Decentralized identity & content addressing at web-scale with a non-financial app-specific blockchain
Headjack - the base layer of cyberspace
By Viktor Kirilov
https://xkcd.com/927/
About me
Blockchain !!!
https://twitter.com/lexfridman/status/1579579284204974081
Economics? Peace?
Both!
Crypto & βweb3β are not about monkey JPEGs & ponzis. Please suspend any preconceptions & keep an open mind for an hour.
Presentation outline
Problems with the web
This list is non-exhaustive
The host-centric web
Centralization
Ads & surveillance capitalism
Algorithmic black boxes
Social media & identity
Vertical integration & data silos
Prerequisite knowledge
Public-key cryptography
Hash functions
Example: SHA3-256("hello") = "3338be694f50c5f338814986cdf0686453a888b84f424d792af4b9202398f392"
Merkle tree
Merkle proof - proof of inclusion
https://medium.com/blockchain-stories/the-tale-of-merkle-tree-in-bitcoin-blockchain-2c5fa5a298f7
Blockchain: hash-linked chain of blocks
https://mlsdev.com/blog/156-how-to-build-your-own-blockchain-architecture
Blockchain vs state
(no, not the "monopoly on violence" kind of state)
Content addressing & IPFS
Problem statement
We have reached a local maximum.
How do we use βweb3β to improve social media & the web?
We start with identity.
Identity is the foundation
Enter Headjack
Combining existing building blocks in a novel way
with a different set of tradeoffs
Design goal 1: Web-scale
Design goal 2: Web2-like UX
Design goal 3: Decentralization
"You can build something centralized on something decentralized but you canβt build something decentralized on top of something centralized. Decentralization is always the base layer." - @RyanSAdams
Design goal 4: simplicity
On-chain vs off-chain
On-chain (the absolute bare minimum):
Off-chain (anchored in batches):
3 βtypesβ of accounts
All 3 have on-chain IDs and one entity can play all 3 roles
AuthN, AuthZ & blockchain usage
Off-chain messages & evolution
Everything is a message
Content creation, addressing & URIs
https://culturexchange1.wordpress.com/2015/06/02/the-telephone-switchboard-the-story-of-a-revolutionary-instrument/
Content blob structure & nonce
Applications:
What is a nonce
URIs: addressing specific events
URIs & content references
The global virtual address space
State: Names/keys/nonces/authZ
Stable & human-readable URIs
Communication & authorization
Users can:
Chain used mostly by IDMs/Apps
Trustless
Better trust
Possible because:
Self-authenticating documents
Ordering integers throughout time
Throughput numbers (very rough)
The timestamp machine
Linking data to identity at scale
π¦Twitter vs Reddit post?
Same data - different views
https://world3d.com/2020/06/the-history-of-lenticular/
"Data is the center of the universe; applications are ephemeral." - The Data-Centric Manifesto
Applications & infrastructure
AWS-like Infrastructure:
Applications:
Interoperability - no more silos!
Competition & specialization
Unbundling the media stack
"Thereβs only two ways I know of to make moneyβ bundling, and unbundling." - Jim Barksdale
"The whole is greater than the sum of its parts." - Aristotle
A single "one-size-fits-all" company can never be what an open ecosystem could be
History 2.0: the ledger of record
Other possibilities
Things we didnβt cover
βThe medium is the messageβ
Marshall McLuhan (media theorist) proposed that a communication medium itself, not the messages it carries, should be the primary focus of study.
AGI: Artificial Global Intelligence
The host-centric model must go
The Metaverse
The Internet
Visualization from the Opte Project of the various routes through a portion of the Internet in 2005
== Graph colors depending on IP range:
Asia Pacific
Europe/Middle East/Central Asia/Africa
North America
Latin American and Caribbean
RFC1918 IP Addresses
Unknown
"The Internet is the largest engineering project the earth has ever seen - and we're just getting started" - Barrett Lyon, founder of OPTE Project
Adding identity in the OSI model
The identity layer needs to be solved only once
Everything else can be layered on top
https://www.imperva.com/learn/application-security/osi-model/
The identity layer needs to be solved only once.
Q&A