×

Protocol-Level Privacy, Not Policy Promises

status.health is the first application built on the \$HEALTH protocol, a universal health verification infrastructure. Unlike traditional health apps that rely on privacy policies, our system uses mathematics to guarantee privacy through zero-knowledge proofs, cryptographic separation, and token-based incentives.

The \$HEALTH protocol powers not just status.health, but any application that needs privacy-preserving health verification. We've created the rails; status.health is the first train running on them.

\$HEALTH Protocol Technology Stack

Zero-Knowledge Verification Engine

The core of the \$HEALTH protocol is a sophisticated zero-knowledge verification system that processes health documents through a multi-stage pipeline, ensuring complete privacy while extracting only verification metadata needed for token rewards.

Multi-Stage Verification Process:

  1. Client-Side Pre-Processing: Local OCR processing extracts minimal metadata before transmission, with identity verification through document name matching
  2. Secure Transmission: Only necessary metadata transmitted via TLS 1.3 with perfect forward secrecy
  3. Protocol Analysis: Advanced NLP algorithms trained specifically on medical documents extract test date, provider identification, and test type classification
  4. Document Authentication: Multi-factor verification analyzes format consistency, security features, temporal consistency, and structural validation
  5. Zero-Knowledge Proof Generation: Cryptographic proofs containing only verification status, pseudonymous profile ID, and test date for \$HEALTH token rewards
  6. Secure Deletion: Original documentation permanently deleted using DOD 5220.22-M compliant wiping with cryptographic attestation
Protocol Result: Any application using \$HEALTH can verify health actions without ever seeing test results, personal information, or compromising user privacy.

Cryptographic Identity Separation

The $HEALTH protocol uses mathematically enforced separation between personal identity and verification status. This dual-tier architecture makes it computationally impossible to link your identity to your health data, even for protocol operators.

Cryptographic Separation:

$\text{UserID} \xrightarrow[\text{one-way hash}]{\text{server-side secret + salt}} \text{ProfileID}$
Click to view details

Identity Layer

  • Email address
  • Account settings
  • Authentication data
One-Way Hash

Verification Layer

  • Test timestamps
  • \$HEALTH token balances
  • Verification proofs
Mathematical Guarantee: Even with system access, it's computationally infeasible to connect identities to health verifications or token earnings.

\$HEALTH Token Reward Algorithm

The $HEALTH protocol uses advanced behavioral economics and cryptographic commitments to incentivize regular testing through a sophisticated reward system. status.health implements these rewards to encourage consistent sexual health verification.

Reward Calculation:

$R = B \times M \times S$
Click to view details

\$HEALTH Token Values by Activity:

  • First Test Verification: 100 tokens + "First Step" badge
  • Regular Test Upload: 50 tokens per verified test
  • Provider-Verified Test: 75 tokens (enhanced trust)
  • Comprehensive Panel Test: 25 bonus tokens
  • Pre-Expiration Testing: 30 bonus tokens

Frequency Multipliers:

  • Regular cadence (every 3-4 months): 1.2x multiplier
  • Improved cadence (every 2-3 months): 1.5x multiplier
  • Optimal cadence (every 1-2 months): 2.0x multiplier

Streak Protection Algorithm:

$G(t) = \begin{cases} 1, & \text{if } t \leq t_{\text{grace}} \\ 1 - \frac{t - t_{\text{grace}}}{t_{\text{max}} - t_{\text{grace}}}, & \text{if } t_{\text{grace}} < t < t_{\text{max}} \\ 0, & \text{if } t \geq t_{\text{max}} \end{cases}$
Click to view details
Privacy + Incentives: Rewards are calculated using cryptographic proofs of testing frequency, never exposing actual test results or personal data.

Provider Integration Layer

Healthcare providers can integrate directly with the $HEALTH protocol through secure APIs, enabling automatic verification without user uploads while maintaining complete privacy through double-blind matching protocols.

