Human Network
  • ☀️Welcome to Human Network
  • Overview
    • What is Human Network? What are Human Keys?
    • Methods and their use cases
      • Deriving keys from low-entropy data
      • Deriving keys from web accounts
      • Provably encrypting to Human Network, and setting custom decryption conditions.
    • FAQ
  • Decentralization
    • Architecture
      • Preventing Collusion
      • Scalability
      • Credit System
    • Mainnets and Testnets
  • For Operators
    • Register and Run a Human Node
      • Use Keystore for private key encryption
      • Keyshare backup
    • Diagnostics using the Network UI
  • For developers
    • Human Network Credits
    • Making Requests to Human Network
      • Signer on behalf of users
      • Directly query the network
    • Types of requests
      • OPRF To Derive Keys From Low-Entropy Data
      • Decryption of Provably Encrypted Data
Powered by GitBook
On this page
  1. For developers

Making Requests to Human Network

PreviousHuman Network CreditsNextSigner on behalf of users

Last updated 7 days ago

Once you have credits or access, you may make a request to the Human Network via the Relay node.

For the testnet on Holesky, the Relay node can be reached at via HTTP requests to

For mainnet, the Relay node can be reached at via HTTP requests to

There are two ways of making a request to Human Network:

  1. Spin up a Signer to simplify this on behalf on end users. A Signer pays the credits and manages user state. This way, users don't need to acquire Human Network credits or keep track of their state.

  1. Without a signer, you can directly interface by acquiring credits and using mishtiwasm to query the network

http://159.65.246.91:3031
http://44.217.242.218:8081
Signer on behalf of users
Directly query the network

Note: Making a request for OPRF is more trivial than a request for JWTPRF or DecryptBabyJubJub. JWTPRF requires a JWT of a particular format which some JWT issuers do not support. DecryptBabyJubJub requires a smart contract and a zero-knowledge proof. Due to the complexity of their usage, they are currently only used internally until more documentation is created. If you are interested in using those methods, please reach out so we can document them and support you in developing with them.