For the past seven years, I’ve been returning again and again to a set of questions I can’t put out of my mind. In a nutshell: how can geospatial technologies be enhanced or improved by Web3 tools and design principles? And conversely, how can we integrate geospatial computing capabilities into decentralized systems like Ethereum and IPFS?
Note: The first section of this post will go over the background and motivation — if you’re pressed for time, jump ahead to Proof-of-Location Systems.
Crypto isn’t my home turf. I’ve been working professionally with geospatial data for my entire career:
Ever since I discovered Ethereum in 2017, and came to recognize the importance of Web3 design principles — open, durable, and opt-in — I couldn’t help but wonder how geospatial data could fit into this new paradigm.
When I first delved into blockchains I was working as a geospatial data scientist / product developer at an international NGO studying peace and security issues, focused on maritime security. I wrote an internal memo about how North Korea evades international sanctions, exporting coal to foreign markets to fund their nuclear weapons program.
I wasn’t surprised by the shell companies or reflagging schemes. What did surprise me was a technical tactic: ships would sail to a particular offshore location, switch off their AIS transceivers, steam into port, load up, then reappear on the map days later. (AIS is the Automatic Identification System, mandated by the UN’s International Maritime Organization, requires commercial vessels to broadcast their identity and location for safety and monitoring.)
I was a few months into crypto at that point, awash in buzzwords like “verifiability” and “censorship resistance.” Seeing how the ability to lie by omission was encoded into international shipping rules planted a seed: how could we do better than this? My masters at the Bartlett only reinforced my intuition: in a future of autonomous machines, strong and useful ways to represent where devices were in space would be important.
Over the years those seeds have germinated and sprouted into the project I now lead, Astral. Since leaving Toucan, a startup I co-founded to improve access and accountability in carbon markets (which depend heavily on geospatial data) using blockchains and smart contracts, I’ve been working on Astral and collaborating with a team led by Professor Taylor Oshan at the University of Maryland, laying the groundwork for a decentralized geospatial web aligned with Web3 design principles. In April, we published a paper outlining the three pillars we see needed for this technology ecosystem to emerge.
One pillar — perhaps the most important one — focuses on proof-of-location systems. This post outlines a lot of our thinking about how credible claims about where things happen can be made online — an environment where trust is being eroded and generative AI is forcing us to question what’s real.
My aim here isn’t to provide all the answers — there are a lot of technical, social, regulatory, and commercial specifics that remain unexplored. Instead, I hope to sketch the contours of a field that feels increasingly important, to articulate my thinking and prompt discussion.
Before we get to definitions, it helps to notice how common location verification already is in daily life. Websites infer location by IP address — many services block access to users from different locations based on this data. Mobile apps grab geographic coordinates from smartphone GPS chips. NFC key cards unlock access to gyms and office buildings. Border officers check people into countries.
These are all ways of producing and assessing location evidence — practical mechanisms that give someone else some degree of confidence about where and when an event occurred.
I use the term proof-of-location system to mean any system that produces evidence that supports a location claim. A location claim is a spatially referenced assertion about the position and, optionally, timing of anything – a person, device, asset, area, or event.
Our initial research identified seven broad categories of sources of location evidence:
This list is pragmatic, not exhaustive — the goal was to get a handle on how location is actually verified in practice.
Each of the systems I just described — whether it’s a GPS chip, an NFC card reader, or a border officer stamping a passport — produces a piece of evidence about location. I’ve been calling these location stamps: discrete, verifiable signals — clues about where and when something happened.
On their own, stamps can be useful, but they’re limited. A GPS reading can be spoofed. An IP address can be manipulated with a VPN. A legal form can be falsified. Each stamp makes lying a little harder, but no single system is immune to manipulation.
The real strength comes when multiple independent signals are combined into a single artifact. That combination — bringing together evidence from different systems and checking how they align — produces what we call a location proof.
A location proof is a verifiable digital artifact that supports a claim about the timing and location of an observed event, such that forging it would require collusion, technical manipulation, or fraud.
