Access Any Data
on the Internet
Access Any Data
on the Internet
Access Any Data
on the Internet
Access any data
on the Internet
Access Any Data
on the Internet
Reclaim Protocol is an infrastructure for accessing any user-permissioned data, simply and at scale.
Reclaim Protocol is an infrastructure for accessing any user-permissioned data, simply and at scale.
Reclaim Protocol is an infrastructure for accessing any user-permissioned data, simply and at scale.







We've built this with developers in mind so that you can,
Deploy into production
in 10 mins!
Deploy into production in 10 mins!
We give you to freedom to put
your verifications across any chain
Live and Growing across
many ecosystems,
onchain
Live and Growing across
many ecosystems,
onchain
Backed by the best
Backed by the best
Backed by the best
Backed by the best












Blogs
Blogs
Blogs
Blogs
"Why Traditional Verification is Dead: The Future is Instant and AI-Driven"
"Why Traditional Verification is Dead: The Future is Instant and AI-Driven"
"Why Traditional Verification is Dead: The Future is Instant and AI-Driven"
FAQs
FAQs
FAQs
FAQs
We’ve got the answers
Ok, tell me what is Reclaim Protocol again?
Sure. Here is what matters. If you use the Reclaim SDK, you can ask your users to prove certain identity and reputation they have on other websites. For example, you could ask the user to login into their bank and prove their bank balance. You could ask your user to login into Uber and prove that they've taken more than 50 rides this year. All of this happens without compromising security and without needing any change on the bank's or Uber's side. Not just Banks and Uber, you can connect to any website on the internet. Over 1000 already.
Does Reclaim Protocol do an MITM attack?
What are the trust assumptions here?
If the software is open sourced, why do I need to pay?
Do my users have to install an app or chrome extension?
Ok, tell me what is Reclaim Protocol again?
Sure. Here is what matters. If you use the Reclaim SDK, you can ask your users to prove certain identity and reputation they have on other websites. For example, you could ask the user to login into their bank and prove their bank balance. You could ask your user to login into Uber and prove that they've taken more than 50 rides this year. All of this happens without compromising security and without needing any change on the bank's or Uber's side. Not just Banks and Uber, you can connect to any website on the internet. Over 1000 already.
Does Reclaim Protocol do an MITM attack?
What are the trust assumptions here?
If the software is open sourced, why do I need to pay?
Do my users have to install an app or chrome extension?
Ok, tell me what is Reclaim Protocol again?
Sure. Here is what matters. If you use the Reclaim SDK, you can ask your users to prove certain identity and reputation they have on other websites. For example, you could ask the user to login into their bank and prove their bank balance. You could ask your user to login into Uber and prove that they've taken more than 50 rides this year. All of this happens without compromising security and without needing any change on the bank's or Uber's side. Not just Banks and Uber, you can connect to any website on the internet. Over 1000 already.
Does Reclaim Protocol do an MITM attack?
What are the trust assumptions here?
If the software is open sourced, why do I need to pay?
Do my users have to install an app or chrome extension?
Ok, tell me what is Reclaim Protocol again?
Sure. Here is what matters. If you use the Reclaim SDK, you can ask your users to prove certain identity and reputation they have on other websites. For example, you could ask the user to login into their bank and prove their bank balance. You could ask your user to login into Uber and prove that they've taken more than 50 rides this year. All of this happens without compromising security and without needing any change on the bank's or Uber's side. Not just Banks and Uber, you can connect to any website on the internet. Over 1000 already.
Does Reclaim Protocol do an MITM attack?
What are the trust assumptions here?
If the software is open sourced, why do I need to pay?
Do my users have to install an app or chrome extension?