Nexus 2 — Trust & Privacy
Layer 1: Identity Protocol · 9 MCP Endpoints · Status: In Development
Nexus 2 is the trust layer of the sovereign economy. Prove you are an accredited investor without revealing your net worth. Prove a smart contract passed formal verification without revealing its source code. Selective disclosure, powered by zero-knowledge proofs.
What It Does
Section titled “What It Does”- DID Management: Create, resolve, and manage Decentralized Identifiers across multiple methods (
did:key,did:web,did:ethr,did:pkh). - Verifiable Credentials: Issue and verify W3C-standard Verifiable Credentials — portable, tamper-evident, cryptographically signed.
- ZK Proof Generation: Generate zero-knowledge proofs for selective attribute disclosure. The verifier learns the claim is true without learning anything else.
- Trust Path Resolution: Trace credential chains to establish trust between unfamiliar parties.
Key Capabilities
Section titled “Key Capabilities”Selective Disclosure
Section titled “Selective Disclosure”Claim: "I am an accredited investor"Proof: ZK proof that net_worth > thresholdRevealed: The boolean result (true/false)Not revealed: Actual net worth, source of funds, bank nameCross-Nexus Verification
Section titled “Cross-Nexus Verification”Every operation across the stack references Nexus 2 for identity verification. The agent navigation protocol always ends with a Nexus 2 verification step — ensuring all results are cryptographically attested.
MCP Endpoints
Section titled “MCP Endpoints”| Type | Endpoint | Description |
|---|---|---|
| Resource | nexus2.did_registry | DID document registry |
| Resource | nexus2.credential_schemas | Available credential types |
| Resource | nexus2.zk_circuits | ZK circuit catalog |
| Resource | nexus2.trust_graph | Web-of-trust relationships |
| Tool | nexus2.verify_identity | Verify a DID and resolve its document |
| Tool | nexus2.prove_attribute | Generate a ZK proof for an attribute |
| Tool | nexus2.resolve_did | Resolve a DID to its full document |
| Workflow | nexus2.credential_issuance | Full credential lifecycle |
| Workflow | nexus2.identity_verification | Complete identity verification flow |
The Cypherpunk Trinity
Section titled “The Cypherpunk Trinity”Nexus 2 embodies the three constitutional constraints of the stack:
- Privacy — ZK proofs ensure minimum disclosure
- Sovereignty — Self-custody of keys, credentials, and delegations
- Cryptographic proof — Every claim verifiable on-chain
These are not features. They are immutable architectural constraints.
Timeline: Q2-Q3 2026 (partial with Layer 1, full with Layer 2)