About the Network
Millions of tiny sparks can illuminate an entire nation.
The Firefly Principle
In the Caribbean, indigenous peoples used cocuyos β bioluminescent beetles β as natural lamps to guide them through the dark. A single cocuyo casts barely enough light to see your own hand. But gather them together, and they become something more.
This is the principle behind the Firefly Network: no single observer sees the whole picture. But when verified humans share what they observe, corroborate what others see, and connect their posts into chains of evidence β the darkness begins to lift.
We are inspired by Efecto Cocuyo, a Venezuelan independent media platform founded in 2015 by journalists who refused to let government censorship silence the truth. They proved that community-driven journalism could survive and thrive even under authoritarian conditions. The firefly image resonated because it speaks to something universal: small lights that together illuminate the darkness. β
The Three Pillars
Anonymous but Human
Every firefly is a verified human being β proved through DIM (Decentralized Identity Mechanism), a proof-of-personhood system that confirms you're human without revealing who you are. No usernames, no profiles, no personal data. Just a cryptographic credential that says: "A real human made this."
Verified but Private
Every post and corroboration carries cryptographic proof. Every chain has a transparent verification trail. But none of this requires exposing anyone's identity. The verification is public; the verifier is private. This is fact-checking without surveillance.
Distributed but Connected
Posts and chains are stored on decentralized infrastructure. No central server to seize, no company to subpoena, no single point of failure. If the founding team disappeared tomorrow, the network would continue. That's the point.
How It Works
β¦Posts
A post is an observation, a piece of evidence, a witness account, a data point. When you illuminate a post, you're contributing a discrete piece of information β signed by your anonymous credential, tagged with optional context (topic, location, timeframe), and ready to connect with other posts.
βCorroboration
Corroboration is not a like. It's a reputation-staked act of verification. When you corroborate a post, you're making a specific claim: "I can independently confirm this," or "I have additional evidence," or "This is consistent with my expertise." Your corroboration is recorded permanently, weighted by your reputation in the relevant domain. If the post is later debunked, your reputation diminishes.
βStory Chains
Story chains are emergent structures. No one "creates" a chain β chains crystallize as fireflies link their posts to related observations. A chain about water quality might start with one person noticing a smell, grow as others corroborate and add photos, and strengthen as someone contributes public records about permits. The chain becomes more than the sum of its posts.
βVerification Trails
Every chain carries a transparent verification trail β the complete history of posts, corroborations, challenges, and evidence. You don't need to trust us to tell you something is verified. You can trace the trail yourself and see exactly how many independent humans, with what reputation, made what claims.
βCampaigns
Campaigns are sponsored fact-checking efforts. News outlets, collectives, or community members fund a request for specific information β and fireflies who contribute valuable evidence earn a share of the reward. The funds are held in escrow until deliverables are met. Payments can be public (pUSD) or private (Coinage) to protect contributor identity. This creates a functioning market for investigative journalism.
Surveillance Resistance
The network is designed so that no single point of compromise β no server seizure, no subpoena, no insider threat β can expose the identity of any firefly or remove any post from the network.
- β’No user database. DIM credentials are generated through proof-of-personhood and held by you. There is no central registry of participants.
- β’No content server. Posts are stored on decentralized infrastructure. There is no single server to seize.
- β’No metadata collection. We don't log IP addresses, device fingerprints, or access patterns.
- β’No cookies. None. Zero. We don't collect what we can't be forced to reveal.
Built on Polkadot
The Firefly Network is built on and for the Polkadot ecosystem. We chose Polkadot because its values align with ours: decentralization, interoperability, and user sovereignty.
Our infrastructure leverages:
- β’DIM β Decentralized identity for proof-of-personhood
- β’Bulletin Chain β Censorship-resistant storage
- β’Polkadot parachains β Verification and reputation logic
Open Source
All code is open source. All governance is public. All verification trails are auditable. Transparency is not optional β it's foundational.
View on GitHub