[MINUTES] CCG Weekly 2025-05-06

統 Notes

May 6, 2025
CCG Weekly - Summary

*Guest Speaker:* Adrian Ludwig, Chief Architect and CISO, Tools for Humanity

*Topic:* The World Project: Orb, World ID, Worldcoin, and World Chain

*Summary:* Adrian Ludwig presented Tools for Humanity's World Project,
aiming to create a secure, user-controlled digital identity infrastructure.
Key components discussed included:

   -

   *Orb:* A biometric iris scanning device verifying humanness, with
   open-source hardware and software designed for robustness and security.
   Data is encrypted and transferred to the user's device; the Orb retains no
   data. Uniqueness is determined using iris codes processed to maximize
   distance between individuals, leveraging AMPC for secure comparison.
   -

   *World ID:* An identity protocol using zero-knowledge proofs to enhance
   privacy. Users control keys and data; the system is decentralized and
   supports linking to other credentials (e.g., passports). Challenges
   regarding credential extensibility and real-time authentication were
   discussed.
   -

   *Worldcoin:* A token initially for bootstrapping the network,
   transitioning to a fee system for network sustainability. The goal is to
   create a virtuous cycle for credential issuers and relying parties, with
   monetization details (fee structures) expected by June.
   -

   *World Chain:* A blockchain focused on scalability and bot resistance.
   It aims to overcome limitations of existing blockchains regarding scale and
   bot attacks, prioritizing human transactions.

*Discussion Points:* The Q&A session addressed concerns about fake irises,
civil attacks, offline verification, and fraud prevention. The robustness
of the fraud model, incorporating industry-standard test suites and red
teaming, was also discussed. Future collaborations and the expansion of
technology capabilities were highlighted.

*Next Steps:* Adrian Ludwig will provide detailed specifications on
Worldcoin monetization and functionality by June.

Text: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-weekly-2025-05-06.md

Video: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-weekly-2025-05-06.mp4
統 Notes

May 6, 2025
CCG Weekly

Invited mahmoud@mavennet.com W3C CCG Meetings <meetings@w3c-ccg.org>
wip.abramson@gmail.com Harrison Tang <harrison@spokeo.com>

Attachments CCG Weekly
<https://www.google.com/calendar/event?eid=M3RxZDRoYzUyM3I4anBmbmNhMWZpb2o2ZWJfMjAyNTA1MDZUMTYwMDAwWiBtZWV0aW5nc0B3M2MtY2NnLm9yZw>

Meeting records Transcript <?tab=t.kb8glahs2wkp> Recording
<https://drive.google.com/file/d/1Fl6uGZ1avUOjva6YRrTKra9o_Cfl1HYa/view?usp=drive_web>
Summary

The W3C CGCG meeting hosted Adrian Ludwig, Chief Architect and CISO of
Tools for Humanity, who presented the World Project, encompassing Orb,
World ID, Worldcoin, and World Chain, a system designed to create a secure,
user-controlled digital identity infrastructure. Key discussion points
included the Orb's biometric iris scanning technology, World ID's
zero-knowledge proof architecture, and the future plans for Worldcoin's
monetization strategy and World Chain's scalability; Harrison Tang will
follow up with Adrian Ludwig on monetization details, with specifications
expected by June.
Details

   -

   *Meeting Start and Introductions:* The W3C CGCG meeting began with
   technical difficulties resolving audio issues for Adrian Ludwig (00:00:00
   <#00:00:00>). Harrison Tang welcomed attendees and reviewed the meeting
   format, code of ethics, intellectual property guidelines, and recording
   procedures (00:05:26 <#00:05:26>). They also announced upcoming speakers
   for future meetings (00:06:51 <#00:06:51>).
   -

