gap between emerging Web3 systems and legacy content ecosystems, ensuring that authenticity and ownership data remain persistent, machine-readable, and globally accessible.
Multi-Chain Blockchain Interoperability
Numbers Protocol supports cross-chain interoperability through its native utility token, NUM, which exists across multiple blockchain networks including Ethereum (as an ERC-20 token), BNB Chain (as a BEP-20 token), and the Numbers Mainnet (Jade), a dedicated Layer 1 blockchain built on Avalanche Subnet technology [20]. Users can transfer NUM tokens between these chains using trusted bridges such as Chainport.io, enabling liquidity and accessibility across different Web3 environments [20]. This multi-chain approach allows developers to deploy applications on familiar EVM-compatible chains while anchoring critical provenance data on the Numbers Mainnet, which is optimized for low-cost, high-throughput media verification.
Assets registered on external blockchains—including Ethereum, Polygon, and Avalanche C-chain—can have their provenance history anchored on the Numbers blockchain, ensuring a unified, tamper-proof record regardless of the originating network [11]. This hybrid model supports decentralized applications (dApps) that require both broad user access and secure, immutable provenance tracking, making Numbers Protocol a cross-chain provenance layer for digital assets.
Alignment with C2PA and Content Credentials
A cornerstone of Numbers Protocol’s interoperability strategy is its integration with the Coalition for Content Provenance and Authenticity (C2PA), an industry consortium that has developed the Content Credentials standard—a tamper-evident metadata framework for digital media [9]. By supporting C2PA specifications, Numbers Protocol enables the embedding of cryptographic signatures and provenance data directly into image and video files, creating a verifiable “nutrition label” that travels with the content even when shared off-chain [59].
This integration ensures that assets verified on Numbers Protocol can be authenticated by any system compliant with C2PA, including platforms from Adobe, Microsoft, and Intel. It also allows creators to generate C2PA-injected files using the Numbers Capture API, enabling seamless adoption in professional media workflows [123]. By combining blockchain anchoring with C2PA’s client-side metadata embedding, Numbers Protocol offers a dual-layer verification system that enhances trust without relying on centralized authorities.
Support for Web3 and Identity Standards
Numbers Protocol aligns with key Web3 standards to ensure compatibility with decentralized identity and asset management systems. The protocol assigns each digital asset a unique, EIP-7053-compliant identifier known as a Numbers ID (Nid), which functions as a decentralized identifier (DID) for media assets [7]. While not a W3C DID in syntax, the Nid embodies core DID principles—self-sovereignty, persistence, and verifiability—by decoupling identity from centralized registries and anchoring it to the blockchain.
The protocol also supports verifiable credentials in alignment with W3C standards, allowing for trustless, privacy-preserving authentication of ownership, creator attribution, and licensing rights [46]. These credentials are cryptographically signed and anchored on-chain, ensuring their integrity and enabling independent verification without third-party intermediaries. This integration supports self-sovereign identity (SSI) frameworks and allows Numbers Protocol to function as a decentralized root of trust for digital media provenance.
Interoperability with Decentralized Storage and Data Formats
To ensure long-term data integrity and accessibility, Numbers Protocol leverages the InterPlanetary File System (IPFS) for decentralized storage of digital assets and their associated metadata [1]. Each asset is assigned a content identifier (CID), derived from its cryptographic hash, which ensures that any alteration to the file breaks the chain of trust. The protocol uses a specialized structure called the assetTree, whose root hash—known as the integrityCid—is stored on-chain, linking off-chain content to immutable on-chain records [24].
By adhering to IPFS CIDv1 standards, Numbers Protocol ensures compatibility with the broader Web3 stack, including tools for content retrieval, pinning, and redundancy. Storage is often backed by Filecoin for long-term persistence, further enhancing data durability and censorship resistance [25].
Developer and Enterprise Integration
Numbers Protocol facilitates integration with existing content management systems (CMS), digital asset management (DAM) platforms, and AI pipelines through a comprehensive suite of developer tools. The Verify Engine API enables content-based search and verification using perceptual hashing and AI, allowing developers to detect exact or similar assets across blockchains and networks [37]. This API supports advanced search parameters such as Numbers ID, file hash, and token contract address, making it suitable for copyright enforcement, media authentication, and AI training data validation.
Additional tools include the Initial Asset Registration API, Commit via API, and Read Commits APIs, which allow enterprises to automate provenance tracking and integrate with editorial workflows [6]. The Nit CLI—a Git-like command-line tool—enables developers to manage media versioning and provenance using familiar workflows, abstracting blockchain complexity while maintaining decentralization [67].
