DID and ZKP in social networks

1 Introduction

The key terms in this article are:

For example: "XYZ studio wants to airdrop NFT to all Uniswap v3 LPs", then:

  • Verifier: For XYZ studio, the terminal participation activity it wants to devote to is: airdrop.
  • Credential: Uniswap V3 NFT held only by Uniswap LP.
  • Issuer: The issuer of Credential is Uniswap Labs.
  • DID: A digital wallet participating in the Uniswap protocol.

When Verifier queries all Uniswap V3 LP NFTs on the chain, Verifier can know all public wallet addresses-it can be regarded as a "verifiable data registry".
insert image description here

2. Identity, Verifiable Credential and social network in Web2

Meta, Twitter, Instagram, Reddit, Quora, Weibo, TikTok are all social media platforms. They combine user identity, content, and social networking in a clean pre-packaged platform that is easy to use and subsequently a great place to get personal data about users like their hobbies, activities, locations, interests, etc.
The business model is simple - sell anonymous user data to advertisers, who will use the information to run smarter campaigns. Meta and Google also enabled an auction model that enables marketers to bid on ad slots.
It’s a highly profitable business strategy for platforms — the top social media companies in the U.S. earn an estimated $181.1 billion through advertising. 81% and 97.9% of Google's and Meta's total 2021 revenues will come from this channel, respectively.
insert image description here
When that revenue is at stake, no company is incentivized to open-source their identity database and make it more user-friendly. This is where the Web3 idea of ​​a decentralized, transparent, tamper-proof and privacy-preserving social solution comes into play.

3. Evolution of Web3 social infrastructure

Some of the main principles of social infrastructure on the blockchain are illustrated in the diagram below. Data ownership is critical for end users to have full control over their digital identities.
insert image description here

  • 1) Ownership and tamper-proof:
    • Users own their own identities and are the only individuals who can modify their identities.
    • Has basic access control features.
    • Users know who has accessed their data.
  • 2) Privacy: Users can store their data privately, avoiding human flesh searches, unless users choose to disclose certain information.
  • 3) Verifiability:
    • Third parties can verify that their marketing is for actual users and not bots.
    • Third parties can verify the characteristics of their target customers.
    • A third party can verify the trustworthiness of the credential issuer.
  • 4) Accessibility:
    • Third parties have access to all data predefined by individual users.
    • For dapp developers, social network and user attestation data is easy to use and build on.
  • 5) Fun: Social networking is fun for users and has a fundamental entertainment angle.

3.1 Status Quo of Web3 Social Infrastructure

The current on-chain social data market is divided into:

  • 1) dStorage solutions: such as creamic, IPFS, Filecoin, etc.
  • 2) Social Graphs solutions: such as LENS, CyberConnect, DeSo, etc.
  • 3) SBT (Soulbound Token) + Social Graph solution: such as Project Galaxy, Sismo, etc.
  • 4) Applications/Front-ends/Credentials/SBTs/POAPs solutions: such as DeBank, OpenSea, LearnWeb3, POAP, etc.
    insert image description here
    The key challenges for industrial applications are:
  • 1) Lack of on-chain data granularity:
    • Data on the chain, such as wallet holdings (ERC20 & NFT), transactions, dApp interaction, transaction frequency, etc., are the main data collected.
    • No personal data is accessed except to analyze the type of NFT purchased by the wallet.
  • 2) Lack of privacy protection means to introduce off-chain data into the chain:
    • If Ceramic introduces off-chain data into the chain, it will expose user data to the public query of the blockchain.
  • 3) Lack of user retention on social networks, such as apps that continue to spread the social graph.

3.2 The role of ZKP in social infrastructure

A key challenge in bringing user data from social media networks such as Meta or Twitter on-chain is the lack of privacy. Even encrypted data stored on multiple anonymous nodes is at risk of being hacked or decrypted.

ZK-based applications can:

  • Support trusteless authentication of user data
  • Privacy protection user data

Using ZK verification in the DID system, in the form of ZK attestations or credentials, users can introduce more granular social data to the chain, so as to achieve trustless verification without leaking too much data or introducing a centralized database.

