• bitcoinBitcoin (BTC) $ 42,977.00 0.18%
  • ethereumEthereum (ETH) $ 2,365.53 1.12%
  • tetherTether (USDT) $ 1.00 0.2%
  • bnbBNB (BNB) $ 302.66 0.19%
  • solanaSolana (SOL) $ 95.44 1.28%
  • xrpXRP (XRP) $ 0.501444 0.1%
  • usd-coinUSDC (USDC) $ 0.996294 0.34%
  • staked-etherLido Staked Ether (STETH) $ 2,367.26 1.4%
  • cardanoCardano (ADA) $ 0.481226 2.68%
  • avalanche-2Avalanche (AVAX) $ 34.37 1.19%
  • bitcoinBitcoin (BTC) $ 42,977.00 0.18%
    ethereumEthereum (ETH) $ 2,365.53 1.12%
    tetherTether (USDT) $ 1.00 0.2%
    bnbBNB (BNB) $ 302.66 0.19%
    solanaSolana (SOL) $ 95.44 1.28%
    xrpXRP (XRP) $ 0.501444 0.1%
    usd-coinUSDC (USDC) $ 0.996294 0.34%
    staked-etherLido Staked Ether (STETH) $ 2,367.26 1.4%
    cardanoCardano (ADA) $ 0.481226 2.68%
    avalanche-2Avalanche (AVAX) $ 34.37 1.19%
image-alt-1BTC Dominance: 58.93%
image-alt-2 ETH Dominance: 12.89%
image-alt-3 BTC/ETH Ratio: 26.62%
image-alt-4 Total Market Cap 24h: $2.51T
image-alt-5Volume 24h: $144.96B
image-alt-6 ETH Gas Price: 5.1 Gwei
 

MORE FROM SPONSORED

LIVE Web3 News

 

ARTICLE INFORMATION

OpenAI eyes a social network for real users

OpenAI eyes a social network using real people and biometric verification

Salma Al-Tamimi

Key Points

  1. The project targets real users, using biometric verification and stronger bot detection across accounts.

  2. Proof of personhood options may include Apple Face ID and Worldcoin World ID checks.

  3. The team explores privacy and security while enabling AI tools for image and video creation.

  4. Success depends on adoption, clear transparency, and low friction during identity onboarding and appeals.


OpenAI eyes a social network that promises real users and cleaner conversations across public feeds.

It puts the identity in the middle, attaching profiles to individuals using biometric authentication and/or device verification. Proponents hope for fewer spam responses, fewer scam attempts, and improved moderation results. Detractors have concerns regarding centralized personal information and the permanent nature of biometric authentication in case of breaches. According to the report, there is a small team (less than 10) working on this right now. The team’s roadmap includes an examination of proof of personhood using Apple’s Face ID as well as iris credentials from Worldcoin World ID (the latter uses a single unique credential with a focus on privacy). The ultimate goal is to exceed the limitations of detecting bots, currently frustrating all of today’s platforms.

A simple premise, the pitch claims that every visible profile belongs to a “real” person, accountable for their actions. That basis may significantly decrease reply spam and brigading by automated bots across hot topics and keywords. A stricter baseline will also strengthen trust signals throughout the ranking and recommendation systems. If accounts are tied to verified humans, then platform rules and regulations will be enforceable, yet will lack the broad-based shadow bans used historically.

OpenAI views a Social Network

Biometric verification has been the most powerful tool for stopping industrial bot farms at scale. Photo checks and fingerprinting devices help; however, they have not kept pace with the speed at which attackers create new iterations and policy teams develop responses. Verification of personhood provides a long-lasting barrier to entry that automated scripts cannot easily mimic. Apple Face ID will fit into consumers’ existing habits as it reduces friction, as it is something that many consumers use each day. Worldcoin World ID represents a separate strategy, one that adds a layer of privacy protection while avoiding the sharing of raw biometric information.

The credential verifies the user’s uniqueness and does not share any information related to the user’s identity. Combining these two options may allow developers to accommodate a wide range of comfort levels, geographic locations, and regulatory environments simultaneously.


ANOTHER MUST-READ ON ICN.LIVE

Prediction markets offering across 50 U.S. states grows via Coinbase Kalshi

 

Privacy Choices & Accountability

There are going to be some difficult questions that will need to be addressed prior to a wide-scale acceptance of the onboarding process. Where do templates reside? Who has access to the templates? How will template revocation work over time? Users deserve to know exactly what happens to their deleted data (i.e., templates), that there are visible logs of all interactions with data, and that there are independent auditors who verify compliance with all aspects of storage and transport. Developers should utilize Zero-Knowledge techniques wherever possible in order to limit the impact of potential incidents.

