NightProof
Powered by Midnight Network · NIGHT/DUST Economics

Privacy-First Authentication
on the Midnight Blockchain

Midnight Auth combines KERI-based self-sovereign credentials with Midnight's zero-knowledge blockchain — giving your users portable, self-sovereign identity without a single byte of PII on your servers.

0PII
stored on our servers
97%+
gross margin at scale
< 100ms
average auth latency
24B
NIGHT token fixed supply
Dual-Technology Architecture

Two technologies. One complete platform.

Neither KERI credentials nor Midnight alone achieve trustless, portable, privacy-preserving auth. Together, they deliver something no competitor has.

Credential Layer

KERI Credentials

Self-Sovereign Identity

Users own their credentials forever. KERI-based identifiers enable quantum-resistant key rotation and recovery — credentials survive device loss without any central data store.

  • Portable ACDC credentials
  • Quantum-resistant key rotation
  • Zero PII on your servers
  • Works offline
Verification Layer

Midnight Network

Trustless On-Chain ZK Proofs

Verification happens on the Midnight blockchain — apps query the chain directly. You are never a trusted middleman. Apps trust cryptographic math, not your servers.

  • ZK proofs on Midnight chain
  • Apps verify without your server
  • Immutable compliance audit trail
  • Selective attribute disclosure
Token Economics

NIGHT & DUST

Near-Zero Verification Cost

Hold NIGHT tokens and generate DUST automatically. DUST pays for all blockchain verification transactions — turning a one-time asset purchase into unlimited verifications.

  • NIGHT token generates DUST
  • DUST regenerates over time
  • ~$0 per verification at scale
  • 97%+ platform gross margins
NIGHT · DUST Economics

One asset. Near-zero marginal cost.

Midnight's dual-token model separates network value from operational cost. Hold NIGHT tokens — they automatically generate DUST, which pays for every on-chain verification. No per-transaction budget. No surprise gas spikes.

🪙
Buy NIGHT once
A balance-sheet asset, not a spend
NIGHT generates DUST
Automatically, like a rechargeable battery
🔒
DUST pays for verifications
Shielded transactions — private by default
♾️
DUST regenerates
Unlimited verifications from a fixed upfront cost
Biometric auth
97%+
projected gross margin at scale
Fixed NIGHT acquisition cost. Near-zero marginal cost per verification.

Your server is not involved at login

When a user authenticates, the ZK proof flows directly from their wallet to the Midnight chain. Apps read the result from the blockchain — not from you.

01
User opens wallet
NightProof wallet on their device
02
ZK proof generated
On-device · credentials never leave phone
03
Proof on Midnight chain
Trustless · immutable · auditable
04
App reads from chain
No server. Just cryptographic math.
auth.ts@nightproof/sdk
import NightProof from '@nightproof/sdk';

const auth = new NightProof({ apiKey: 'np_live_••••' });

// Generate a deep-link auth challenge
const { deepLink, sessionId } = await auth.initiateLogin();
window.open(deepLink); // opens NightProof wallet

// Wait for the user to verify (ZK proof on Midnight chain)
const session = await auth.waitForSession(sessionId);
console.log('Verified user AID:', session.sub);
// → No email. No phone. No PII. Just proof.

Built for scale, compliance, and developer speed

Everything you need to ship production-grade decentralised auth without building infrastructure from scratch.

Drop-in SDK

Flutter, JavaScript, and Go SDKs. Integrate in minutes, not weeks.

Privacy by Design

Users prove credential attributes without revealing underlying data. No central identity store.

Sub-100ms Flows

KERI-based verification optimised for production-grade performance at any scale.

Real-time Analytics

Monitor auth events, success rates, and usage patterns from your developer console.

Team Management

Invite developers with role-based access controls from day one.

Multi-platform

One API. Every platform — web, iOS, Android, and server-side.

Regulatory-Ready

On-chain audit trail with GDPR-compliant design. Commitment hashes, never PII.

Trustless Architecture

At login time your server is not involved. Apps read proof results directly from the chain.

Why NightProof is different

🔐

No honeypots

We never store email, phone, or any PII. Only commitment hashes on the Midnight blockchain.

🌐

Trustless verification

Apps verify credentials directly on-chain. We cannot lie, manipulate, or go offline to break auth.

♾️

Unlimited scale economics

NIGHT token generates DUST. Once purchased, verifications cost near zero — margins grow with volume.

Simple, transparent pricing

No hidden fees. No per-user costs. Pay for what you verify.

Starter

Freeforever
  • 1 app
  • 1,000 verifications/mo
  • Community support
  • Flutter & JS SDKs
Start free

Growth

$29/month
  • 5 apps
  • 25,000 verifications/mo
  • Email support
  • All SDKs
  • Team access (3 seats)
Get started
Most popular

Pro

$99/month
  • 20 apps
  • 200,000 verifications/mo
  • Priority support
  • All SDKs
  • Team access (10 seats)
  • Custom credential types
Get started

Enterprise

Custom
  • Unlimited apps
  • Unlimited verifications
  • Dedicated support
  • SLA guarantee
  • SSO & audit logs
  • Custom contracts
Contact sales
NightProof

Ready to build privacy-first auth?

Add Midnight-backed zero-knowledge authentication to your product in minutes.