{"version":1,"pages":[{"id":"3hgIv8ygGaYWGo7Mu9Ls","title":"☀️Welcome to Human Network","pathname":"/","siteSpaceId":"sitesp_LNomO","description":""},{"id":"zS3UzwgnteFncvwxDFIh","title":"What is Human Network? What are Human Keys?","pathname":"/overview/what-is-human-network-what-are-human-keys","siteSpaceId":"sitesp_LNomO","description":"Human Network is a network for Human Keys. It lets users multiply their data encoded as elliptic curve points by a distributed private key.","breadcrumbs":[{"label":"Overview"}]},{"id":"3RoMoshMze498c2rta8y","title":"Methods and their use cases","pathname":"/overview/methods-and-their-use-cases","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"Overview"}]},{"id":"demtuIzZANVVWFBegonJ","title":"Deriving keys from low-entropy data","pathname":"/overview/methods-and-their-use-cases/deriving-keys-from-low-entropy-data","siteSpaceId":"sitesp_LNomO","description":"Human Network derives keys from low-entropy data by using a threshold verifiable oblivious pseudorandom function (tVOPRF)","breadcrumbs":[{"label":"Overview"},{"label":"Methods and their use cases"}]},{"id":"59NfcEluPagND1OLxrtQ","title":"Deriving keys from web accounts","pathname":"/overview/methods-and-their-use-cases/deriving-keys-from-web-accounts","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"Overview"},{"label":"Methods and their use cases"}]},{"id":"nbOYM7Akk94nWLQYJhhq","title":"Provably encrypting to Human Network, and setting custom decryption conditions.","pathname":"/overview/methods-and-their-use-cases/provably-encrypting-to-human-network-and-setting-custom-decryption-conditions.","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"Overview"},{"label":"Methods and their use cases"}]},{"id":"pUefbYneiHjV3M0m8IwA","title":"FAQ","pathname":"/overview/faq","siteSpaceId":"sitesp_LNomO","description":"FAQ for the Human Network","breadcrumbs":[{"label":"Overview"}]},{"id":"4f2ZlvTKGk6FLvrGL26s","title":"Architecture","pathname":"/decentralization/architecture","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"Decentralization"}]},{"id":"pAg5S4RMn9Cv0ciVCmfo","title":"Preventing Collusion","pathname":"/decentralization/architecture/preventing-collusion","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"Decentralization"},{"label":"Architecture"}]},{"id":"Kt6rHdDrVruvQ33lVWoB","title":"Scalability","pathname":"/decentralization/architecture/scalability","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"Decentralization"},{"label":"Architecture"}]},{"id":"KIj1ddSAIhz3gp1Pewuf","title":"Credit System","pathname":"/decentralization/architecture/credit-system","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"Decentralization"},{"label":"Architecture"}]},{"id":"5oiFVytTC3uiNUVsLRaa","title":"Mainnets and Testnets","pathname":"/decentralization/mainnets-and-testnets","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"Decentralization"}]},{"id":"rKYziJZz7dcM4uBN0uLo","title":"Register and Run a Human Node","pathname":"/for-operators/register-and-run-a-human-node","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"For Operators"}]},{"id":"F4qXaNLXi9EABm8LlLBZ","title":"Use Keystore for private key encryption","pathname":"/for-operators/register-and-run-a-human-node/use-keystore-for-private-key-encryption","siteSpaceId":"sitesp_LNomO","description":"To ensure privacy over operator's private key, an alternative to write it down in the .env file would be to use Keystores as presented by Othentic in the following documentation:","breadcrumbs":[{"label":"For Operators"},{"label":"Register and Run a Human Node"}]},{"id":"ioxV14DuOcbo4md3dsid","title":"Keyshare backup","pathname":"/for-operators/register-and-run-a-human-node/keyshare-backup","siteSpaceId":"sitesp_LNomO","description":"For resiliency and consistency of the network, a backup process will be performed at a regular basis. If the team contacts you, please follow the following to perform the backup of your keyshare:","breadcrumbs":[{"label":"For Operators"},{"label":"Register and Run a Human Node"}]},{"id":"k1UF8tgDAar5jwi6LO2E","title":"Diagnostics using the Network UI","pathname":"/for-operators/diagnostics-using-the-network-ui","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"For Operators"}]},{"id":"2gKkeKCGSwG57Yenva7x","title":"Operator Points Program","pathname":"/for-operators/operator-points-program","siteSpaceId":"sitesp_LNomO","description":"The Operator Points Program is designed to reward node operators who have contributed to Human Network in its early stages by running active nodes and participating in the protocol.","breadcrumbs":[{"label":"For Operators"}]},{"id":"H8fEr2XVgcgU5ws25cJZ","title":"Human Network Credits","pathname":"/for-developers/human-network-credits","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"For developers"}]},{"id":"cuJbEDajUf9SD6OV1hb7","title":"Making Requests to Human Network","pathname":"/for-developers/making-requests-to-human-network","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"For developers"}]},{"id":"QeX1NIcEKhkBU1hBJJVJ","title":"Signer on behalf of users","pathname":"/for-developers/making-requests-to-human-network/signer-on-behalf-of-users","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"For developers"},{"label":"Making Requests to Human Network"}]},{"id":"hagroSl15tvhPadaoGIm","title":"Directly query the network","pathname":"/for-developers/making-requests-to-human-network/directly-query-the-network","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"For developers"},{"label":"Making Requests to Human Network"}]},{"id":"FfE6eoRDzWXG21yw5PnV","title":"Types of requests","pathname":"/for-developers/types-of-requests","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"For developers"}]},{"id":"qzDKaY9QAp1qxysIHbNH","title":"OPRF To Derive Keys From Low-Entropy Data","pathname":"/for-developers/types-of-requests/oprf-to-derive-keys-from-low-entropy-data","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"For developers"},{"label":"Types of requests"}]},{"id":"IZ0qLg71tu5w8wCNngZu","title":"Decryption of Provably Encrypted Data","pathname":"/for-developers/types-of-requests/decryption-of-provably-encrypted-data","siteSpaceId":"sitesp_LNomO","breadcrumbs":[{"label":"For developers"},{"label":"Types of requests"}]}]}