   *Guest Speaker Introduction:* Harrison Tang introduced Adrian Ludwig,
   Chief Architect and CISO from Tools for Humanity, to discuss their work on
   Orb, Worldcoin, and other initiatives (00:08:33 <#00:08:33>). Adrian
   expressed appreciation for the invitation and noted their team's
   familiarity with Zoom, rather than other meeting platforms (00:09:43
   <#00:09:43>).
   -

   *Adrian Ludwig's Background and Tools for Humanity's Mission:* Adrian
   shared their background in security, mentioning previous roles at Adobe,
   Macromedia, Google, and Atlassian (00:10:35 <#00:10:35>). They explained
   that Tools for Humanity was founded with a concern about the implications
   of AI and aims to create a public, open digital identity infrastructure (
   00:11:48 <#00:11:48>). This infrastructure is intended to be a
   global-scale system where users control their data (00:12:52 <#00:12:52>
   ).
   -

   *Proof of Humanity:* Adrian described "proof of humanity" as a
   foundational technology with two key properties: ensuring interaction with
   a human and verifying their uniqueness. They highlighted the unsolved
   nature of this problem at scale and the limitations of existing approaches (
   00:13:48 <#00:13:48>).
   -

   *World Project Overview:* Adrian presented an overview of the World
   Project, including the Orb, World ID, Worldcoin, and World Chain. They
   emphasized the Orb's role in verifying humanness and World ID's function in
   connecting to services and enhancing other identity systems (00:15:59
   <#00:15:59>). Worldcoin's role in bootstrapping and sustaining the
   network, and World Chain's focus on scalability and bot resistance, were
   briefly discussed (00:16:53 <#00:16:53>).
   -

   *World App and Applications:* The World App, a combined crypto wallet
   and credential management application, was presented as the most popular
   application built on the World Project (00:18:58 <#00:18:58>). Adrian
   also mentioned collaborations with organizations like Match Group and
   Razer, along with conversations with various countries exploring
   integration with national identity systems (00:20:03 <#00:20:03>).
   -

   *Orb Functionality and Technology:* Adrian explained the Orb's
   functionality, emphasizing its use of biometrics, specifically iris
   scanning, to determine uniqueness (00:23:03 <#00:23:03>). They
   highlighted the custom hardware and software designed for robustness and
   security against various attacks (00:26:00 <#00:26:00>). The open-source
   nature of both hardware and software was also mentioned (00:28:56
   <#00:28:56>).
   -

   *Orb Process and Credential Generation:* The process of using the Orb
   involves image capture, analysis, encryption, and transfer of data to the
   user's device (00:30:02 <#00:30:02>). The Orb itself retains no data.
   Uniqueness is determined using the iris code, a processed image designed to
   maximize distance between individuals (00:30:58 <#00:30:58>). The system
   uses AMPC for secure comparison of iris codes without revealing individual
   identities (00:35:52 <#00:35:52>).
   -

   *World ID and Zero-Knowledge Proofs:* Adrian described World ID as an
   identity protocol enabling users to maintain privacy through zero-knowledge
   proofs (00:39:10 <#00:39:10>). They emphasized the user's control over
   the key and data, and the decentralized nature of the system (00:40:15
   <#00:40:15>). World ID also supports linking to other credentials, such
   as passports (00:41:22 <#00:41:22>).
   -

   *Credential Extensibility and Future Plans:* Challenges related to
   credential extensibility, specifically ingesting and presenting various
   credentials within an application, were discussed (00:43:25 <#00:43:25>).
   They also mentioned the possibility of real-time authentication using face
   matching against user-controlled credentials (00:44:27 <#00:44:27>).
   -

   *Worldcoin and World Chain:* Adrian discussed Worldcoin's transition
   from a bootstrapping mechanism to a fee system for network sustainability (
   00:45:28 <#00:45:28>). They explained the goal of creating a virtuous
   cycle for credential issuers and relying parties (00:47:29 <#00:47:29>).
   Regarding World Chain, they mentioned its focus on scalability and
   resistance to bot attacks (00:48:33 <#00:48:33>).
   -

