{"id":1314,"date":"2025-06-25T12:48:47","date_gmt":"2025-06-25T12:48:47","guid":{"rendered":"https:\/\/moca.network\/blog\/?p=1314"},"modified":"2025-07-16T10:34:12","modified_gmt":"2025-07-16T10:34:12","slug":"what-is-moca-chain","status":"publish","type":"post","link":"https:\/\/moca.network\/blog\/what-is-moca-chain\/","title":{"rendered":"What is Moca Chain? A purpose-built L1 for identity and data"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-key-takeaways\">Key Takeaways<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Moca Chain is a modular, chain-agnostic, EVM-compatible Layer 1 purpose-built for identity and data.<\/li>\n\n\n\n<li>Identity protocols and applications can build on Moca Chain with end-to-end identity infrastructure capabilities, interoperability with other chains and apps via Identity Oracle, and access to a broad distribution of users, issuers, and verifiers under a unified identity.<\/li>\n\n\n\n<li>Identity data from multiple issuers \u2014 across healthcare, education, finance, sports, and more &#8211; will be issued to the same unified identity, collectively verifiable in any app on any chain.<\/li>\n\n\n\n<li>Identities on Moca Chain are self-sovereign and privacy-preserved \u2014 data is private to the users only, however can be verified with third parties via zero-knowledge proofs (\u201dZKP\u201d) across any apps on any chains, without exposing raw data and only with user&#8217;s permission.<\/li>\n\n\n\n<li>Moca Chain\u2019s decentralized data storage enables reusability and persistence of identity data for multiple verifications.<\/li>\n\n\n\n<li>Moca Chain removes the dependency on centralized data sources through its native zkTLS capability, enabling protocols and apps to onboard private web data without relying on traditional APIs.<\/li>\n\n\n\n<li>Moca Chain is not just another general-purpose L1 or L2 \u2014 it coexists symbiotically with other chains as the modular identity and data verification layer.<\/li>\n\n\n\n<li>Moca Chain\u2019s testnet launches in Q3 and mainnet in Q4.&nbsp;$MOCA&nbsp;will serve as the core utility token powering the network\u2019s identity and data ecosystem.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-data-is-the-new-oil-but-why-should-i-care\"><strong>Data is the new oil, but why should I care?<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How does a normal user benefit from it?<\/li>\n\n\n\n<li>How do I invest in data?<\/li>\n<\/ul>\n\n\n\n<p>Data has tremendous intrinsic value, reflected in M&amp;A, data brokerage, advertising, research, and more. However, to date, data sharing and transactions have been highly inefficient. At Moca Network, we believe that&nbsp;data should be the new asset class everyone can invest in.<\/p>\n\n\n\n<p>In order to have a liquid asset class, individuals should have full ownership of their identity, break free from the centralized entities, removing the middlemen, and controlling how data is being used and what value they get. This belief drives our mission to build the world\u2019s largest identity network:&nbsp;one identity, verifiable everywhere, with unlimited value.<\/p>\n\n\n\n<p>Moca Chain will launch with day-one access to Animoca Brands\u2019 ecosystem of over 540 companies and 700 million users. However, it takes more than one ecosystem to become the world\u2019s largest identity network. Hence, Moca Chain is your permissionless platform for protocols, apps and partners to&nbsp;share our network to bootstrap growth,&nbsp;and scale data issuance and verifications to the network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-moca-chain\">What is Moca Chain?<\/h2>\n\n\n\n<p>Moca Chain&nbsp;is a Layer 1 blockchain designed to empower identity protocols, issuers, and verifiers to:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Onboard and store any private first party and web data via Moca Network\u2019s storage and data onboarding solutions<\/li>\n\n\n\n<li>Obfuscate and issue private data by generating zero-knowledge proofs (\u201dZKP\u201d)<\/li>\n\n\n\n<li>Verify identity data proofs on-chain by any app on any chain via Identity Oracle and traditional interfaces<\/li>\n\n\n\n<li>Allow applications on any blockchain to verify identity data proofs on-chain<\/li>\n\n\n\n<li>Monetize based on data verifications<\/li>\n<\/ol>\n\n\n\n<p><strong>In technical terms, Moca Chain consists of 4 main technologies:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Decentralized data storage<\/li>\n\n\n\n<li>Identity Oracle<\/li>\n\n\n\n<li>zkTLS<\/li>\n\n\n\n<li>On-chain zero knowledge proof verifications<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-the-relationship-between-air-kit-and-moca-chain\">What is the relationship between AIR Kit and Moca Chain?<\/h2>\n\n\n\n<p>Together with&nbsp;<strong><a href=\"https:\/\/moca.network\/blog\/what-is-air-kit\/\">AIR Kit<\/a><\/strong>\u2014which includes&nbsp;AIR Account&nbsp;and&nbsp;AIR ID\u2014Moca Chain&#8217;s ecosystem partners will have a seamless and app-embedded &#8220;entry point&#8221; to Moca Chain for user onboarding, credential issuance, credential verification, and web proof data generation.