Socio-Economic Inclusion

Social ID & Reputation

Description

When individuals sign up on a community platform, the system needs to verify/ assure that their identity corresponds to the real person claiming such identity; and also verify/ assure that a person may only sign up with exactly one identity.

The primary challenge is to build an identity system that is able to do the above using decentralised technologies, and thus without reliance on any central authority; doing so while maintaining privacy of its users.

The secondary challenge is to build a reputation system that integrates with this identity system that gives the users a means to decide how much to trust each other.

Guidelines

In order for the solution to prevent duplication of identities:

Think about techniques that could be employed to prevent a single person from creating multiple identities of themselves

Think about techniques that could be employed to prevent any entity from creating false identities, that is identities for people who do not exist

Think about techniques that could be used to prevent any entity from creating or operating the identity belonging to another person

For example: Economic incentivisation for accuracy

For example: Anti-Sybil protocols to prevent duplication

For example: Links with existing identity systems

In order for the users of the system to retain their privacy:

Think about how users can selectively reveal parts of their identities on a per entity basis

Think about the other aspects of self-sovereignty when dealing with identity

For example: Zero-Knowledge proofs may be necessary for data stored on a public/ permissionless blockchain

In order for the solution to gain trust among its users:

Think about how to employ economic incentives effectively to enable accurate representations of trust with entities that a user would interact with

For example: Reputation. Sample implementations: Augur

To improve the user experience of the system:

Think about how users who are used to interacting with web2 technology would need to learn in order to use web3 technology, and how that gap can be bridged with less effort

For example: Social recovery methods may be useful in order to enable the decentralised analogue of “password recovery”. Sample implementations: Substrate, Argent, Torus

Resources

The following are categorised resources related to Decentralised Identity, Self-sovereign Identity, and Reputation Systems, which may be helpful as references while implementing your solutions.

Use Cases

General Material - Videos

General Material - Introductory

General Material - Advanced

Technical Material - Introductory

Technical Material - Advanced

Technical Standards

Implementations

Potential Use Cases
Aid/Remittance PlatformImpact Investment & CrowdlendingSocial ID & ReputationCommunity GovernanceCommunity Currency Issuance ContractCommunity Currencies InteroperabilityCommunity WalletPropose your own

Social ID & Reputation

Description

When individuals sign up on a community platform, the system needs to verify/ assure that their identity corresponds to the real person claiming such identity; and also verify/ assure that a person may only sign up with exactly one identity.

The primary challenge is to build an identity system that is able to do the above using decentralised technologies, and thus without reliance on any central authority; doing so while maintaining privacy of its users.

The secondary challenge is to build a reputation system that integrates with this identity system that gives the users a means to decide how much to trust each other.

Guidelines

In order for the solution to prevent duplication of identities:

Think about techniques that could be employed to prevent a single person from creating multiple identities of themselves

Think about techniques that could be employed to prevent any entity from creating false identities, that is identities for people who do not exist

Think about techniques that could be used to prevent any entity from creating or operating the identity belonging to another person

For example: Economic incentivisation for accuracy

For example: Anti-Sybil protocols to prevent duplication

For example: Links with existing identity systems

In order for the users of the system to retain their privacy:

Think about how users can selectively reveal parts of their identities on a per entity basis

Think about the other aspects of self-sovereignty when dealing with identity

For example: Zero-Knowledge proofs may be necessary for data stored on a public/ permissionless blockchain

In order for the solution to gain trust among its users:

Think about how to employ economic incentives effectively to enable accurate representations of trust with entities that a user would interact with

For example: Reputation. Sample implementations: Augur

To improve the user experience of the system:

Think about how users who are used to interacting with web2 technology would need to learn in order to use web3 technology, and how that gap can be bridged with less effort

For example: Social recovery methods may be useful in order to enable the decentralised analogue of “password recovery”. Sample implementations: Substrate, Argent, Torus

Resources

The following are categorised resources related to Decentralised Identity, Self-sovereign Identity, and Reputation Systems, which may be helpful as references while implementing your solutions.

Use Cases

General Material - Videos

General Material - Introductory

General Material - Advanced

Technical Material - Introductory

Technical Material - Advanced

Technical Standards

Implementations

Got a Question?