Through its commitment to open standards, multi-chain support, and developer-friendly tooling, Numbers Protocol establishes a foundational layer for digital trust that is both interoperable and future-proof, enabling verifiable provenance to scale across industries and technological paradigms.
Governance and Ecosystem Development
Numbers Protocol fosters a decentralized and community-driven approach to governance and ecosystem development, centered around transparency, inclusivity, and long-term sustainability. The protocol’s governance model is designed to empower stakeholders—including creators, developers, validators, and users—to participate in decision-making processes that shape the evolution of the network, while ensuring alignment with its core principles of digital sovereignty, privacy, and verifiable provenance.
Decentralized Governance via NumbersDAO
At the heart of Numbers Protocol’s governance structure is NumbersDAO, a decentralized autonomous organization that enables token-based voting and community-led decision-making [132]. This governance framework allows holders of the native utility token, NUM, to propose, discuss, and vote on key initiatives such as protocol upgrades, treasury allocations, incentive programs, and strategic partnerships. By distributing influence across a broad base of participants, NumbersDAO mitigates the risks of centralized control and promotes equitable representation within the ecosystem.
The governance process follows transparent rules outlined in the Governance and Voting Rules v2.0, which define quorum thresholds, proposal submission criteria, and voting duration to ensure fairness and prevent manipulation [133]. This structured yet flexible model supports iterative improvements to the protocol while maintaining accountability and openness.
Token-Based Incentives and Staking
The NUM token plays a central role in securing the network and incentivizing participation through a delegated proof-of-stake (DPoS) consensus mechanism. Validators and delegators stake their tokens to support network security, earn rewards, and gain voting power in governance decisions [13]. This economic model aligns incentives across stakeholders, encouraging active engagement in both technical operations and ecosystem development.
Staking not only enhances network resilience but also enables users to contribute to the decentralization of the Numbers Mainnet (Jade), which is built on Avalanche Subnet technology. By lowering barriers to entry for validators and offering predictable returns, the protocol fosters a diverse and geographically distributed set of node operators, further strengthening its decentralized foundation.
Community Empowerment and Global Inclusion
Numbers Protocol prioritizes equitable access and inclusion through initiatives that empower marginalized communities and support participation in regions with limited digital infrastructure. The protocol’s commitment to privacy-by-design and open standards ensures that users do not need formal identification or centralized credentials to assert ownership of digital assets, reducing systemic exclusion risks often seen in national digital ID systems [103].
To promote global engagement, the protocol supports ambassador programs, local community chapters, and open collaboration channels via platforms like Telegram and GitHub, enabling grassroots involvement in ecosystem growth [136]. These efforts lower barriers for non-technical contributors and ensure diverse voices are represented in shaping the protocol’s future.
Open-Source Development and Standards Alignment
The protocol’s ecosystem thrives on open-source development, with all core components—including smart contracts, APIs, and SDKs—publicly available on GitHub under permissive licenses such as MIT and GPL-3.0 [74]. This transparency fosters trust, enables independent audits, and invites global developers to build, customize, and extend the protocol’s functionality.
Numbers Protocol actively contributes to and aligns with industry-wide standards such as Coalition for Content Provenance and Authenticity (C2PA), ERC-7053, and verifiable credentials, ensuring interoperability across platforms and reinforcing its role as a foundational layer for digital trust [8]. By adhering to these open specifications, the protocol enables seamless integration with external systems while avoiding vendor lock-in.
Sustainable and Scalable Infrastructure
Built on a purpose-built Layer 1 blockchain, the Numbers Mainnet (Jade) is optimized for cost-efficiency, high throughput, and environmental sustainability using energy-efficient consensus mechanisms [15]. This sustainable infrastructure reduces economic and ecological barriers to participation, making it accessible to individuals and organizations regardless of financial capacity.
The protocol’s long-term vision includes a gradual transition from a permissioned to a fully permissionless mainnet, further enhancing decentralization and democratizing access to governance [19]. This evolutionary approach balances operational integrity with progressive decentralization, ensuring the ecosystem matures in a secure and inclusive manner.
Real-World Impact and Institutional Recognition
Numbers Protocol’s governance and ecosystem development model has been recognized for advancing digital trust and transparency. In 2024, the U.S. National Institute of Standards and Technology (NIST) acknowledged the protocol for its contributions to digital content integrity, underscoring its credibility in meeting rigorous technical and ethical benchmarks [141].
Additionally, the protocol received a grant from the Google News Initiative to strengthen content provenance in journalism, demonstrating institutional confidence in its ability to support trustworthy information ecosystems [112]. These endorsements validate its role in fostering a human-centered, decentralized digital future.