<\/p>\n\n\n\n<p>For example, an online liquor store can use AIR Kit to embed a seamless account onboarding and identity flow to verify if the user is over 21 years old. The user visits the online store and get requested to verify her age. The user will then be able to generate a ZKP based on the previously issued and encrypted date of birth credential data. The store then verifies the age proof on Moca Chain without having access to the DOB data. The system returns only a \u201cY\/N\u201d response, allowing the user to proceed with the purchase, all without revealing any personal information.<\/p>\n\n\n\n<p>These credentials are more than just static numbers, but instead generate financial value for the users and issuers in the data economy. As data takes the center stage in the financial flywheel, $MOCA will become the core currency powering the financialization of data. The more users are onboarded and the more valuable data is verified, the more $MOCA will be consumed and held.<\/p>\n\n\n\n<p>Businesses can unlock new value for their user base and reach their qualified audience, while users can own their data and fully maximize its value. $MOCA serves as the native coin, providing a form of fee and economic value sharing across all network participants.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-problems-does-moca-chain-solve\">What Problems Does Moca Chain Solve?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-fragmented-identity-data-limit-reusability-and-interoperability\">Fragmented Identity Data Limit Reusability and Interoperability<\/h3>\n\n\n\n<p>Today, identity data is fragmented across platforms \/ chains, and managed by disparate entities, forcing redundant verification processes, and limiting data interoperability. Moca Chain addresses this by introducing a unified account and identity layer and cross-chain Identity Oracle, allowing credentials to be verified seamlessly across applications and ecosystems. How many times have you done the exactly the same KYC process with multiple platforms? What if you only need to do it once and use the data to verify on other platforms?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-identity-checks-expose-personal-data\">Identity Checks Expose Personal Data<\/h3>\n\n\n\n<p>Traditionally, Identity verifications require personal identifiable information (PII) to be shared in plaintext, raising serious security and privacy concerns. Moca Chain, by contrast, leverages ZKP to let users verify without ever revealing the underlying personal data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-data-sharing-relies-on-centralized-entities-and-limits-monetization-opportunities\">Data Sharing Relies on Centralized Entities and Limits Monetization Opportunities<\/h3>\n\n\n\n<p>Most identity systems lock user data into centralized storages under the control of centralized entities. Moca Chain enables self-sovereign identity, enforcing data to be only shareable with users\u2019 explicit approval. In addition, Moca Chain\u2019s zkTLS module allow users to \u201cre-own\u201d any kind of web data without permissions from the centralized data source. Imagine trying to log in and display your airline status at the front desk, but in a tamper-proof and scalable manner.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-moca-chain-work\">How Does Moca Chain Work?<\/h2>\n\n\n\n<p>Moca Chain is not just a set of features, but a non-negotiable module for any user-centric architecture and data interoperability. It will become the backbone of any networks and ecosystems formed by users, issuers, and verifiers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-roles-that-power-moca-chain\">The Roles that Power Moca Chain<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Users (Data Holders)<\/strong>&nbsp;are individuals who want to unlock access or rewards by proving identity and data from various applications.<\/li>\n\n\n\n<li><b>Issuers are busin<\/b>ess entities that host the service, which collects the user data, or identity protocols that facilitate data collection via zkTLS. A user identity can hold data from multiple issuers.<\/li>\n\n\n\n<li><strong>Verifiers<\/strong>\u00a0are business entities that verify credentials for access, compliance, or the distribution of rewards. Verifiers can compose various verification criteria based on the user\u2019s identity data, without accessing the raw data.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/R_1O0tyU-1024x576.jpeg\" alt=\"\" class=\"wp-image-1315\" srcset=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/R_1O0tyU-1024x576.jpeg 1024w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/R_1O0tyU-300x169.jpeg 300w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/R_1O0tyU-768x432.jpeg 768w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/R_1O0tyU-400x225.jpeg 400w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/R_1O0tyU-800x450.jpeg 800w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/R_1O0tyU-832x468.jpeg 832w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/R_1O0tyU-1248x702.jpeg 1248w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/R_1O0tyU.jpeg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Credential Lifecycle on Moca Chain<\/h2>\n\n\n\n<p>Here is a step-by-step overview of how credentials are issued, stored, and verified on Moca Chain.