W3C home > Mailing lists > Public > public-credentials@w3.org > September 2020

Re: Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-resistance in Proof of Personhood Protocols

From: Melvin Carvalho <melvincarvalho@gmail.com>
Date: Wed, 9 Sep 2020 12:54:58 +0200
Message-ID: <CAKaEYhLJoZzj6ffuPxHJp_xWX80E_dnCBqM+a7-fJk4+P7VQoA@mail.gmail.com>
To: Wayne Chang <wyc@fastmail.fm>
Cc: W3C Credentials CG <public-credentials@w3.org>
I think this was the important insight of the paper here.  And I wonder if
it can be solved with verifiable credentials?

"If blockchains are to become a significant public infrastructure,
particularly in the space of civic engagement, then Proof of Work's
“one-CPU-one-vote” or Proof of Stake's “one-dollar-one-vote” systems will
not suffice: in order to enable democratic governance, protocols that
signal unique human identities to enable "one-person-one-vote" systems must
be created."

On Wed, 9 Sep 2020 at 12:50, Melvin Carvalho <melvincarvalho@gmail.com>
wrote:

> PDF is here: https://arxiv.org/pdf/2008.05300.pdf
>
> Keywords: decentralized identity, Sybil-protection, crypto-governance
>
> Abstract.
>
> Most self-sovereign identity systems consist of strictly objective claims,
> cryptographically signed by trusted third party attestors. Lacking
> protocols in place to account for subjectivity, these systems do not form
> new sources of legitimacy that can address the central question concerning
> identity authentication: "Who verifies the verifier?". Instead, the
> legitimacy of claims is derived from traditional centralized institutions
> such as national ID issuers and KYC providers. Thisarchitecture has been
> employed, in part, to safeguard protocols from a vulnerability previously
> thought to be impossible to address in peer-to-peer systems: the Sybil
> attack, which refers to the abuse of an online system by creating many
> illegitimate virtual personas. Inspired by the progress in cryptocurrencies
> and blockchain technology, there has recently been a surge in networked
> protocols that make use of subjective inputs such as voting, vouching,and
> interpreting, to arrive at a decentralized and sybil-resistant consensus
> for identity. In this review, we will outline the approaches of these new
> and natively digital sources of authentication - their attributes,
> methodologies strengths, and weaknesses - and sketch out possible
> directions for future developments.
>
> On Wed, 9 Sep 2020 at 03:21, Wayne Chang <wyc@fastmail.fm> wrote:
>
>> link: https://arxiv.org/abs/2008.05300
>>
>> discussion from strangers on the internet:
>> https://news.ycombinator.com/item?id=24411076
>>
>>
Received on Wednesday, 9 September 2020 10:55:23 UTC

This archive was generated by hypermail 2.4.0 : Thursday, 24 March 2022 20:25:02 UTC