Use Cases
Learn how to use Solidarity effectively in different scenarios.
1. Networking Events
Scenario: You’re at a conference and want to quickly exchange contact information.
How to use:
- Open Solidarity and select your card
- Choose “Professional” privacy level
- Generate QR code or use AirDrop-style sharing
- Let others scan your code or accept their connection
Benefits:
- No need to carry physical cards
- Instant, contactless sharing
- Control what information you share
- Automatic contact organization
2. Business Meetings
Scenario: Meeting new clients or partners in a professional setting.
How to use:
- Create a “Professional” version of your card
- Use peer-to-peer sharing for direct exchange
- Verify group membership if applicable (e.g., same company)
- Add to Apple Wallet for easy access
Benefits:
- Professional appearance
- Verified identity through zero-knowledge proofs
- Seamless integration with existing workflows
3. Casual Social Connections
Scenario: Meeting someone at a social event or through mutual friends.
How to use:
- Switch to “Personal” privacy level
- Share only the information you’re comfortable with
- Use QR code for quick sharing
- Update privacy settings later if needed
Benefits:
- Control over personal information
- Easy to update or revoke access
- No spam or unwanted contact
4. Group Verification
Scenario: Proving membership in an organization without revealing identity.
How to use:
- Join verified groups (company, organization, etc.)
- Generate zero-knowledge proof of membership
- Share proof without revealing personal details
- Others can verify your membership anonymously
Benefits:
- Privacy-preserving verification
- No central authority needed
- Cryptographically secure
Best Practices
Managing Connections
- Review received cards regularly
- Organize by event or context
- Follow up with important connections
Privacy Tips
- Start with minimal information sharing
- Increase privacy level as trust builds
- Regularly audit your shared information
- Use group verification for sensitive contexts
Last updated on