The Graph Is the Product
Every node we add to the genealogical graph is a verified, unique human. Over time, that graph becomes the most accurate map of real people ever assembled — anchored not in government databases or social media profiles, but in the biological fact of human descent.
This has a second application we didn't name on the homepage: reachability.
The Internet Broke Human Contact
The internet was supposed to make humans more findable. It did the opposite.
Spam destroyed open contact forms. Privacy laws killed public directories. Social media fragmented identity across dozens of platforms. Today, finding and contacting a specific real human — not a brand, not a business, a person — requires either luck, a private investigator, or surrendering to predatory data broker sites that charge for stale, unreliable information.
The Certified H graph fixes this from the ground up.
Credentialed Introduction
When a node in the graph chooses to attach a contact preference — an email, a one-way message form, a phone number — they become findable by other verified humans in a way that is:
SPAM_PROOF
Senders must hold a valid Certified H ID. Proven unique human, not a bot, not a bulk mailer.
CONTEXTUAL
Senders attach their identity and stated reason, visible to the recipient before they choose to respond.
ASYMMETRIC
Recipients control their exposure level. Fully listed. One-way message only. Unlisted but emergency-contactable.
JURISDICTION_OK
The graph is a statement of existence, not surveillance. Sweden publishes salaries. Ontario publishes public sector pay. The US publishes bodycam footage. Existence in the human family graph is no more invasive than a phone book entry — which was never considered a privacy violation until the internet made aggregation cheap.
A Social Network for People Who Aren't on Social Networks
The result is something that has never existed: a social network for people who aren't on social networks. The 15% who never joined Facebook. The elderly. The deliberately private. The people who fell off the grid. The dead — whose nodes, once added for genealogical verification, create the scaffolding that living relatives can claim.
This Is Not a Data Broker
Data brokers sell stale scraped garbage to anyone with a credit card. This is a credentialed introduction layer — the sender is verified, the message is contextualized, the recipient controls the channel.
The Trojan Horse
The genealogical proof-of-personhood is the Trojan horse. The reachability layer is the product. And unlike every social network ever built, this one populates itself from historical record, not from whether you happened to sign up in 2008.
We are building the verifiable graph of human history.
Contact is just one of the things you can do with it.