Let me ask you something: do you own your email address?
You might think so. You chose it, you use it every day, it's how people reach you. But here's the thing—if you use Gmail, that address belongs to Google. They can disable it, lock you out, or shut down the service entirely. And there's not much you can do about it.
The same goes for your social media handles, your domain names, your accounts on every platform you use. You're renting your identity from companies that can change the terms whenever they want.
This isn't how identity should work. And it's one of the core problems Seed Hypermedia is designed to solve.
The problem with borrowed identity
When your identity belongs to someone else, you're vulnerable:
Platform risk. Twitter suspends accounts all the time, sometimes by mistake. Facebook locks people out of their accounts for violating policies they didn't know existed. If your business or reputation depends on a platform account, you're one moderation decision away from losing everything.
Impersonation. It's surprisingly easy to create fake accounts that look legitimate. Without a way to cryptographically verify who wrote something, you're trusting that platforms are doing a good job of policing impersonators. (Spoiler: they're not.)
No portability. You can't take your Twitter followers to Mastodon. You can't move your YouTube subscribers to another platform. Your audience belongs to the platform, not to you.
Permanence problems. When platforms die or pivot, your identity dies with them. Remember Vine? MySpace? All those connections, all that content—gone.
How Seed handles identity
Seed Hypermedia uses something called public key cryptography. Don't worry, I'll explain it simply.
When you create a Seed account, two things are generated:
A private key - a long string of random data that stays on your device
A public key - a related string that acts as your username/identifier
The math connecting these two is special: anything signed with your private key can be verified using your public key, but no one can figure out your private key from your public key.
In practice, this means:
Your identity is just a number that only you can prove you control
No company or server is involved in creating it
You can use the same identity across any app that supports the protocol
Anyone can verify that content came from you, forever
Your seed phrase
But wait—what happens if your computer dies? What if you want to use multiple devices?
This is where the "seed phrase" comes in. When you create an account, Seed gives you twelve random words. These words encode your private key in a human-readable format.
Write them down. Store them somewhere safe. With those twelve words, you can recover your identity on any device, at any time, forever.
No password reset emails. No support tickets. No proving your identity to a customer service rep. Just twelve words and some math.
Linking devices and accounts
What if you want to use Seed on your phone and your laptop? Easy—you use your seed phrase to access your identity on the new device.
But there's a more elegant option too: you can link devices by signing a message that says "this other device is also me." Your main device vouches for the new one, and both can now act on behalf of your identity.
This same mechanism lets you connect external identities. Own a domain name? You can prove that connection by signing a specific DNS record. Have a Twitter account? You can post a signed message that links the two identities together.
Over time, these connections build up a picture of who you are—verified by cryptography, not by trust in a central authority.
What this means in practice
When you publish something with Seed:
It's automatically signed with your private key
Anyone can verify it came from your account
That verification works forever, even if our company disappears
Your content can be archived, shared, and redistributed while maintaining proof of authorship
When someone else wants to verify your identity:
They can see your public key
They can check what domains and accounts you've linked
They can see who in their trust network vouches for you
They don't have to trust us, or anyone—the math proves it
No one can take this away
I want to be really clear about what makes this different:
We can't delete your account. There's no account to delete. Your identity is a cryptographic key that exists on your device.
We can't lock you out. There's no password database to corrupt, no authentication server to fail.
We can't censor you. Your content is signed by you, stored by you, and shared peer-to-peer. We don't control the network.
No one can impersonate you. Not without your private key, which only you have.
This is what we mean by "owning your identity." It's not a metaphor. It's not a marketing slogan. It's a technical reality that puts you in control.