Unfinished Web 3.0 Ideal DID or Open Key Entry

“Sustenance often means ruin”, the classic words in Shakespeare’s “Les Miserables” are exactly the portrayal of the Web2.0 era.

Recently, the activity of “answering questions and collecting cards to exchange for major members” was pointed out by netizens that it was suspected of betraying users’ personal privacy. Although station B responded that the page was misunderstood due to inappropriate wording of the copywriting, the page has been taken offline and rectified, but the turmoil has not There is no end to it, and the battle for data sovereignty has once again been drawn into the “center of public opinion”. Internet citizens who are deeply disturbed by the privacy of Web 2.0, once again invariably collectively advocate and look forward to the arrival of the Web 3.0 era.

Why does Web3.0 have high hopes?

As early as 2006, “Internet World” published an article entitled “The Era of Web 3.0 is Coming”, which called “initiative”, “digital maximization” and “multi-dimensionalization” as the main features of Web 3.0. After that, Web 3.0 has been continuously redefined by people.

In 2014, Gavin Wood expounded the concept of “Web 3.0” in his paper: he hopes to reshape the Internet from the software level based on the P2P protocol, and create a network service with decentralization and privacy as the main feature.

In 2022, Brian Brook, CEO of Bitfury Group, pointed out again at the U.S. hearing that Web 1.0 is characterized by read-only, that is, users can only read information but cannot edit information; Web 2.0 is characterized by readable and writable , that is, users can edit information while reading information, and become the creator of content; Web3.0 is characterized by readable and writable, and users can also own the ownership of content.

Although the definitions of Web 3.0 are inconsistent, the obvious consensus is that Web 3.0, which has the characteristics of “decentralization, privacy-oriented, and user ownership of data”, is expected to become the era of Web 2.0. Monopoly” is a life-saving remedy.

However, so far, the ideal of Web 3.0 does not seem to have achieved a practical breakthrough. In this long-awaited “data revolution”, some key puzzles have yet to be found, and the solution of digital identity is the first step.

Why is DID needed in the Web3.0 era?

As a data entry point, digital identity is the unique identification linking users and platforms.

Looking back, the way in which digital identities for Internet users are created has also changed. For example, in the Web 1.0 stage, users create digital identities through account registration + password; in the Web 2.0 stage, users can create digital identities not only through account registration + password, but also one-click login. No matter which of the above methods is used, the user is required to submit the user name (real name), mobile phone number or email address, even address, ID card and other information. However, the above information is the most important personal privacy of every user in real life, and is related to all aspects of life.

More importantly, users have no control over the digital identity information they provide and the data generated during their use. On the contrary, providers (major platforms) that do not produce data have the data and can profile users through big data. Most users not only produce data for free, but also pay for the advertisements pushed by the platform.

In summary, the user’s digital identity is not only a data entry point, but also a window for data security governance. Therefore, changing the way digital identities are created will be one of the proven ways to govern personal privacy data. This change depends on the development of technological innovation.

DID’s decentralized identity has become the most valuable innovation of Web3.0.

At present, based on the immutable and hash-encrypted characteristics of blockchain technology, a different digital identity creation method has been realized. That is, users identify each other’s digital identity through the signature and verification mechanism of public and private keys, and access various applications through this identity. This identity is called a decentralized identity (Decentralized ID, or DID for short).

Different from centralized identities, DID returns the control of identity information to users, so that users can generate unique identity through a trusted system, and use electronic signatures and other cryptographic proof methods to verify the identity, so that individual users Both organizations and service providers can enjoy the trusted and privacy-safe identity information usage and management process based on blockchain.

In this way, DID allows users to fully own the ownership, management and control of their digital identity data, which well protects personal privacy and information security, rather than managing multiple digital identities by multiple centralized providers. This digital identity has been applied in blockchain projects such as Ethereum and wallets.

However, the large-scale application of DID still faces many tests and challenges.

What’s trapping DID?

The DID digital identity system based on blockchain has the characteristics of ensuring the authenticity and credibility of data, protecting user privacy and security, and strong portability. Its advantages are:

Decentralization: Based on blockchain, it avoids identity data being controlled by a single centralized authority.

Self-controllable identity: Based on DPKI (distributed public key infrastructure), the identity of each user is not controlled by a trusted third party, but by its owner, and individuals can independently manage their own identity.

Trusted data exchange: Identity-related data is anchored on the blockchain, and the authentication process does not need to rely on the identity-providing application.

However, due to the technical, application and regulatory requirements and restrictions, DID still faces many bottlenecks when it is applied.