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037-1024x576.png\" alt=\"\" class=\"wp-image-1319\" srcset=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037-1024x576.png 1024w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037-300x169.png 300w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037-768x432.png 768w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037-1536x864.png 1536w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037-400x225.png 400w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037-800x450.png 800w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037-832x468.png 832w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037-1664x936.png 1664w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037-1248x702.png 1248w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image2037.png 1919w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Step-by-Step Credential Flow on Moca Chain<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>User wants access to gated features or rewards (User \u2192 Verifier)<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"393\" height=\"861\" src=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v1.png\" alt=\"\" class=\"wp-image-1320\" style=\"width:216px;height:auto\" srcset=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v1.png 393w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v1-137x300.png 137w\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" \/><\/figure>\n\n\n\n<p>2. Verifier requests verification from user (Verifier \u2192 User)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"393\" height=\"861\" src=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v2.png\" alt=\"\" class=\"wp-image-1321\" style=\"width:216px;height:auto\" srcset=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v2.png 393w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v2-137x300.png 137w\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" \/><\/figure>\n\n\n\n<p>3. User claims credential from issuer (User \u2192 Issuer)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"393\" height=\"861\" src=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v3.png\" alt=\"\" class=\"wp-image-1322\" style=\"width:216px;height:auto\" srcset=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v3.png 393w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v3-137x300.png 137w\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" \/><\/figure>\n\n\n\n<p>4. Issuer validates user claim (Issuer \u2192 User)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"393\" height=\"861\" src=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v4.png\" alt=\"\" class=\"wp-image-1323\" style=\"width:211px;height:auto\" srcset=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v4.png 393w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/v4-137x300.png 137w\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" \/><\/figure>\n\n\n\n<p>5. Issuer issues and stores encrypted credentials on Moca Chain (Issuer \u2192 Moca Chain)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"393\" height=\"861\" src=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/Redirected-to-issuer-3.png\" alt=\"\" class=\"wp-image-1324\" style=\"width:211px;height:auto\" srcset=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/Redirected-to-issuer-3.png 393w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/Redirected-to-issuer-3-137x300.png 137w\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" \/><\/figure>\n\n\n\n<p>6. User authorizes verifier to decrypt credential (User \u2192 Verifier)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"393\" height=\"861\" src=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/Verifier.png\" alt=\"\" class=\"wp-image-1325\" style=\"width:212px;height:auto\" srcset=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/Verifier.png 393w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/Verifier-137x300.png 137w\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" \/><\/figure>\n\n\n\n<p>7. Verifier retrieves encrypted credential from decentralized storage on Moca Chain (Verifier \u2192 Moca Chain)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"393\" height=\"861\" src=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/Verified.png\" alt=\"\" class=\"wp-image-1326\" style=\"width:212px;height:auto\" srcset=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/Verified.png 393w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/Verified-137x300.png 137w\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" \/><\/figure>\n\n\n\n<p>8. Verifier generates proof from decrypted credential, submits it for verification, verifies the proof, and offers access or rewards to user (Verifier \u2192 User)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Credential Activity Drives $MOCA Value<\/h2>\n\n\n\n<p>$MOCA is the utility token of Moca Chain, required to power the protocol\u2019s core infrastructure. As more credentials are issued, claimed, and verified, more $MOCA are required to be held and consumed:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Validator Staking<\/strong>&nbsp;\u2013 Validators stake $MOCA to secure the network and process identity-related transactions.<\/li>\n\n\n\n<li><strong>Gas Fees<\/strong>&nbsp;\u2013 $MOCA is required for all on-chain actions, including credential issuance, claim, verifications. The token will also be used in PayMaster, which will be used to pay for gas fees on all the compatible chains.<\/li>\n\n\n\n<li><strong>Verification Fees<\/strong>\u00a0\u2013 Verifiers pay $MOCA to verify credentials (e.g., KYC, qualifications), with the price set by issuers.