Understanding the Otherkin Phenomenon

otherkin nonhuman identity
Lalit Choda
Lalit Choda

Founder & CEO @ Non-Human Identity Mgmt Group

 
August 17, 2025 10 min read

TL;DR

This article explores the otherkin phenomenon, detailing its origins, diverse identities, and underlying motivations. It covers the various psychological, spiritual, and social factors driving this subculture, and addresses the potential security and identity-related concerns relevant to CISOs and CIOs. The article also offers practical strategies for engaging with and understanding this unique community.

Introduction: The Emergence of Otherkin

Hold up, have you ever heard someone say they're, like, an elf or a dragon on the inside? It's more common than you think, and it's called being "otherkin." So, what's that all about?

  • otherkin is a subculture where people identify as not entirely human. It's not just a hobby; they genuinely feel a connection to something non-human.
  • Core Belief: whether spiritually or psychologically, otherkin feel a partial or complete disconnect from humanity. Some might feel like they have a nonhuman soul, while others attribute it to neurodivergence.
  • Online Visibility: These identities is gaining visibility online. It's easy to find communities dedicated to specific "kintypes" (like dragons or wolves), where people share experiences and support each other.

This is just the beginning—next up, we'll dive deeper into what shapes an Otherkin identity.

Historical and Cultural Roots of the Otherkin Phenomenon

Okay, so where did this otherkin thing even come from, right? It's not like people just woke up one day deciding they were dragons.

  • The short version? It kinda bubbled up from the 1990s online scene. Think fantasy nerds, pagan groups, all hanging out in the same digital spaces. It really started gaining traction, you know?

  • Initially, it was all about "elfinkind"—people who felt like elves. But then it broadened out. People started identifying with all sorts of non-human stuff.

  • Usenet groups like alt.horror.werewolves (ahww) played a big role. These groups weren't just for fans of horror movies. People were seriously connecting with the werewolf thing on a personal level.

  • You got therians, which are folks who identify as animals. Then there's fictionkin, who feel like they're fictional characters. It's a whole spectrum, really.

  • "Kintypes" is the term for whatever non-human thing someone identifies as. Could be anything from a wolf to a mythical griffin—or even a character from your favorite book.

  • And to kinda wrap it all up, there's "alterhuman"—a catch-all term for anyone who feels outside the box of just plain human. its more inclusive, i guess.

So, that's the quick history lesson. Now, let's dig into what these identities look like in practice.

Motivations and Beliefs Driving Otherkin Identity

Okay, so what makes someone feel like they're not fully human? It's not just about liking dragons, you know? There's some deeper stuff going on.

Some otherkin lean on psychological explanations for their identities. Maybe it's neurodivergence—like autism or adhd—making them experience the world differently. Or perhaps it's dissociation, a feeling of disconnect from their body. It's not always easy to pinpoint, but for some, it provides a framework, you know?

  • Neurodivergence: folks with autism or adhd might feel out of sync with typical human social norms, which leads to them identifying with non-human characteristics.
  • Dissociation: a sense of detachment from one's body or reality, allowing for the exploration of non-human identities

Then, you have the spiritual side of things. Reincarnation is a big one—the idea that they lived as something else in a past life. Others believe in non-human souls or some kinda deep connection to paganism.

  • Reincarnation: some otherkin believe they were non-human in a former life and are now reincarnated as human.
  • Paganism: this is a big one, with many otherkin finding comfort in pagan beliefs that celebrate nature and non-human entities.

And, of course, there's the social aspect. Online communities are huge for otherkin. It is where they find support, share experiences, and learn about their kintypes. These communities are mostly online, and help those feel like they dont fit in, to fit in, within a community.

  • Online Communities: these are vital for finding support, sharing experiences, and accessing information.

So, yeah, it's a mix of psychology, spirituality, and social connections that drives the otherkin identity. It's complex!

Now, let's take a look at how these identities are expressed in practice—the day-to-day stuff.

Otherkin in the Digital Age: Implications for CISOs and CIOs

Okay, so, you might be thinking, "otherkin and cybersecurity? What's the connection?" Honestly, it's weirder than you imagine, but bear with me. It's all about identity, and in the digital world, identity is everything.

The growing visibility of diverse identities, including otherkin, means organizations need to re-evaluate how they manage digital identity and security. Traditional systems are often built on assumptions about human identity that don't account for non-human identifications.

