Double-blind by design.
Nexion's architecture is built so that no single party sees the full picture of who, where, and what. The wallet holds identity, your product sees policies and decisions, and Nexion cannot track where checks happen.
This page is for security, privacy, and architecture teams who want to see how the model works under the hood—for both web2 and web3 deployments.
The double-blind verification model
Double-blind verification means no single actor can reconstruct the full story of who a user is, where they used their credential, and what they were accessing.
The verifier sees rules and outcomes
Nexion does not track where it is used
What data lives where
On the user's device (wallet)
- Government ID data and biometric data used during issuance
- Verifiable credentials (e.g., "over 18", "resident of country X", "passed KYC for product Y")
- Local logs of where credentials have been presented (for user visibility)
In your systems (verifier)
- Policies and rules you define (age, region, eligibility, KYC requirements, limits, etc.)
- Pass/Fail outcomes for each check
- Policy receipts for audit and investigation purposes
- Standard auth, risk, and access logs you already maintain
At Nexion
- Configuration for supported policies and verifiers
- Issuer metadata, keys, and revocation information
- Operational telemetry needed to run the service (minimised and aggregated where possible)
What Nexion intentionally does not keep
- No central map of which user accessed which verifier with which policy
- No central storage of raw ID images or biometric data
- No centralised logs of user-by-user verification history across verifiers
Wallet behaviour and privacy guarantees
No phone-home during checks
Verifier binding
Selective disclosure
User control
Security controls
Nexion is designed as a security-sensitive dependency in your stack; controls reflect that assumption.
Standards and interoperability
Nexion is built on open standards so that you can plug it into existing identity and wallet ecosystems, and evolve with them over time.
EUDI-compatible architecture
W3C Verifiable Credentials 2.0
OID4VP 1.0
Architecture & privacy FAQ
Can Nexion see where our users are being verified?
No. Presentations are verifier-bound, and the wallet does not call home to Nexion during policy checks. Nexion does not maintain a central log of which user accessed which verifier with which policy. You keep local receipts and logs; Nexion sees configuration and operational telemetry only.
Can a breach at Nexion reconstruct full identity profiles?
The architecture is designed so that identity data and attributes live in the wallet, not at Nexion. A breach at Nexion would not expose a centralised repository of user IDs, documents, or full verification histories across verifiers. You should still evaluate Nexion as a critical dependency, but the data surface is intentionally limited.
How does this interact with our own logging and monitoring?
Policy receipts are simple signed JSON objects that can be written into your existing logging and monitoring pipelines. They provide evidence that a policy ran and what decision it produced, without adding long-lived identity attributes to those logs.