Retention of data should be limited in time to minimize the risk of exposure due to unforeseen vulnerabilities. Any requests by governments for data should include transparently stated disclosure requirements for regional and country-specific variations in identity laws. Regional variations in identity laws affect parental controls, alternative verification methods, and the clarity of off-ramps for vulnerable populations during the onboarding process.

Identifying users will enable more than just anti-spam functionality; it will allow for safer feeds and richer participation incentives for users. Verified accounts will be able to post AI-generated images without overwhelming other users with low-quality content. Rate limits can be tied to trust scores so that users who are more trusted will be allowed to share more content, especially during high-volume posting periods such as news events.

Payment functions, creator payment models, and ticketing systems will be improved once verified users are less likely to be part of fraud rings. Moderation teams will also benefit from the ability to identify and act upon offending users much quicker than current systems allow, thereby allowing public conversations to occur with more authenticity since repeat offending users will not be able to produce the same level of influence.

Adoption Hurdles & Network Effects

Onboarding for identity verification introduces friction into the onboarding process, which can negatively impact initial growth unless the value proposition is immediately apparent. Benefits such as verified comment privileges and increased ranking within a feed may alleviate some of the pain associated with additional steps required to sign up. Onboarding may be streamlined for larger audience segments by partnering with phone manufacturers, mobile carriers, and financial institutions. Bot detection will continue to occur after launch as bad actors continually seek to circumvent and test every entry point.

Security teams will need to have pre-determined playbooks in place, quick patch development, and bounty programs that incentivize the discovery of biometric bypass attacks. Feedback from community councils and academia will provide a mechanism to identify biases and edge cases. Effective communication will be key to explaining why certain types of verification are required and how appeals for legitimate errors will be resolved in a timely manner. Through continuous iteration, privacy and security will advance hand-in-hand, and trust will compound throughout the network.

SHARE

Why focus on biometric verification for a new social network?

A biometric gate sets a higher bar for automated abuse across comments, reposts, and messages. Device fingerprints and phone checks help, but attackers rotate numbers and farms quickly. Proof of personhood links accounts to people, which disrupts industrial spam at the source. Apple Face ID aligns with habits people already understand on modern phones. Worldcoin World ID separates uniqueness from identity, supporting privacy and security without sharing raw biometrics. A layered system protects against single point failures, improving resilience under sustained attacks. The platform should also maintain bounties for bypass attempts, plus independent audits. Clear deletion options and transparent logs help users trust enrollment, revocation, and appeals processes.

How will privacy be protected if biometric checks are involved?

Privacy must start with strict data minimization across collection, storage, and transmission. Templates should never leave secure enclaves unnecessarily, and retention windows should remain short. Worldcoin World ID helps because it confirms uniqueness without broadcasting underlying biometrics broadly. The system must publish audits, red team results, and regular transparency reports for accountability. Encryption, hardware isolation, and rate limiting reduce the blast radius during possible incidents. Users need self service tools for revocation, export, and deletion across linked accounts. Governments will submit requests, so the platform needs clear notices and aggregate reporting. Independent oversight boards and researchers should monitor for bias, errors, and silent failures.

What benefits would verified identity bring to daily users and creators?

People experience cleaner replies, fewer scams, and faster moderation across sensitive topics. Verified users can access higher posting limits and better ranking inside recommendation systems. Creators see improved payout integrity because sock puppets cannot inflate impressions or clicks. Payment rails and commerce features work better when fraud rings cannot respawn overnight. Community discussions stabilize because repeat offenders lose reach quickly after violations. Identity signals also help reduce fake giveaways and phishing links across comments. AI content tools operate safely when trust scores limit spammy uploads and replies. Over time, these incentives convert friction into value, especially for active communities and brands.

What risks remain, even with strong verification and bot detection?

High friction during onboarding might slow early growth unless benefits appear quickly and clearly. People worry about irreversible biometrics, so the platform must offer practical off ramps. Clear appeals, temporary passes, and alternatives calm fears during failed checks or outages. Attackers will probe for leaks, replay attacks, and identity resets across forgotten devices. Security teams need layered defenses, rapid patch cycles, and partnerships with external researchers. Regional regulations vary, influencing minors’ enrollment, parental consent, and sensitive data handling rules. Misuse by bad actors inside organizations remains possible, so strict access controls are essential. Ongoing communication, measured rollouts, and independent audits help maintain trust as features evolve.

FEATURED

EVENTS

Days
Hr
Min
Sec
 

ICN TALKS EPISODES