Learn how YOU can help make the online world safer, friendlier, and more accountable to people like you and me!

Here are the organizations that are making the decisions that affect our information lives, along with instructions on how to join them and participate in those decisions



We’re introducing this beta version of our landing page to you before it goes to a wider audience.

We support the efforts of the decentralized identity (DID) community to bring personally identifiable Information (PII) under the control of the person identified. Identity in the control of centralized authority – whether government, Silicon Valley, or the broadband industry – is a threat to us all.

The DID community’s “verifiable claims” work provides a welcome resource for assuring relying parties that people are who they claim to be. But verifiable claims, like PGP and so many other “collegial attestation” systems before it, can be defeated when there is sufficient incentive to do so. Osmio’s Identity Quality Assurance (IDQA™) system incorporates verifiable claims as one of eight Identity Quality metrics, each scored on a scale of 0-9 for an aggregate Identity Quality score of 0-72.

Osmio is a certification authority. But unlike other certification authorities, Osmio is owned and governed by those whose identities it attests to – via Accountable Anonymity™. Just as your car’s license plate makes you accountable for what happens while it’s on public roadways but no one gets to know your identity unless there’s an incident, so your Osmio identity certificate lets you assert your identity without disclosing your identity. Only a valid court order can uncover a user’s identity in cases of fraud, illegal activity, or claims of civil damage.

We’re planning an extensive outreach campaign. We hope you’ll join us in instigating a big change to solve a set of big problems.

Participation in
Osmio Governance Commissions

There's much more about Authenticity™ and
the City of Osmio in the videos later on this page

But first, here are the governance commissions of the City of Osmio.
Hover over them for a snapshot of their work.

Join any or all of them, but be aware that in order to be able to vote on issues before any commission, you must participate in the meetings (chats and forums) of the commission and be present for its quorum calls. Again, this will require a significant commitment of your time.

A global optimocracy owned by YOU

That’s because Osmio is governed by a system called Optimocracy, where anyone can participate – but you must participate in order to vote. People whose views are formed from bumper sticker slogans will need to depend upon their more informed neighbors to look out for their interests.

 The City of Osmio, Authenticity™
and a new way of doing things

You own Osmio

Just as you own the city where you live, you – the online resident – own the City of Osmio

High-altitude view

Osmio's place in a new coalition of time-tested ideas brought together to rescue the world's information infrastructure.

It's time for something completely different

Things are NOT working.
A big problem requires a big change.

Learning from the past

It seemed like the right thing at the time – but old assumptions wear out, and now we're in dangerous territory.

Behind the scenes

A quick look at how PKI makes Authenticity actually work.

Putting it together

How the essential parts of Authenticity work together.


where security technology has failed us.

Watch this one for an end-to-end
snapshot of Authenticity

We can start NOW

is the solution
hiding in plain sight.

Join the Authenticity Alliance as an individual member to receive updates and watch progress. For less than the cost of a monthly pizza, you can "stay tuned" and see for yourself how things really CAN get better and how you can join the effort.

  • Free books from the Authenticity Library
  • Free courses at Authenticity University
  • Participation in Osmio commissions
  • Other ongoing benefits as Authenticity evolves into the new way of doing things.

The new heroes of Authenticity

Digital signatures may seem almost like magic – here's how they work.

Digital signatures
at work

How accountability
can change everything.

Privacy done right

Your private digital file cabinet called MOI (My Own Information) turns information about you into YOUR personal intellectual property. Anyone accessing it will need to sign your NDA and get a license from YOU.

Tired of being owned?

Silicon Valley, the NSA, and the botnet builders intend to own you. Read this book to find out how to prevent it.

Get the book

Authority that
YOU own

Just as you should own and control information that identifies you, you should own and govern the vital records department that attests to your identity.

Duly Constituted
Public Authority

An ancient and respected concept retooled for the digital age.

Common sense is knocking

For a physician 150 years ago, a substantial part of medical training was about bloodletting. Is security technology — built on the assumption that you can catch the bad guys by looking at the stream of bits they send — today's bloodletting? This spoof
white paper will make you smile — and think.

Get free white paper

Best Practices in the Use of Bloodletting Technology
and Information Security Technology

What's taking so long?

Didn't we already solve this?

We didn't, for a number of reasons – but we're ready now.

History repeating

Sometimes inventors have difficulty communicating with those who can make their creations usable in the real world. PKI is that kind of solution-in-waiting.

No excuses now

The misunderstandings and resistance that have prevented PKI from delivering on its promise.

Authenticity and your business

Whether your network is cloud-based or on premises, chances are you have outsiders such as contractors, suppliers, distributors, and others accessing your precious digital assets. Learn how a program of enrollment to digital identity certificates and a policy of DSE — digital signatures everywhere — will bring pervasive accountability, and with it real security, to your enterprise.

Get free white paper

HAVE Identities Before You MANAGE Them
Authenticity and Accountability in Identity-Critical Environments

This breach caused 1000 times the $250 million losses of the Equifax incident

Security technology is not working. Without measurably reliable identities and accountability, your door is wide open to nefarious action by intruders and inside bad actors. Read how the unthinkable happened to a multi-billion-dollar company that spiraled into astonishingly quick bankruptcy because of a shockingly elementary — and preventable — breach.


where security technology has failed us.

The significant problems we face cannot be solved at the same
level of thinking we were at when we created them
— Albert Einstein

© 2011-2019 The Authenticity Institute, Inc