<\/li>\n\n\n\n<li><strong>Decentralized Data Storage<\/strong>\u00a0&#8211; A Certain amount of $MOCA has to be held to enable storage per user.<\/li>\n\n\n\n<li><strong>Identity Oracle<\/strong>&nbsp;\u2013 $MOCA will be used to pay the fee for relaying verifications to other chains.<\/li>\n\n\n\n<li><strong>Data Generation<\/strong>&nbsp;\u2013 $MOCA is used for generating data via zkTLS with governance on data validity and performance.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How Is Moca Chain Different from Other Blockchains?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">End-to-End Identity Infrastructure<\/h3>\n\n\n\n<p>Moca Chain offers&nbsp;the full infrastructure&nbsp;for the entire credential data lifecycle\u2014from user onboarding to data issuance, verification, and monetization.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Neutral and Symbiotic Positioning as the Home for All Identities<\/h3>\n\n\n\n<p>With our history of being chain-agnostic and nature of Moca Chain, specifically its&nbsp;cross-chain Identity Oracle&nbsp;allows verifiable credentials to be verifiable everywhere, it is not biased towards any ecosystems or competing for TVL or traffic.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Massive Day 0 Reach via Animoca Brands and Moca Network<\/h3>\n\n\n\n<p>Moca Chain launches with access to over 540 companies and 700 million users via the Animoca Brands ecosystem, with early adoption by SK Planet\u2019s (28m KYC\u2019d users), OneFootball (200m users), and Animoca Brands portfolio &#8211; providing strong real-world distribution of users, data, and customers from day one.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Modular Architecture with AIR Kit<\/h3>\n\n\n\n<p>AIR Kit&nbsp;enables plug-and-play integration of&nbsp;universal accounts and identity modules&nbsp;into any chains, apps, and wallets. Partners can choose to integrate each module independently or all at once.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Privacy-First Verifications via ZKP<\/h3>\n\n\n\n<p>Credentials data are encrypted with users\u2019 private keys, and data is only verified via ZKP. No one else except the user can give permission for data access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Real-World Use Cases: How Life Gets Better with Moca Chain<\/h2>\n\n\n\n<p>Moca Chain gives users&nbsp;self-sovereign control&nbsp;over their data, unlocking real-world value through verifiable credentials. Here are just a few examples:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Compliance<\/h3>\n\n\n\n<p>Tired of doing 30 the same KYC processes? Do it once and reuse the credentials across all exchanges, payment apps, and more, without exposing your raw passport information or face scan.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Education<\/strong><\/h3>\n\n\n\n<p>If you earn a university degree, or any training achievements, you can verify them on a job board platform, dating apps, and more.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Gaming<\/strong><\/h3>\n\n\n\n<p>Your 100 hours in GTA6 should mean more than screenshots. With Moca credentials, your&nbsp;in-game spending and achievements become verifiable credentials, verifiable across games.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Creator<\/h3>\n\n\n\n<p>Your creator promoting or complaining about specific tokens can finally be verified if they hold any of them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Sports<\/strong><\/h3>\n\n\n\n<p>If you were an Inter Miami fan before Messi joined, that loyalty should count. Moca credentials verify&nbsp;fan history on-chain, unlocking access to premium drops, tickets, and rewards tied to proven engagement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Start Building on Moca Chain<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35-1024x576.png\" alt=\"\" class=\"wp-image-1328\" srcset=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35-1024x576.png 1024w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35-300x169.png 300w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35-768x432.png 768w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35-1536x864.png 1536w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35-400x225.png 400w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35-800x450.png 800w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35-832x468.png 832w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35-1664x936.png 1664w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35-1248x702.png 1248w, https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/image-35.png 1919w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Moca Chain\u2019s testnet is launching in Q3, onboarding the best identity protocols and giving them a home that helps each other grow. As the core infrastructure for verifiable, user-owned identity, it\u2019s an open call to developers, builders, and visionaries ready to shape the next era of the internet. We&#8217;re here to help you grow together!