Skip to content
On this page

The Hellō Approach

Centralized Identity Approach

Internet identity is a complicated and unsolved problem. Early centralized offerings, such as Microsoft Passport, were rejected for fear of giving control to privately-owned entities. Recent centralized offerings – such as Apple, Facebook, and Google’s social login services – only solve a fraction of the problem and access to these free services can be revoked from the user or the developer at any time.

Decentralized Identity Approach

To resolve the concerns with a centralized approach, numerous decentralized identity approaches have been proposed and built. In the decentralized approach an issuer provides a credential to a user, and then the user chooses to provide the credential to an application. For example, a school will issue a credential to a student so they can prove they are a student. This puts the user in the middle of the transaction, giving them control of when and where their information is shared.

The Cold Start Problem with Decentralized Identity

However, all three parties (issuer, user, application) must be using the same, new decentralized technology, but unfortunately none are. This is a three-way cold start barrier that is yet to be broken. There is no value to one party adopting the technology unless the other parties they are interacting with have also adopted it.

Decentralized Governance

Rather than using decentralized technology to address the concerns of a centralized service, our approach is to decentralize the governance of a centralized service with a multi-stakeholder cooperative that has representation from users, organizations, and employees. See Hellō Cooperative for details.

Resolving the Cold Start Problem

The Hellō service provides an abstraction layer between the parties, allowing users and issuers to utilize existing credentials. This removes the cold start problem for those two parties so only applications need to explicitly adopt the solution, which uses existing, proven technology that is readily available.

Developers of new, greenfield applications that choose to use Hellō will save weeks of development time, while offering their users all the choices they have come to expect – and without the risk of a provider revoking access. Developers will only pay for each new verified claim they receive such as a verified email or phone with pricing comparable to other verification services such as Twilio. Early adopters will be rewarded with credits that will reduce or eliminate the cost of the service. Credits will be provided using the same mechanism we will use to reward investors, employees, and advisors. See Smart Financing for details.

Centralized Identity Risk Mitigation

A centralized service raises concerns of confidentiality, integrity, and availability. These are addressed with a verified confidential cooperative computing architecture that ensures only the user can access and release their data, the user can not be impersonated, and the service is resilient to multiple failures. See Hellō Computing Architecture for details.

While our data governance model prevents surveillance by state actors, we do not want to be a safe haven for criminals. In the case of suspected criminal activity, law enforcement must obtain subpoenas from two independent geopolitical jurisdictions to ensure the suspected activity is widely considered to be criminal, and no single jurisdiction can abuse access. See Hellō Data Governance for details.


1) Why will users adopt Hellō?

Initially, we do not expect users to directly adopt Hellō. Users will instead choose to use an application that uses Hellō and implicitly create a Hellō wallet when they sign up.

2) Why will users prefer applications that use Hellō?

Hellō is as convenient for users as social logins but without the privacy concerns or vendor lock-in. They will not need to create another password or re-verify their email or phone.

3) Why will credential issuers adopt Hellō?

Issuers do not need to choose to use Hellō, although they may choose to not allow Hellō to use them. Hellō will integrate all popular issuers using their existing APIs. In the future, Hellō will be a marketplace for commercial issuers to sell their credentials to Hellō developers.

4) What issuers does Hellō support?

Currently Hellō supports Apple, Facebook, Google, Microsoft, LINE, Twitch, and Yahoo. Users can also use their email, phone, or crypto wallet to log in to Hellō.

5) Why will developers adopt Hellō?

Developers of greenfield applications will save weeks of development time while providing their users with the login and account management choices they have come to expect. See hello.dev for more details.

6) How does Hellō save a developer weeks of time?

The developer no longer needs to implement account recovery, email or phone verification, or profile picture upload. Developers no longer need to spend hours registering their apps at the management consoles of social providers such as Apple, Facebook, or Google, and then copying and pasting configuration to and from those consoles. Hellō provides a fully-featured OpenID Connect interface that will work with the libraries and integrations developers are already familiar with. See our developer portal for details.