  • Authentication Headaches: Traditional authentication relies on verifiable "real world" data – driver's licenses, social security numbers, stuff like that. But if someone identifies as a dragonkin, how do you validate that? It messes with the whole "prove you are who you say you are" thing. For instance, if an otherkin identifies with a non-human entity that has no real-world verifiable identity, account creation or verification becomes a challenge.
  • Access Control Gets Tricky: Roles and permissions are usually assigned based on job function and, well, assumed human traits. How do you define access for someone who identifies as, like, a sentient ai program within your system? Are they an employee? A guest? A potential threat?
  • New Flexible Identity Models: the ciso and cio needs to start thinking about identity frameworks that can handle... well, anything. This means moving beyond the usual boxes and embracing flexible, attribute-based access control (abac) where access hinges on characteristics, not just predefined roles.

let's be real, the security implications are huge. its not just compliance, but all the other things.

  • Privileged Access Pandemonium: imagine a developer who identifies as a rogue ai gaining privileged access. While it's not about prejudice, understanding potential risks is key. For example, if an otherkin identifies with a character known for being a hacker or having certain abilities, this might inform risk assessment, requiring flexible systems to accommodate any identity rather than implying a direct risk correlation.
  • Monitoring Mayhem: traditional monitoring tools flag unusual activity based on human behavior. if someone genuinely believes they have heightened senses (like a therian), their network activity might look suspicious even when it's not.
  • the Insider Threat: all it takes is one disgruntled employee (elf, dragon, or human) to cause serious damage. Robust monitoring and auditing are essential, regardless of how someone identifies.

This is about recognizing that the increasing diversity of identities, including those that are non-human or in-between, necessitates a proactive approach to evolving security challenges. The key is to adapt your security practices to be inclusive, vigilant, and, above all, logical.

Next up, compliance and regulatory considerations – it only gets weirder from here.

Addressing Misconceptions and Promoting Understanding

So, you're diving into otherkin? It's easy to get lost in the myths and misunderstandings, trust me, I know. Let's clear some of that up, because there's some real bad info out there.

  • They aren't denying their physical bodies: One of the biggest misconceptions is that otherkin believe they can physically transform. Nah, that's not what's up. They KNOW they're human. It's more about feeling a deep connection to something non-human on an inner level.
  • It's not always a mental health thing: Some folks automatically assume otherkin are dealing with some kinda psychological disorder. While some may have psychological explanations for their identity, it's not a blanket diagnosis, you know?
  • They're not furries (usually): Furries typically express their love of anthropomorphic animals through art, costumes, and role-playing. It's a hobby, mostly. Otherkin is about identity. Big difference!

What can you do? Start with empathy, its a good start. Try to get it, you know? Open up a dialogue, ask questions, and listen without judgment.

  • Promote respect: Treat otherkin with the same dignity you'd offer anyone else, regardless of whether you "get" their identity. Its basic human decency, ya know?
  • Educate: Share reliable information (like this article!) to dispel myths and promote understanding.
  • Support inclusive policies: Creating inclusive spaces in schools, workplaces, and community organizations can make a big difference.

It's not about agreeing with everyone's identity, but about creating a culture where everyone feels safe and respected. Now we're moving on to the art of storytelling...

Practical Strategies for Managing Non-Human Identities in the Workplace

Okay, so, managing otherkin identities at work? It's not just about being "woke"—it's about real-world strategies that keep things running smoothly. Think of it this way: inclusive practices actually boost productivity.

  • Start by creating policies that actually mean something. Don't just say you're inclusive; show it. Accommodate diverse expressions of identity. This could mean avatars in virtual meetings or respecting different pronouns.
  • ensure equitable treatment. this applies to everything, from promotions to project assignments. No one should feel penalized for their identity.
  • Train your managers and hr staff. They need to understand these identities, even if they don't "get" them.

Traditional authentication methods? Yeah, they're gonna need an update. Think beyond passwords.

  • Multi-factor authentication adds layers of security. Biometrics is cool, too. It's all about verifying identity in ways that respect everyone.
  • adaptive authentication is where it's at. The system learns user behavior and adjusts security levels accordingly.
  • for non-traditional identities, consider alternative verification methods. Maybe it's about verifying access based on attributes rather than rigid roles. For example, instead of a rigid "developer" role, access might be granted based on demonstrated skills in coding and project involvement, regardless of how the individual identifies.

It ain't just about letting everyone in—it's about keeping the digital castle safe.

  • Implement least privilege access controls. Only give people access to what they need, regardless of identity.
  • use siem systems for real-time monitoring. Flag unusual activity, sure, but be smart about what "unusual" means.
  • regular security audits and penetration testing are crucial. Don't wait for something to go wrong.

