Identity & Compliance

Governance Structure

Envorum is a technological platform.

  • Centralized Responsibility: We do not shift legal liability onto vague structures (like DAOs). Moderation rules, verification standards, and terms of use are defined by the platform operator to ensure compliance with international law.

  • Community Feedback: The community influences product development through feedback mechanisms but does not have direct control over the treasury or code, ensuring system stability and security.


Envorum is a regulated platform for handling real assets and financial flows. To ensure fund security and compliance with international standards (AML/CTF), we have integrated the industrial-grade identity and business verification solution Sumsub.

We adhere to the "Progressive Identity" principle: users can explore the app anonymously, but any financial operations (reward withdrawals, fundraising) and event creation require verification.


1. Verification Standards

The protocol separates verification procedures for individuals and legal entities.

πŸ‘€ KYC (Know Your Customer)

For individuals (Activists, Volunteers, Donors). The process takes 2-3 minutes and takes place within the app via the Sumsub SDK.

  1. Liveness Check: Biometric facial verification (3D Liveness) to protect against bots, deepfakes, and the use of stolen photos.

  2. ID Verification: Scanning a passport or driver's license (OCR + hologram check).

  3. AML Screening: Automatic checking against global databases (Sanction lists, PEPs, wanted lists).

🏒 KYB (Know Your Business)

For organizations (NGOs, Foundations, Companies). Required to create official fundraising campaigns and receive closing documents.

  1. Corporate Registry: Verification of company registration documents.

  2. UBO Verification: Identification of Ultimate Beneficial Owners.

  3. Compliance: Confirmation of the right to collect donations (for NGOs and Charity Foundations).


2. Account Tiers

Depending on the verification status, the account is assigned a specific access level to protocol functions.

Feature
πŸŒ‘ Guest (Unverified)
πŸ‘€ Verified User
🏒 Organization
⭐ Celebrity

Map Access

βœ… View Only

βœ… Full Access

βœ… Full Access

βœ… Full Access

Event Participation

βœ… Yes

βœ… Yes

βœ… Yes

βœ… Yes

Event Creation

❌ No

βœ… (Limited)

βœ… (Unlimited)

βœ… (Boost Mode)

Rewards

❌ No (Accumulate only)

βœ… Withdraw

βœ… Withdraw

βœ… Withdraw

Fundraising

❌ No

βœ… (Micro-Crowdfunding)

βœ… (Corp. Grants)

βœ… (Charity Campaigns)

Public Profile

Basic

βœ… On-chain CV

βœ… Official Page

βœ… Verified


3. Celebrity Role (Influencers)

A special account type for opinion leaders, stars, and public figures.

  • Verification: Manual check by the Envorum team + KYC completion.

  • Impact Multiplier: Celebrity participation in an event automatically boosts it to the top of the Map and Feed.

  • Trust: The verification checkmark protects the audience from fake fundraisers created in the star's name.


4. Anti-Sybil Protection (Bot Protection)

In Reward-for-Action systems, preventing multi-accounting (creating bot farms to harvest rewards) is critical.

Envorum solves this at the architectural level:

  1. Biometric Lock: The "One Person = One Account" principle. Liveness technology prevents retaking KYC with the same face, even if the user possesses a different document.

  2. Soulbound Reputation: Reputation (XP) is tied to identity. In the event of a ban for fraud, the user loses their accumulated social capital and cannot return to the system.


Envorum adheres to a zero-tolerance policy regarding fraud. We are building a transparent financial ecosystem and actively cooperate with law enforcement agencies to prevent cybercrime.

πŸš” Response Protocol

In the event of confirmed fraud (document forgery, pool manipulation, identity theft), the protocol initiates the following actions:

  1. Automatic Lock: Instant freezing of all assets in the user's wallet (internal to Envorum).

  2. Data Handover: We transfer the full evidence package (KYC dossier, IP addresses, transaction logs, Device Fingerprint) to local law enforcement in the user's jurisdiction and international cyber-police organizations.

  3. Global Blacklist: The fraudster's data is entered into interbank blacklists (via Sumsub partners) and public Web3 wallet reputation databases.

    circle-exclamation

Last updated