Paolo D’Amico from Tools for Humanity points out that artificial intelligence is creating major problems for current online security methods. He believes we’ll soon need much better ways to verify people’s identities online, making identity management a central part of the internet and requiring reliable ways to establish trust.
Key Takeaways:
- Paolo D’Amico says AI agents will shift identity management to a central role over the next 5 years.
- Integration of Agentkit and x402 secures transactions for 1 verified person per authorized agent.
- By 2026, World ID uses ZK cryptography to stop bots by requiring proof that you are a new person.
The Death of the ‘Repetitive Bot’
For a long time, protecting systems from ‘Sybil attacks’ – where one person creates many fake online identities to disrupt things – meant looking for accounts that acted like robots. If a large number of accounts all did the same thing at the same time, or followed a very predictable pattern, security systems could easily identify them as harmful.
However, the integration of artificial intelligence (AI) is fundamentally dismantling these traditional defenses. In an interview with Bitcoin.com News focused on the evolving threat landscape, Paolo D’Amico, senior staff product engineer at Tools for Humanity, outlined how AI has transitioned from a technical tool to a sophisticated “force multiplier” for digital attackers.
As an analyst, I’ve been tracking the evolving threat of Sybil attacks, and I’m seeing a concerning trend. Historically, launching a large-scale attack – creating numerous fake identities – was quite difficult and required a lot of technical skill to make those identities seem real. However, recent advancements in AI are changing that. As D’Amico points out, AI is now able to automate the process of building believable personas, significantly lowering the technical hurdles and making these attacks much easier to execute.
According to D’Amico, AI not only simplifies the process of creating automated attacks, but also makes them more effective. It allows attackers to create incredibly realistic actions, change their strategies on the fly, and overcome current security measures.
AI agents are different from typical bots because they can create original social media content, perform a wide range of blockchain transactions, and even act with the unpredictable timing of a human. This flexibility makes it very difficult for older security systems to detect groups of accounts that are actually managed by the same person or organization.
Perhaps the most significant shift D’Amico identifies is a fundamental change in how we perceive automated traffic. Historically, security teams operated under a simple criterion: Automated traffic is bad; human traffic is good. Yet, as we move toward an era of decentralized AI agents that perform legitimate tasks, that binary is breaking down.
According to D’Amico, new online tools are making it difficult to tell the difference between harmful automated bots and helpful automated processes. Because of this, websites need to update their security measures, as simply identifying something as ‘automated’ is no longer enough to determine if it’s malicious.
Is CAPTCHA Dead?
With AI now able to solve puzzles and act like humans online, people are wondering if traditional CAPTCHAs are still effective. D’Amico argues that CAPTCHAs aren’t necessarily going away, but they are changing significantly.
AI is quickly getting better at solving basic challenges, so we need to focus on creating more sophisticated systems that truly understand and represent human behavior online. D’Amico suggests new standards, such as those developed by the Privacy Pass group, offer a preview of a future where technology can more reliably verify that a real person is taking action, going beyond simple puzzle solving.
To defend against attacks using many fake online identities (often called a ‘Sybil swarm’), new technologies are being developed to ensure each user is genuinely unique. Agentkit is one example – it’s a tool developers can use, built on the World ID Protocol, to help with this.
Agentkit lets websites control who sees what by using World ID to verify users. A key benefit is limiting how often someone can access content – for example, allowing each real person a certain number of requests per hour. This makes it much harder for bots and fake accounts to overwhelm a platform.
According to D’Amico, World ID introduces a security layer where scaling Sybil attacks becomes significantly more difficult. In this ecosystem, an attacker can no longer gain a new identity simply by providing a new email address or phone number. To the system, you must be a new person. This shift is anchored by the Orb—a sophisticated piece of trusted hardware—and the use of zero-knowledge (ZK) cryptography, ensuring uniqueness is verified without compromising individual privacy.
I’ve been researching the growing world of autonomous agents, and the focus is shifting. It’s no longer just about *finding* these agents, but ensuring they’re authorized to act. New systems, like x402, are emerging that allow agents to directly pay for things online. But this raises a crucial security concern: how can we be sure an agent is actually spending money on behalf of a real person, and isn’t just a malicious program acting on its own?
The Regulatory Horizon: Privacy as a Foundation
D’Amico describes the combination of x402 and Agentkit as a modern equivalent of a power of attorney. X402 manages the actual payments, while Agentkit confirms that the payment request is authorized.
According to D’Amico, AgentKit lets users have another party handle the process of proving they’re human. With this system, a World ID can use several different keys to create these proofs. One key is tied to the user’s own device, and users can also give permission for an agent to use a separate key through AgentKit.
As a crypto investor, what I find really interesting about x402 payments is the security it offers. Basically, every payment is cryptographically signed, proving a real person authorized it. But it’s not a blank check – the authorization is limited to what the user specifically allows. The system prevents the payment agent from messing with my World ID or taking over my identity in any way, which is a huge relief when dealing with digital assets.
These new technologies are changing how we think about digital identity, but their development isn’t happening in isolation. Progress depends heavily on how governments around the world create rules and regulations. According to D’Amico, these regulations aren’t obstacles – they’re actually vital for ensuring technology develops responsibly and sustainably.
With AI becoming more sophisticated, rules about identity and privacy will likely change alongside it, according to D’Amico. This progress will create both exciting possibilities and new challenges, including potential security threats.
Over the next five years, D’Amico predicts identity management will become a core part of internet security, rather than just an add-on. As artificial intelligence becomes more prevalent, what defines someone’s online identity will need to include not only the person themselves, but also the AI systems acting on their behalf.
D’Amico believes this will lead to more secure online identities for people, ensuring that online profiles accurately represent real individuals. At the same time, she anticipates that establishing clear identities for AI and other automated systems will become increasingly crucial.
As AI agents become more involved in financial transactions, the industry needs better methods to confirm their identity, the limits of their access, and whether they’re authorized by a genuine person.
Read More
- Quantum Agents: Scaling Reinforcement Learning with Distributed Quantum Computing
- All Skyblazer Armor Locations in Crimson Desert
- Every Melee and Ranged Weapon in Windrose
- How to Get the Sunset Reed Armor Set and Hollow Visage Sword in Crimson Desert
- Zhuang Fangyi Build In Arknights Endfield
- Windrose Glorious Hunters Quest Guide (Broken Musket)
- Best Dual-Wield Swords Build in Crimson Desert
- Jojo’s Bizarre Adventure Ties Frieren As MyAnimeList’s New #1 Anime
- Black Sun Shield Location In Crimson Desert (Buried Treasure Quest)
- Boruto: Two Blue Vortex Chapter 33 Preview — The Final Battle Vs Mamushi Begins
2026-04-23 05:30