<\/p>\n\n\n\n<p><strong>Start building at:<\/strong>&nbsp;<a href=\"https:\/\/mocachain.org\/\">https:\/\/mocachain.org\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Key Takeaways Data is the new oil, but why should I care? Data has tremendous intrinsic value, reflected&hellip;","protected":false},"author":1,"featured_media":1316,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":"","footnotes":""},"categories":[35,29],"tags":[70,261,259,255,257],"ppma_author":[45],"class_list":{"0":"post-1314","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-product","8":"category-product-101","9":"tag-air-kit","10":"tag-layer-1","11":"tag-moca-2","12":"tag-moca-chain","13":"tag-moca-coin","14":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.8 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Moca Chain? A purpose-built L1 for identity and data - Moca Blog<\/title>\n<meta name=\"description\" content=\"Moca Chain is a modular, chain-agnostic, EVM-compatible Layer 1 purpose-built for identity and data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/moca.network\/blog\/what-is-moca-chain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Moca Chain? A purpose-built L1 for identity and data\" \/>\n<meta property=\"og:description\" content=\"Moca Chain is a modular, chain-agnostic, EVM-compatible Layer 1 purpose-built for identity and data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/moca.network\/blog\/what-is-moca-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"Moca Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-25T12:48:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-16T10:34:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/chain-template-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Moca Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Moca_Network\" \/>\n<meta name=\"twitter:site\" content=\"@Moca_Network\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Moca Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/\"},\"author\":{\"name\":\"Moca Team\",\"@id\":\"https:\/\/moca.network\/blog\/#\/schema\/person\/4967195d277ce1b51c96615646ccf18f\"},\"headline\":\"What is Moca Chain? A purpose-built L1 for identity and data\",\"datePublished\":\"2025-06-25T12:48:47+00:00\",\"dateModified\":\"2025-07-16T10:34:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/\"},\"wordCount\":1850,\"publisher\":{\"@id\":\"https:\/\/moca.network\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/chain-template-2-1.jpg\",\"keywords\":[\"AIR Kit\",\"Layer 1\",\"Moca\",\"Moca Chain\",\"MOCA Coin\"],\"articleSection\":[\"Product\",\"Product 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/\",\"url\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/\",\"name\":\"What is Moca Chain? A purpose-built L1 for identity and data - Moca Blog\",\"isPartOf\":{\"@id\":\"https:\/\/moca.network\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/chain-template-2-1.jpg\",\"datePublished\":\"2025-06-25T12:48:47+00:00\",\"dateModified\":\"2025-07-16T10:34:12+00:00\",\"description\":\"Moca Chain is a modular, chain-agnostic, EVM-compatible Layer 1 purpose-built for identity and data.\",\"breadcrumb\":{\"@id\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/moca.network\/blog\/what-is-moca-chain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/#primaryimage\",\"url\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/chain-template-2-1.jpg\",\"contentUrl\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/chain-template-2-1.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/moca.network\/blog\/what-is-moca-chain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/moca.network\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Moca Chain? A purpose-built L1 for identity and data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/moca.network\/blog\/#website\",\"url\":\"https:\/\/moca.network\/blog\/\",\"name\":\"Moca Academy\",\"description\":\"Moca Blog: Redefining Digital Identity, Reputation &amp; Ownership\",\"publisher\":{\"@id\":\"https:\/\/moca.network\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/moca.network\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/moca.network\/blog\/#organization\",\"name\":\"Moca Network\",\"url\":\"https:\/\/moca.network\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/moca.network\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/04\/Moca_Network.png\",\"contentUrl\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/04\/Moca_Network.png\",\"width\":714,\"height\":241,\"caption\":\"Moca Network\"},\"image\":{\"@id\":\"https:\/\/moca.network\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Moca_Network\",\"http:\/\/discord.gg\/MocaverseNFT\",\"https:\/\/t.me\/Mocaverse\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/moca.network\/blog\/#\/schema\/person\/4967195d277ce1b51c96615646ccf18f\",\"name\":\"Moca Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/moca.network\/blog\/#\/schema\/person\/image\/ddc1d4a8b64db3bd75ced557acf8b6a9\",\"url\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png\",\"contentUrl\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png\",\"caption\":\"Moca Team\"},\"sameAs\":[\"https:\/\/moca.network\/en\"],\"url\":\"https:\/\/moca.network\/blog\/author\/moca\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Moca Chain? A purpose-built L1 for identity and data - Moca Blog","description":"Moca Chain is a modular, chain-agnostic, EVM-compatible Layer 1 purpose-built for identity and data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/moca.network\/blog\/what-is-moca-chain\/","og_locale":"en_US","og_type":"article","og_title":"What is Moca Chain? A purpose-built L1 for identity and data","og_description":"Moca Chain is a