On the one hand, technological development has encountered a bottleneck. Decentralization, security and high performance constitute the “impossible triangle” of blockchain and become the biggest bottleneck for technological innovation. Therefore, blockchain technology, DID or Web 3.0 itself is still in the early stage, and the technology needs to be improved and innovated.

On the other hand, the application scenario is single. As one of the blockchain technologies, DID is currently only used in a few projects, and there is still a long way to go before the large-scale application of blockchain projects. At present, the blockchain projects applied by DID are not completely decentralized. For example, the wallet is still managed by institutions, and the security issues of users’ assets and data still exist; in addition, compared with the decentralized nature of blockchain, traditional applications are In the context of centralization, they are fighting against each other, and can they accept and use DID as they rely on traffic to make profits?

The centralized platform converts the data generated by users into traffic, thereby realizing huge profits. DID’s decentralized digital identity makes the platform no longer control all data information when obtaining authorization. The “available and invisible” security model makes the platform no longer able to make these data owned by itself, and the profit model brought by traffic will no longer be realized. exist.

In the face of huge interests, can these Internet giants put down their interests, accept innovation, and welcome the arrival of Web 3.0?

In addition, if DID wants to gain large-scale application, it also needs to solve regulatory problems.

As we all know, under the requirements of the real-name system on the Internet, users must use real-name information such as mobile phone numbers or ID cards or bank cards to create identities. The advantage of doing so is of course conducive to supervision, but it also causes the platform to illegally collect and abuse users’ personal privacy data to the greatest extent.

Under the premise of easy supervision, whether the decentralized DID can be accepted by the regulatory layer is also one of the challenges.

DID broke the game, where is the way out?

Mature applications require continuous innovation and optimization in practice. As the infrastructure of Web 3.0, DID can only rise to the challenge in the face of challenges.

After the DID based on blockchain technology has become the infrastructure of Web 3.0, it can easily realize the “available and invisible” of user data through cross-chain and smart contracts in just a few lines of code, and has the characteristics of high security, autonomy and efficiency. . For example, when trading on the chain, the operation is convenient and simple, there is no third-party intervention, and there is no need to worry about information leakage; point-to-point direct interaction makes high-efficiency, decentralized agency, and large-scale information interaction a reality.

However, the degree to which the above assumptions can be realized depends on the degree of development of blockchain technology.

At present, the application of blockchain technology is faced with the fact of “impossible triangle”. The market is faced with the dilemma of “no governance” or “not cost-effective”. The only way to break the situation is to find the answer from technological improvement.

Professor Cai Hengjin from the School of Computer Science of Wuhan University mentioned in an interview with a reporter from the computing power think tank that based on the Web 3.0 architecture, the interactive hash between user nodes can convert bilateral trust into a collective chronological order, which is the most important in realizing blockchain. At the same time, it does not need a workload proof mechanism that wastes resources, nor does it need a monopoly-suspected proof-of-stake mechanism.

“The greatest value of blockchain technology lies in the existence of evidence, and the greatest innovation lies in the establishment of time order.” Professor Cai Hengjin believes that time order, as the most important attribute of the blockchain network, provides traceability, verifiability and value transfer. The foundation makes the value exchange network possible. It also provides new solutions for social governance, privacy protection and personalization needs.

The value of technology lies in its application. With the development of blockchain technology, there are more and more DID solutions on the market, and well-known companies such as Microsoft, IBM, and Facebook have successively devoted themselves to research and development. Behind these solutions, there are still: using DID, is the problem of users controlling their own accounts solved? Does the information data provided by users exist in a centralized organization? Do users need to provide personal information including mobile phone numbers and ID cards to log in to the app? When authorization is performed between different applications, who determines the permissions? A series of seemingly solved but not fully solved problems.

The original intention of DID is to protect the security of users’ personal privacy data. Therefore, all applications that violate this original intention are not DIDs in the true sense.

According to the reporter of the computing power think tank, the current application of DID is mainly concentrated in the blockchain industry. Although traditional industries are also involved, they are not accepted by users or institutions. The main reason is that the data provided by users is still under the control of the platform, and “whether you can see it” and “will you see it” depends on the original intention of the platform.

As the most basic and core technology, DID was born to completely ignite the revolution of Web3.0, but it still needs to invest more energy to optimize and innovate, take the torch and continue to run.

Posted by:CoinYuppie,Reprinted with attribution to:https://coinyuppie.com/unfinished-web-3-0-ideal-did-or-open-key-entry/
Coinyuppie is an open information publishing platform, all information provided is not related to the views and positions of coinyuppie, and does not constitute any investment and financial advice. Users are expected to carefully screen and prevent risks.

Like (0)
Donate Buy me a coffee Buy me a coffee
Previous 2022-03-30 11:39
Next 2022-03-30 11:40

Related articles