# How it Works

<figure><img src="https://3624281037-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fd7kNQbLPmIWvOXjN6ke2%2Fuploads%2FdGsv4daOSUNRpP9tpZv6%2FTruth%20Verificaiton.png?alt=media&#x26;token=74eefd22-a25e-41fd-aaf9-1694af89aceb" alt=""><figcaption><p>ZK - Truth Verification Process by Swarm Network</p></figcaption></figure>

Whether it’s a social media user challenging a viral rumor, a crypto project verifying token distribution, or a decentralized application (DApp) confirming real-world events—Swarm Network’s protocol ensures credible outcomes.

Here’s the high-level flow:

1. **Claimant Submits Unverified Info**

   A claimant—be it an application, data provider, or individual—sends raw, unverified content (e.g., “Event X happened at Y time”) to Swarm.
2. **Agent Layer Processes Claims**

   **AI agents** break this content into **“atomic claims”** (testable chunks of information), creating cryptographic (ZK) proofs as they gather supporting evidence.
3. **Protocol Registers ZK Proofs**

   The Swarm Protocol logs these proofs on-chain, signaling to **validators** that fresh claims are ready for review.
4. **Validators Independently Verify**

   **Human verifiers** and additional AI checks cross-examine each claim. If the data holds up—no contradictions or mismatches—the claim is updated to a verified status on-chain.
5. **Public Consumes Verified Results**

   At this point, anyone—be it a DeFi platform, social user, or developer—can query these verified claims. Misinformation loses its power when confronted by transparent, tamper-resistant data.