modular, chain-agnostic, EVM-compatible Layer 1 purpose-built for identity and data.","og_url":"https:\/\/moca.network\/blog\/what-is-moca-chain\/","og_site_name":"Moca Blog","article_published_time":"2025-06-25T12:48:47+00:00","article_modified_time":"2025-07-16T10:34:12+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/chain-template-2-1.jpg","type":"image\/jpeg"}],"author":"Moca Team","twitter_card":"summary_large_image","twitter_creator":"@Moca_Network","twitter_site":"@Moca_Network","twitter_misc":{"Written by":"Moca Team","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/moca.network\/blog\/what-is-moca-chain\/#article","isPartOf":{"@id":"https:\/\/moca.network\/blog\/what-is-moca-chain\/"},"author":{"name":"Moca Team","@id":"https:\/\/moca.network\/blog\/#\/schema\/person\/4967195d277ce1b51c96615646ccf18f"},"headline":"What is Moca Chain? A purpose-built L1 for identity and data","datePublished":"2025-06-25T12:48:47+00:00","dateModified":"2025-07-16T10:34:12+00:00","mainEntityOfPage":{"@id":"https:\/\/moca.network\/blog\/what-is-moca-chain\/"},"wordCount":1850,"publisher":{"@id":"https:\/\/moca.network\/blog\/#organization"},"image":{"@id":"https:\/\/moca.network\/blog\/what-is-moca-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/chain-template-2-1.jpg","keywords":["AIR Kit","Layer 1","Moca","Moca Chain","MOCA Coin"],"articleSection":["Product","Product 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/moca.network\/blog\/what-is-moca-chain\/","url":"https:\/\/moca.network\/blog\/what-is-moca-chain\/","name":"What is Moca Chain? A purpose-built L1 for identity and data - Moca Blog","isPartOf":{"@id":"https:\/\/moca.network\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/moca.network\/blog\/what-is-moca-chain\/#primaryimage"},"image":{"@id":"https:\/\/moca.network\/blog\/what-is-moca-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/chain-template-2-1.jpg","datePublished":"2025-06-25T12:48:47+00:00","dateModified":"2025-07-16T10:34:12+00:00","description":"Moca Chain is a modular, chain-agnostic, EVM-compatible Layer 1 purpose-built for identity and data.","breadcrumb":{"@id":"https:\/\/moca.network\/blog\/what-is-moca-chain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/moca.network\/blog\/what-is-moca-chain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/moca.network\/blog\/what-is-moca-chain\/#primaryimage","url":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/chain-template-2-1.jpg","contentUrl":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/chain-template-2-1.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/moca.network\/blog\/what-is-moca-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/moca.network\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Moca Chain? A purpose-built L1 for identity and data"}]},{"@type":"WebSite","@id":"https:\/\/moca.network\/blog\/#website","url":"https:\/\/moca.network\/blog\/","name":"Moca Academy","description":"Moca Blog: Redefining Digital Identity, Reputation &amp; Ownership","publisher":{"@id":"https:\/\/moca.network\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/moca.network\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/moca.network\/blog\/#organization","name":"Moca Network","url":"https:\/\/moca.network\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/moca.network\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/04\/Moca_Network.png","contentUrl":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/04\/Moca_Network.png","width":714,"height":241,"caption":"Moca Network"},"image":{"@id":"https:\/\/moca.network\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Moca_Network","http:\/\/discord.gg\/MocaverseNFT","https:\/\/t.me\/Mocaverse"]},{"@type":"Person","@id":"https:\/\/moca.network\/blog\/#\/schema\/person\/4967195d277ce1b51c96615646ccf18f","name":"Moca Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/moca.network\/blog\/#\/schema\/person\/image\/ddc1d4a8b64db3bd75ced557acf8b6a9","url":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png","contentUrl":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png","caption":"Moca Team"},"sameAs":["https:\/\/moca.network\/en"],"url":"https:\/\/moca.network\/blog\/author\/moca\/"}]}},"authors":[{"term_id":45,"user_id":1,"is_guest":0,"slug":"moca","display_name":"Moca Team","avatar_url":{"url":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png","url2x":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png"},"author_category":"1","first_name":"Moca","last_name":"Team","user_url":"https:\/\/moca.network\/en","job_title":"","description":""}],"_links":{"self":[{"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/posts\/1314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/comments?post=1314"}],"version-history":[{"count":10,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/posts\/1314\/revisions"}],"predecessor-version":[{"id":1423,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/posts\/1314\/revisions\/1423"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/media\/1316"}],"wp:attachment":[{"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/media?parent=1314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/categories?post=1314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/tags?post=1314"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/ppma_author?post=1314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}