Risk Warning: Beware of illegal fundraising in the name of 'virtual currency' and 'blockchain'. — Five departments including the Banking and Insurance Regulatory Commission
Information
Discover
Search
Login
简中
繁中
English
日本語
한국어
ภาษาไทย
Tiếng Việt
BTC
ETH
HTX
SOL
BNB
View Market
Analysis of the logic and practice of Web3 identity management: the battle between man and machine starts again
星球君的朋友们
Odaily资深作者
2022-02-15 07:43
This article is about 2909 words, reading the full article takes about 5 minutes
A person can only have a unique identity, but can apply for countless wallet addresses.

Author: Chloe, IOSG Associate

secondary title

Insight

DID & PoP Authentication and Management

The last issue of "The Human-Machine Game Has Just Begun" talked about why DID and PoP are particularly important in Web 3.0. This week, we will explore the concepts of DID and PoP, and introduce several PoP verification methods and leading projects.

secondary title

Pervasive identity management logic

Whether it is identity management in the real world or DiD in Web3.0, the following logics are followed.

- Tag individuals. First, we need an identifier to "tag" a person. This identifier must be unique and unchanged, such as an ID number.

- Verify identidy. Second, we need to verify the identifier. Often real-world authentication is through proof of ownership, such as having an ID, or through biometric verification (fingerprinting, facial recognition, etc.). When a person has a unique "identifier" mark, and this correspondence is verified as correct. A biological person is equivalent to an identity.

image description

secondary title

What makes DID special

So what's so special about DIDs? The first is DID in terms of "decentralized". Unlike traditional identifiers controlled by centralized authorities, DID identifiers should be self-owned, independent, and dependent on the P2P decentralized network. Secondly, the verification method of DID is also different. It is not proved by holding some kind of certificate, but by the encrypted public key-private key to verify the signature. Finally, the focus of personal information is also different. The information here is mainly on-chain activities, such as which NFTs were purchased, how many transfer records there were, what chain games were played, etc. These on-chain data will be attached to the identifier.

image description

secondary title

Various Practices of PoP

Proof of Personhood, as the name suggests, is based on the authentication of biological persons, how to effectively distinguish between biological persons and AI. Today, the development of artificial intelligence has reached the point where it can beat humans in many fields, such as AlphaGo defeating the world Go champion. Therefore, to successfully identify AI and biological humans, it is necessary to start with the weaknesses of AI.

First of all, the simplest and most straightforward logic is that humans and AI look different. AI can imitate human thinking, but it is difficult to imitate human appearance, such as pupils, skin texture and other biological characteristics. Therefore, the most direct way is to separate people by showing biological characteristics. This method is called anonymous parties (Pseudonym Parties). Just like participating in an interview, users need to show their face, voice and other biological characteristics by participating in online or offline parties to prove that they are biological people.

Second, another feature that distinguishes humans from AI is their social attributes. Humans are social animals, bound to have social connections with those around them, something that robots do not. Therefore, the Web of Trust takes advantage of this feature and verifies through people's social attributes. If a user uses multiple social platforms for a long time and interacts with others more, the probability of this person being a bot will be lower.

In addition, unlike AI, humans are very good at logical thinking and pattern recognition, which is precisely the point that machine learning is difficult to overcome. Reverse Turing Tests take advantage of this feature. Inverse Turing tests have been around for many years and are widely used. Everyone must have encountered a pop-up window containing nine tiles when surfing the Internet, allowing users to select tiles containing traffic lights/locomotives/zebra crossings to complete recognition. This is the application of the reverse Turing test.

At present, most of the leading projects on the PoP track adopt one or more of the above verification methods. Proof of Humanity and BrightID, for example, authenticate through anonymous meetups and social connections. The logic of these two projects is similar, and both are verified through the video consensus of the small circle. BrightID has also innovated on this basis and introduced a new verification method based on the location on the social network graph - Bitu verification. The method of Bitu verification is to evaluate the degree to which each social relationship of the user is close to the center of the network. If a user associates with an unfamiliar account that has no intersection, they will receive a point penalty, which increases the cost of "doing evil". However, Proof of Humanity and BrightID still have some problems. The first is to require users to "show their faces" and publish some personal data, which sacrifices users' privacy to a certain extent. Another flaw is the high cost of organizing meetings, human verification, and maintaining the PoP network, reducing scalability.

image description

Idena User Verification Level and Number

There is still a long way to go for the exploration of DID and PoP. At present, most DID solutions are dedicated to accumulating on-chain/off-chain data for users, such as the recent hot SocialFi projects, CyberConnect, Galaxy, etc., which build social graphs and user portraits for users. However, the discussion and exploration of "identifier" is relatively lagging behind, and people generally equate the identifier of Web 3.0 with the wallet address. A person can only have a unique identity, but can apply for countless wallet addresses. Fortunately, there is a first step in this direction with Sismo, a DID solution that leverages zk technology and issues badges to users based on on-chain activity.

Users can specify other wallet addresses and collect the activity badges of other wallet addresses under the same ENS domain name. This not only solves the conflict between multiple wallets and unique identities of users, but also protects user privacy. However, users can still claim multiple ENS domain names. At present, the industry's exploration of identifiers has various unique methods, but there is still a long way to go for the widespread promotion of these applications. DID, which is the basis of Web3.0, will be explored by more innovative projects in the future. Stay tuned to IOSG, we will bring more articles about Web 3.0.

Web3.0
Welcome to Join Odaily Official Community