The principle is straightforward:
So the distinction is:
This is why I think of proofs as lying on a spectrum of certainty, an idea I first encountered through Kiersten Jowett’s work at the University of Melbourne.
| Level | Description |
|---|---|
| 0 | A self-issued, digitally signed claim of location and time, with no external verification. |
| 1 | Augments a self-reported location claim with one piece of externally sourced evidence — one “weak” strategy. |
| 2 | Some evidence attached — one strong strategy, or 2–3 weak strategies. Some effort required to forge. |
| 3 | A proof that integrates multiple independent evidence sources (such as sensor data and network triangulation) to cross-verify the location. Maybe requires at least one “strong” strategy. |
| 4 | A proof that leverages diverse, high-integrity signals and strong cryptographic measures, making forgery significantly harder. |
| 5 | A proof designed to resist even nation-state level attacks, using advanced cryptographic protocols and multiple cross-domain endorsements. |
To ground this in the original motivation — detecting maritime sanctions evasion — imagine how location proofs could change the picture.
Today, ships use AIS (Automatic Identification System) transceivers to broadcast their location. AIS is mandated by the UN’s International Maritime Organization to improve safety and monitoring of commercial vessels. But as I described earlier, even though they’re told not to (policy enforcement), ships can simply switch AIS off (no technical enforcement). That’s enough to move sanctioned cargo without sufficient scrutiny.
A location-proof approach would look different. Ships could be required to generate location proofs that draw on multiple independent systems:
Combined, these stamps would form a much stronger proof than AIS alone. Forging such a proof would require collusion across multiple systems, tampering with hardware, or coordinated fraud — far harder than just flipping a transceiver off. It wouldn’t make sanctions evasion impossible, but it would significantly raise the cost and lower the likelihood of going undetected.
A simpler use case: geoblocking website access. VPNs are consumer-grade technology, easy to use. Requiring users to provide additional independent signals corroborating their IP location improves the likelihood that they are where they claim to be, reducing fraudulent logins and enhancing compliance to location-based jurisdictional restrictions.
This isn’t research for the sake of it. For a long time, I’ve been thinking through what we’d need to build location-based services fit for the decentralized web. In my deep dive into Ethereum and other decentralized systems, I saw that open, composable, cryptographically verifiable design patterns produced more reliable architectures, and guarded against arbitrary manipulation by malicious or compromised administrators.
I believe there’s a growing need for public digital infrastructure built to serve humanity — a neutral base that resists capture by any special interests. This is true for finance, this is true for AI, and I believe this is true for location-based services.
We’re working toward a framework for location verification that could be relevant in trust-minimized contexts — especially those where incentives to lie about location are strong.
An in-depth defense of the need for this framework is beyond the scope of this post, but suffice to say:
The intuition here — grounded in many conversations and interviews — is that a coherent framework for verifying location in digital systems would improve trust, reduce costs, and open new opportunities.
Several converging trends make location proofs increasingly relevant:
Plenty remains unresolved. I’ve been drawn to designing for an open innovation ecosystem, anticipating the value that can emerge when protocols are adopted at scale. This approach is rooted in designing and building instructive implementations — prototypes and POCs in transport, gaming, social, climate monitoring, etc. But there’s a lot to be learned through real-world deployment of location proofs.
Things I’m thinking about these days:
At the University of Maryland, we’re cataloging existing verification strategies, developing frameworks for “stacked proofs,” and exploring privacy-preserving designs. This is ongoing, and we’re looking to speak with anyone who verifies location data for their company or use case.
In addition to this current work, through our role leading the Open Geospatial Consortium’s Blockchain and DLT Working Group (Prof Oshan is co-chair), we’re working on the **Location Protocol.** It’s a standardized schema for structuring, signing, and transporting location data — and a carrier for location proofs. I think of it as the envelope, not the evidence itself. It ensures verifiability, consistency, portability, and compatibility across systems.
The Location Protocol doesn’t replace commonly-used location data formats like existing formats like GeoJSON, GPX, GeoTIFF, etc. It complements them by wrapping these artifacts in standardized metadata required to interpret them, and by adding digital signatures. This makes location data portable, verifiable, and usable across decentralized and traditional systems alike. The reference implementation of the Location Protocol is built on the Ethereum Attestation Service.
Looking ahead:
Location proofs sit at the intersection of technology, policy, and economics. My stance is cautious optimism. We’re not chasing mathematical certainty; we’re building open, durable, opt-in systems that raise the cost of lying about where things happen.
There’s much more to figure out. I’d like this to be a conversation, not a declaration. If you’re researching, building, or simply thinking about these questions, I’d love to hear from you.