Skip to Content
Usage GuideUse Cases

Use Cases

Learn how to use Solidarity effectively in different scenarios.

1. Networking Events

Scenario: You’re at a conference and want to quickly exchange contact information.

How to use:

  1. Open Solidarity and select your card
  2. Choose “Professional” privacy level
  3. Generate QR code or use AirDrop-style sharing
  4. Let others scan your code or accept their connection

Benefits:

  • No need to carry physical cards
  • Instant, contactless sharing
  • Control what information you share
  • Automatic contact organization

2. Business Meetings

Scenario: Meeting new clients or partners in a professional setting.

How to use:

  1. Create a “Professional” version of your card
  2. Use peer-to-peer sharing for direct exchange
  3. Verify group membership if applicable (e.g., same company)
  4. Add to Apple Wallet for easy access

Benefits:

  • Professional appearance
  • Verified identity through zero-knowledge proofs
  • Seamless integration with existing workflows

3. Casual Social Connections

Scenario: Meeting someone at a social event or through mutual friends.

How to use:

  1. Switch to “Personal” privacy level
  2. Share only the information you’re comfortable with
  3. Use QR code for quick sharing
  4. Update privacy settings later if needed

Benefits:

  • Control over personal information
  • Easy to update or revoke access
  • No spam or unwanted contact

4. Group Verification

Scenario: Proving membership in an organization without revealing identity.

How to use:

  1. Join verified groups (company, organization, etc.)
  2. Generate zero-knowledge proof of membership
  3. Share proof without revealing personal details
  4. Others can verify your membership anonymously

Benefits:

  • Privacy-preserving verification
  • No central authority needed
  • Cryptographically secure

Best Practices

Managing Connections

  • Review received cards regularly
  • Organize by event or context
  • Follow up with important connections

Privacy Tips

  • Start with minimal information sharing
  • Increase privacy level as trust builds
  • Regularly audit your shared information
  • Use group verification for sensitive contexts
Last updated on