As a community host, understanding how your members' identities interact with your network is crucial for security and trust.
When a user joins your network using their UIID, they aren't just a username. They are a collection of Verified Claims. You can set your network to require certain claims for entry, such as for example:
Verified Email/Phone.
Proof of Humanity (to prevent bots).
Specific digital credentials (e.g., "Certified Architect").
Because UIID is tied to hardware (like a w\Phone or w\Ring), it is much harder for "trolls" or "bad actors" to create hundreds of fake accounts. If someone is banned from your network, their unique cryptographic identity is flagged, preventing easy re-entry.
For the user, the connection is invisible. They simply tap "Join," approve the data release in their UIID app, and they are instantly part of your world.