Moca Foundation Announces Moca Chain for Self-Sovereign, Privacy-Preserving Identity and User Verification 

Summary:
  • Moca Chain introduces a modular architecture where identity is not just a feature layered on top — it’s embedded at the protocol level.

Key Takeaways

  • Moca Chain is a Layer 1 blockchain custom-built for decentralized identity, credential verification, and on-chain reputation.
  • It puts users in control of their data, with encrypted on-chain storage and zero-knowledge verification.
  • It’s EVM-compatible and powers interoperability across chains and ecosystems.
  • Moca Chain testnet is coming soon, and its native coin $MOCA fuels activity across the network.
  • Moca Chain facilitates credential checks with other ecosystems, supporting true multi-chain identity flows.

At Moca Network, we believe users should fully own their identity and decide how and where it’s used. This belief drives our mission to build the world’s largest identity network: one identity, verifiable everywhere, with unlimited value.

Moca Chain is the Layer 1 that turns this vision into infrastructure. Developed with the Animoca Brands ecosystem, it brings decentralized identity into production and redefines how identity can operate as a core primitive — coordinating trust, access, and reputation across ecosystems.

What is Moca Chain?

Moca Chain is a Layer 1 blockchain built to power a whole new concept of identity — where users can verify who they are and what they do as on-chain credentials, replacing centralized data with reusable, portable and user-controlled assets.

Together with AIR, our ecosystem product that includes AIR Kit and AIR ID, Moca Chain turns real user activity — such as joining a campaign, unlocking a reward, or achieving something in-game into on-chain credentials. These credentials are encrypted and stored under the user’s control, and verified through zero-knowledge proofs (zkProofs) without exposing personal information.

These credentials are more than just data — they’re assets, encrypted and decentralized. Issuers can monetize credential usage, Verifiers can unlock access and rewards, and Users (Data Holders) can carry their identity across applications and ecosystems. Moca Chain acts as the decentralized data layer that supports this flow, and $MOCA serves as the native coin that coordinates activity, settlement, and incentives across all participants in the network.

What Problems Does Moca Chain Solve?

  • Centralized Identity Gatekeepers: Identity today is siloed and monetized by platforms like Alibaba and Tencent, locking users into fragmented ecosystems with no ownership or benefit. Moca Chain replaces these gatekeepers by decentralizing identity infrastructure and restoring user control.
  • Repeated Verification: Users repeatedly re-verify the same information across apps, wasting time and creating friction. Moca Chain enables attest-once, verify-anywhere workflows with portable, reusable credentials.
  • Lack of Transparency and Consent: Users rarely know who’s accessing their data or why. Moca Chain enforces full transparency—every credential verification is logged, auditable, and requires explicit user approval.
  • Loss of Data Control: Shared data on centralized platforms is stored indefinitely and often misused. Moca Chain gives users full authority over their credentials, which remain encrypted and under their control—never exposing sensitive data during use.

How Does Moca Chain Work?

Moca Chain introduces a modular architecture where identity is not just a feature layered on top — it’s embedded at the protocol level. It’s EVM-compatible, allowing developers to build using Solidity while benefiting from Cosmos-native modules that enhance scalability, customization and flexibility. At the center of the system is a proof-based identity model, where credentials are issued, stored, and verified through a standardized flow.

The Roles That Power Moca Chain

Before diving into how it works, it’s important to understand the three key roles that make identity on Moca Chain possible:

  • Users (also known as Data Holders) are individuals whose identity and actions can be transformed into on-chain verifiable credentials. These credentials are encrypted and controlled by the user, and stored under their AIR Account secured by zero-knowledge proofs. Users decide when and how to share their credentials across apps, platforms, or ecosystems.
  • Issuers are trusted business entities — such as protocols, platforms, games, or applications — that generate verifiable credentials based on user activity. They issue these credentials on Moca Chain, enabling a deeper understanding of their users through verified actions, traits, and behaviors — all without exposing personal data. Issuers can also monetize credential usage when Verifiers request proof, with full privacy preserved through zkProofs and user-signed verification flows.
  • Verifiers are businesses or protocols that seek to identify and engage high-intent users who meet specific criteria — such as completing tasks, holding credentials, or belonging to communities. By leveraging Moca’s verifiable credentials, Verifiers can plan user access, rewards, and engagement strategies with greater precision — based on trusted, proof-backed signals rather than assumptions

Credential Lifecycle: From Issuance to Verification to Rewards & Access

When a user completes a qualifying action — such as joining a campaign, unlocking a feature, or reaching a milestone — the Issuer converts that activity into a verifiable credential. This credential is encrypted, recorded on Moca Chain, and linked to the user’s AIR Account, remaining fully under their control via wallet-based authorization.

