Skip to content

Nexus 2 — Trust & Privacy

Layer 1: Identity Protocol · 9 MCP Endpoints · Status: In Development

Nexus 2 is the trust layer of the sovereign economy. Prove you are an accredited investor without revealing your net worth. Prove a smart contract passed formal verification without revealing its source code. Selective disclosure, powered by zero-knowledge proofs.

  • DID Management: Create, resolve, and manage Decentralized Identifiers across multiple methods (did:key, did:web, did:ethr, did:pkh).
  • Verifiable Credentials: Issue and verify W3C-standard Verifiable Credentials — portable, tamper-evident, cryptographically signed.
  • ZK Proof Generation: Generate zero-knowledge proofs for selective attribute disclosure. The verifier learns the claim is true without learning anything else.
  • Trust Path Resolution: Trace credential chains to establish trust between unfamiliar parties.
Claim: "I am an accredited investor"
Proof: ZK proof that net_worth > threshold
Revealed: The boolean result (true/false)
Not revealed: Actual net worth, source of funds, bank name

Every operation across the stack references Nexus 2 for identity verification. The agent navigation protocol always ends with a Nexus 2 verification step — ensuring all results are cryptographically attested.

TypeEndpointDescription
Resourcenexus2.did_registryDID document registry
Resourcenexus2.credential_schemasAvailable credential types
Resourcenexus2.zk_circuitsZK circuit catalog
Resourcenexus2.trust_graphWeb-of-trust relationships
Toolnexus2.verify_identityVerify a DID and resolve its document
Toolnexus2.prove_attributeGenerate a ZK proof for an attribute
Toolnexus2.resolve_didResolve a DID to its full document
Workflownexus2.credential_issuanceFull credential lifecycle
Workflownexus2.identity_verificationComplete identity verification flow

Nexus 2 embodies the three constitutional constraints of the stack:

  1. Privacy — ZK proofs ensure minimum disclosure
  2. Sovereignty — Self-custody of keys, credentials, and delegations
  3. Cryptographic proof — Every claim verifiable on-chain

These are not features. They are immutable architectural constraints.

Timeline: Q2-Q3 2026 (partial with Layer 1, full with Layer 2)