Provider Integration Process:

  • Provider submits only test date and unique patient identifier through \$HEALTH protocol API
  • No actual test results transmitted—only verification metadata
  • Double-blind matching uses clinic-specific cryptographic salts
  • Enhanced trust level with "provider-verified" status and higher token rewards
  • Premium \$HEALTH token values for provider-verified tests (75 vs 50 tokens)
  • Cryptographic separation ensures protocol cannot correlate identities without explicit consent
Enhanced Protocol Trust: Provider-verified tests receive premium token values while maintaining mathematical privacy guarantees through cryptographic separation.

Scoped Verification Sharing

When you choose to share your verification status through status.health, the \$HEALTH protocol uses OAuth 2.0 tokens with cryptographic signatures. These tokens reveal only what you explicitly authorize and are backed by your accumulated token reputation.

Example Verification Token:

{
 "verified": true,
 "last_test": "2025-05-15",
 "consistency_score": 95,
 "health_tokens_earned": 1250,
 "signature": "0x7f9a3b2c...",
 "expires": "2025-05-30T23:59:59Z"
}

Protocol Token Properties:

  • Time-limited validity with automatic expiration
  • Cryptographically signed to prevent tampering
  • Reveals only testing consistency and \$HEALTH token reputation, not results
  • Can be revoked at any time by user
  • Contains only pseudonymous identifiers from \$HEALTH protocol
  • Multiple sharing channels: API, QR codes, wallet passes, cross-app integration

Ephemeral Data Processing

The \$HEALTH protocol processes all sensitive data in temporary memory that's immediately wiped after use. We follow Department of Defense data sanitization standards to ensure no health information persists in the system.

1

Document Upload

Encrypted in transit

2

Memory Processing

Temporary RAM only

3

Token Calculation

Extract date & reward

4

Memory Wipe

DoD 5220.22-M standard

Security & Compliance

HIPAA Compliant

Full compliance with healthcare privacy regulations, with \$HEALTH protocol architecture that exceeds traditional HIPAA requirements through mathematical privacy guarantees.

GDPR Ready

Privacy by design architecture built into the \$HEALTH protocol ensures compliance with global data protection regulations through cryptographic separation.

SOC 2 Type II

Third-party audited security controls for data availability, processing integrity, and confidentiality across the entire \$HEALTH protocol infrastructure.

\$HEALTH Protocol Resources

\$HEALTH Yellowpaper

Deep dive into the protocol's tokenomics, governance model, and complete technical implementation.

Read Yellowpaper →

Mathematical Foundations

Explore the detailed mathematical formulas powering \$HEALTH's cryptographic privacy and reward systems.

View Math →

Protocol FAQ

Get answers about \$HEALTH tokenomics, governance, and technical architecture.

View FAQ →

Technical FAQ

How can you verify without seeing my results?

The protocol uses zero-knowledge proof systems that extract only the test date from your document using cryptographic methods. The actual results never leave your device—we only receive mathematical proof that confirms when you were tested and calculate token rewards accordingly.

What makes this protocol unique?

$HEALTH introduces cryptographic separation between identity and verification status, behavioral economics-based token rewards, temporal analysis algorithms for streak detection, and ephemeral data processing that guarantees zero retention of sensitive health information.

How does the system prevent correlation attacks?

The dual-tier database architecture uses one-way cryptographic hashes with server-side secrets, making it computationally infeasible to link pseudonymous ProfileIDs back to real identities, even with database access. This protects both identity and token balances.

How do tokens work with privacy?

Tokens are earned through cryptographic proofs of verification, not through exposing health data. Your token balance exists in the verification layer, completely separated from your identity. Even token transactions maintain privacy through the protocol's cryptographic architecture.

How is this different from blockchain health apps?

While the protocol uses cryptographic proofs similar to blockchain technology, we don't store health data on public ledgers. Our system combines the privacy benefits of zero-knowledge proofs with traditional secure infrastructure and token-based incentives for sustainable adoption.

Can this system be hacked for tokens or health data?

The $HEALTH protocol and status.health are designed so that even if compromised, an attacker would find no health data to steal—only cryptographic proofs of testing dates and pseudonymous token balances. The dual-tier isolation means identities, health verifications, and token earnings cannot be connected.

Learn More About $HEALTH

Dive deeper into the protocol, tokenomics, and technical architecture powering status.health.