Users can repeat this process across the Moca ecosystem — claiming new actions with different ecosystem partners, or collecting multiple credentials from the same Issuer across different engagements, achievements, or roles.

When a Verifier needs to determine whether a user meets a specific condition—such as demonstrating eligibility or confirming participation—the Verifier can validate the claim without revealing any underlying data through Moca Chain’s validator.

All verification on Moca Chain happens at the statement level — just a yes or no, with no data exposure. $MOCA Coin fuels every step through gas and settlement, meaning more credential activity drives more utility and demand for $MOCA.

This full-stack validation system makes Moca Chain suitable for trustless and identity-rich applications that rely on continuous access to accurate credential data.

Benefits for All Parties: Achieving One Identity — Verifiable Everywhere, Unlimited Value

Users benefit from privacy-preserving and reusable credentials that unlock rewards, exclusive access, and status across platforms. With control over their identity and zkProofs, users decide when and how their credentials are shared without sacrificing privacy.

Issuers can issue and manage verifiable credentials at scale, gaining nsights into user actions without storing personal data. This unlocks new ways to engage, reward, and retain users based on verified behavior. Issuers can also monetize these credentials when Verifiers request proof, turning user actions into ongoing value streams.

Verifiers can accurately target high-intent users using privacy-safe signals. Credential-based verification lowers acquisition costs, enables secure access gating, and powers personalized experiences across apps and ecosystems.

How is Moca Chain different from other blockchains?

1. Identity-Native and Privacy-Preserving by Design

Moca Chain embeds encrypted personal data storage and privacy-preserving computation directly into the base layer—unlike other chains that rely on external systems like IPFS. With native support for zkProofs and zkTLS, users can prove facts (e.g., age, location, behavior) without revealing underlying data. Every verification is user-authorized, logged, and auditable, ensuring data remains secure, transparent, and under user control.

2. Reusable, Statement-Based Credentials

Moca Chain introduces an attest-once, verify-anywhere model using reusable credentials. Instead of repeatedly verifying identity across platforms, users can generate zero-knowledge proofs for specific claims, enabling frictionless interactions while preserving privacy.

3. Validator Roles That Go Beyond Consensus

Moca Chain’s validator set is multi-functional:

  • Consensus Validators maintain network security and block production.
  • Data Validators uphold data integrity and ensure encrypted credentials are accessible for verification.
  • Cross-Chain Relayers enable identity verification across ecosystems, supporting true multi-chain interoperability.

Real-World Use Cases: How Life Gets Better with Verifiable Identity

Gaming: If you grinded 100 hours in GTA6, then you should be able to join the elite crew — without arguing in voice chat. Moca credentials verify your in-game status instantly, no screenshots or doxxing required.

Education: If you completed a crypto course online, then you should have a credential that’s recognized beyond a single platform. Moca turns your learning into a verifiable and portable credential you can use to prove your skills anywhere.

Sports: If you supported Inter Miami before Messi arrived, then that loyalty should count. Moca credentials prove you were there first — unlocking premium tickets, exclusive drops, and fan access.

Start Building on Moca Chain

The Moca Chain testnet is launching soon, and we’re calling on developers and partners to join us in building a verifiable identity layer that’s private, verifiable and profitable by default.

If you’re a developer:

  • Visit Moca chain website and air3.com to learn more about AIR Kit
  • Prepare your applications using Solidity and EVM-compatible tooling
  • Join here to deploy on testnet and integrate AIR credentials

If you’re a user,

Let’s start building on Moca Chain.

This article is also available in: Polski, Nederlands.