4. Existing ZKP + DID and ZKP + Social Network

4.1 Earthquake

Based on user/wallet interaction, Sismo supports user claim ZK attestations

Leveraging Sismo's SDK, developers can now use Sismo attestations to target user groups.

The Sismo alpha version (unaudited at the time) launched in August 2022 supports users to mint their ZK badges on the Polygon network. However, these attestations are for the Ethereum activity of the wallet.
The following figure is an example of Ethereum Power Users ZK Badges, each attestation/badge is non-transferable SBT (ERC1155).
insert image description here

4.2 First Batch

First Batch is positioned to introduce off-chain social data such as Discord, Twitter, and Reddit to the chain.
First Batch uses Twitter's OAuth to index users' off-chain data, which runs in its AI system. AI will tag user profiles with attestations such as "coffee lover," "sports fan," and even "Nespresso" and "Lakers fan."

Without revealing the true identity of the end user, dApp developers can interact with the smart contract layer to convert these tokens into ZK attestations on-chain.
insert image description here

4.3 Trinsic ID

Trinsic's flagship products include:

  • Credential API for issuers;
  • Provider API for customers: accessible VC (Verifiable Credential).
  • Wallet API for users and customers: used to hit key user groups and lead some on-chain participation - such as airdrops.

For using Trinsic:

  • End users must create a Trinsic Studio digital wallet and generate credentials within that wallet.
  • Along with credentials, users must generate authentication policies that represent various data points, such as "user is over 21 years old".

4.4 Notebook Labs

Notebook allows users to set up "notebooks" about their being human, as well as other personal data such as name, address, social security number (optional), country of residence, etc. User notebooks are stored on an AWS server.

If a user wants to prove that he is human, he proves that his wallet address is associated with his notebook. The client generates a proof: it has a leaf node in the merkle tree, and sends the proof to the verification smart contract.

The app will be a great way to pre-approve KYC AML and easily integrate it into dApps in the future. Using ZK-based DID can well protect user privacy and allow users to control and edit their data without storing the entire data on-chain.

4.5 Humannode

Humannode is an L1 chain resistant to Sybil attacks, and its basic consensus layer adopts: proof of uniqueness + proof of existence. Humannode is a substrate chain compatible with EVM. Each node has the same voting authority and a blacklist is set for malicious behavior. As of August 2022, the team claims to have collected data on more than 10,000 humans.

The Humannode team specializes in encrypted biometric authentication, combining encrypted secure matching and liveness detection mechanisms to verify the uniqueness and existence of real humans. It uses ZKP to provide proof of uniqueness and liveness for the protocol.

4.6 Polygon ID

Polygon announced its Polygon ID product in August 2022 and is similar to Sismo. Polygon ID focuses on attesting wallet behavior on the polygon chain and helps generate ZK proof as a verification mechanism. Its core products are:

  • Identity App on the client side
    insert image description here

  • ID client toolkit with related API

  • SDK for developers, dApps, customers to integrate
    insert image description here

4.7 Worldcoin

Worldcoin, developed by Open AI co-founder Sam Altman, is positioned as:

  • Provide privacy protection for proof of personality protocols
  • With Semaphores (ZK tools developed by Ethereum AppliedZKP)

It has developed a hardware product called Orb to collect iris images of human eyes and convert them into short digital codes, so that it can be verified whether the human has been registered. If not registered, they can receive their corresponding share of free Worldcoin.

5 Conclusion

Social infrastructure is key to building any form of sustainable social network or application on web3. Privacy, security, and data ownership are key in the infrastructure space, and there are multiple companies working to address this issue. Almost all companies focused on privacy in the context of identity rely on zero-knowledge proofs as a source of verification.

As the industry evolves, the key challenge for these companies will be to capture the market - which is primarily user data and can only be scaled through social apps that require users to "sign up". Worldcoin is an exception to their going to market, but otherwise; all companies are actively competing for developer and dApp attention. Creating a functional SDK for self-developed developers is critical for these infrastructure providers. They may have some gamification on their front end, but on a limited scale due to mass user migration of the concept of "entertainment", "content" or "speculation" in cryptocurrency.

References

[1] Ishanee Nagpurkar August 2022 Blog Zero Knowledge in DiDs and Social Networks

Guess you like

Origin blog.csdn.net/mutourend/article/details/132019081