See, it's not as crazy as it sounds. We're just making sure our workplaces are ready for everyone. Next up, we're diving into compliance and regulatory considerations. Buckle up.

Case Studies: Real-World Examples and Lessons Learned

Ever wonder if those "diversity and inclusion" initiatives actually work? Let's peek behind the curtain, shall we?

  • Successful implementations often start with clear policy changes. Companies that openly support diverse identities, like allowing employees to express their otherkin identity respectfully, tend to foster a more inclusive environment. This, in turn, can boost morale and productivity. For example, a company might allow an employee to use a non-human avatar in internal video calls if it aligns with their identity, provided it doesn't disrupt professional communication.
  • Innovative solutions include attribute-based access control (abac). Instead of rigid role assignments, access is granted based on individual characteristics. For instance, if someone has skills in vulnerability testing (regardless of their identity), they get access to those systems.
  • Quantifiable results? Hard to pin down directly, but studies show that diverse teams are more innovative. Otherkin identities are diverse, and the unique perspectives or experiences of otherkin individuals can contribute to "outside-the-box" thinking by offering novel approaches to problem-solving and creative ideation, stemming from their distinct ways of perceiving the world.

That said, it ain't all sunshine and rainbows. Next up, we'll tackle some of the challenges and pitfalls.

Conclusion: Embracing Diversity and Enhancing Security

Okay, so we've gone down the rabbit hole of otherkin in the digital age. It's a wild ride, right? But what does it all mean for the future?

  • Adaptability is key. We gotta acknowledge rigid, old-school identity models ain't cutting it. CISOs and CIOs need to adopt flexible frameworks that can handle a spectrum of identities—human, non-human, ai, or whatever else comes next. It's about future-proofing, ya know?
  • Ongoing Training and Education: It's not a "one-and-done" thing. Security teams need continuous training on emerging identity trends and the diverse communities shaping them. This'll ensure that everyones more aware of biases and can actually create inclusive strategies.
  • Collaboration is crucial. Security teams can't operate in a silo. Working with hr, legal, and diversity and inclusion folks is a must. It's about building a holistic approach that values inclusivity without sacrificing security.

So, what does this future look like? Well, imagine systems where access isn't determined by rigid roles but by attributes, like skills or project needs. Someone who identifies as a dragonkin but is a killer coder still gets access to the coding tools they need, ya know? It's about ability, not identity. Focusing on "ability, not identity" directly helps in managing or accommodating otherkin identities by ensuring that access and permissions are based on demonstrated capabilities and job requirements, rather than assumptions tied to personal identity. These identities is gaining visibility online and its time to adapt.

And speaking of adaptability, it's important to remember that this whole area is constantly evolving. What we consider "normal" today might be totally different tomorrow. The only constant is change, requiring continuous adaptation and preparedness.

This is more than just a tech problem; it's a human one. Security and diversity must coexist. How do we ensure digital spaces are safe and inclusive for everyone, regardless of how they identify? Its the question we have to ask, and answer.

Lalit Choda
Lalit Choda

Founder & CEO @ Non-Human Identity Mgmt Group

 

NHI Evangelist : with 25+ years of experience, Lalit Choda is a pioneering figure in Non-Human Identity (NHI) Risk Management and the Founder & CEO of NHI Mgmt Group. His expertise in identity security, risk mitigation, and strategic consulting has helped global financial institutions to build resilient and scalable systems.

Related Articles

Workload Balancing

Administering Workload Balancing in Virtual Environments

Learn how to effectively administer workload balancing in virtual environments, focusing on the unique security and performance challenges related to non-human identities (NHIs).

By Lalit Choda October 4, 2025 9 min read
Read full article
Virtualization Security

User Manual for Virtualization Solutions

Learn how to secure your virtualization solutions by effectively managing Non-Human Identities (NHIs). This user manual provides best practices, authentication strategies, and access control techniques.

By Lalit Choda October 2, 2025 16 min read
Read full article
Domain Configuration

Domain Configuration File Syntax for Virtual Environments

Explore the syntax, security, and best practices for domain configuration files in virtual environments. Essential for Non-Human Identity (NHI) management.

By Lalit Choda October 2, 2025 22 min read
Read full article
MAUI workloads

Troubleshooting MAUI App Build Issues Related to Workloads

Troubleshoot .NET MAUI app build failures caused by workload problems. Learn to fix common errors with SDKs, CLI, and Visual Studio configurations.

By Lalit Choda September 30, 2025 8 min read
Read full article