Socio-Economic Inclusion
Social ID & Reputation
Description
When individuals sign up on a community platform, the system needs to verify/ assure that their identity corresponds to the real person claiming such identity; and also verify/ assure that a person may only sign up with exactly one identity.
The primary challenge is to build an identity system that is able to do the above using decentralised technologies, and thus without reliance on any central authority; doing so while maintaining privacy of its users.
The secondary challenge is to build a reputation system that integrates with this identity system that gives the users a means to decide how much to trust each other.
Guidelines
In order for the solution to prevent duplication of identities:
Think about techniques that could be employed to prevent a single person from creating multiple identities of themselves
Think about techniques that could be employed to prevent any entity from creating false identities, that is identities for people who do not exist
Think about techniques that could be used to prevent any entity from creating or operating the identity belonging to another person
For example: Economic incentivisation for accuracy
For example: Anti-Sybil protocols to prevent duplication
For example: Links with existing identity systems
In order for the users of the system to retain their privacy:
Think about how users can selectively reveal parts of their identities on a per entity basis
Think about the other aspects of self-sovereignty when dealing with identity
For example: Zero-Knowledge proofs may be necessary for data stored on a public/ permissionless blockchain
In order for the solution to gain trust among its users:
Think about how to employ economic incentives effectively to enable accurate representations of trust with entities that a user would interact with
For example: Reputation. Sample implementations: Augur
To improve the user experience of the system:
Think about how users who are used to interacting with web2 technology would need to learn in order to use web3 technology, and how that gap can be bridged with less effort
For example: Social recovery methods may be useful in order to enable the decentralised analogue of “password recovery”. Sample implementations: Substrate, Argent, Torus
Resources
The following are categorised resources related to Decentralised Identity, Self-sovereign Identity, and Reputation Systems, which may be helpful as references while implementing your solutions.
Use Cases
General Material - Videos
General Material - Introductory
General Material - Advanced
Technical Material - Introductory
Technical Material - Advanced
Technical Standards
Implementations
Social ID & Reputation
Description
When individuals sign up on a community platform, the system needs to verify/ assure that their identity corresponds to the real person claiming such identity; and also verify/ assure that a person may only sign up with exactly one identity.
The primary challenge is to build an identity system that is able to do the above using decentralised technologies, and thus without reliance on any central authority; doing so while maintaining privacy of its users.
The secondary challenge is to build a reputation system that integrates with this identity system that gives the users a means to decide how much to trust each other.
Guidelines
In order for the solution to prevent duplication of identities:
Think about techniques that could be employed to prevent a single person from creating multiple identities of themselves
Think about techniques that could be employed to prevent any entity from creating false identities, that is identities for people who do not exist
Think about techniques that could be used to prevent any entity from creating or operating the identity belonging to another person
For example: Economic incentivisation for accuracy
For example: Anti-Sybil protocols to prevent duplication
For example: Links with existing identity systems
In order for the users of the system to retain their privacy:
Think about how users can selectively reveal parts of their identities on a per entity basis
Think about the other aspects of self-sovereignty when dealing with identity
For example: Zero-Knowledge proofs may be necessary for data stored on a public/ permissionless blockchain
In order for the solution to gain trust among its users:
Think about how to employ economic incentives effectively to enable accurate representations of trust with entities that a user would interact with
For example: Reputation. Sample implementations: Augur
To improve the user experience of the system:
Think about how users who are used to interacting with web2 technology would need to learn in order to use web3 technology, and how that gap can be bridged with less effort
For example: Social recovery methods may be useful in order to enable the decentralised analogue of “password recovery”. Sample implementations: Substrate, Argent, Torus
Resources
The following are categorised resources related to Decentralised Identity, Self-sovereign Identity, and Reputation Systems, which may be helpful as references while implementing your solutions.
Use Cases
General Material - Videos
General Material - Introductory
General Material - Advanced
Technical Material - Introductory
Technical Material - Advanced
Technical Standards
Implementations