   *Q\&A Session:* The meeting concluded with a question and answer session
   addressing concerns about fake irises and civil attacks (00:51:30
   <#00:51:30>), offline verification strategies (00:53:47 <#00:53:47>), ID
   verification methods (00:57:47 <#00:57:47>), and additional fraud
   prevention measures. They confirmed the existence of documentation
   regarding civil attack prevention (00:59:57 <#00:59:57>).
   -

   *Fraud Model Testing and Open Source Considerations:* Nivas inquired
   about the robustness of the fraud model, prompting Adrian Ludwig to explain
   the incorporation of industry-standard test suites, such as those from
   NIST, and red teaming efforts. They also noted an ongoing internal debate
   regarding the potential benefits and drawbacks of open-sourcing the fraud
   models (01:00:58 <#01:00:58>).
   -

   *Future Collaboration and Monetization:* Harrison Tang expressed
   appreciation for Adrian Ludwig's presentation and work, and Adrian Ludwig
   indicated interest in future collaborations and extending the technology's
   capabilities. Harrison Tang mentioned they would likely follow up once more
   details are available on monetization and the related coin mechanics.
   Adrian Ludwig aimed to finalize the specifications for monetization,
   including fee structures, by June (01:00:58 <#01:00:58>).

Suggested next steps

   - [ ] Adrian Ludwig will provide details on monetization and how the
   coin works by June.

*You should review Gemini's notes to make sure they're accurate. Get tips
and learn how Gemini takes notes
<https://support.google.com/meet/answer/14754931>*

*Please provide feedback about using Gemini to take notes in a short
survey.
<https://google.qualtrics.com/jfe/form/SV_9vK3UZEaIQKKE7A?confid=5NXtzy9xTcBAhzZqhLeeDxIUOA8MCwMyBwiKAiAAGAEI>*
当 Transcript

May 6, 2025
CCG Weekly - Transcript 00:00:00 {#00:00:00}


*Mahmoud Alkhraishi:* Hello.
*Harrison Tang:* Okay, my move. Hey, Adrian. Okay, Adrian, can you hear us?
Is our video working?
*Mahmoud Alkhraishi:* I can hear you and see you, Harrison.
*Harrison Tang:* Sounds good. Hey, Adrian. Uh, I don't think we can hear
you. Adrian, we can see you now. No, we cannot hear you for some reason.
*Adrian Ludwig:* Ah, my mic is off due to the size of the call and if you
join as a presenter, you don't even have the mic button. So, is it working
better now?
*Harrison Tang:* Oh, perfect. Yeah, I we can hear you and see you. Great.
This is great.
*Adrian Ludwig:* Cool.
*Harrison Tang:* All right, so uh we'll start in about 30 seconds. Uh this
uh call is already uh being recorded uh and transcribed. So uh give us
about 20 seconds. We'll start right away.
*Adrian Ludwig:* Let me see if I can produce something resembling a slide
presentation. Let's see here. Present now. Entire screen.


00:04:11


*Adrian Ludwig:* Oh my gosh. Parallax for the max. Uh, does this look sort
of presenty-ish?
*Harrison Tang:* Yes, looks great. We can see your entire Yep. This is
great.
*Adrian Ludwig:* Wait. Okay.
*Harrison Tang:* Thanks a lot. All right. So, our meeting format, we'll
just quickly go through the administrative stuff about uh 3 to five minutes
and we'll go into your presentation and then uh end with a Q\&A.
*Adrian Ludwig:* That sounds great.
*Harrison Tang:* Great. Thanks. All right. So, uh let's start. Uh welcome,
uh welcome everyone, uh to this week's uh W3C CGCG meeting. Uh so this week
very excited to have uh Adrian uh chief architect and CISO uh from uh tools
for humanity here to talk about uh what they're working on uh in regards to
orb work orcoin and other initiatives. So before we begin I just want to uh
quickly remind everyone uh uh you know the code of ethics and professional
conduct of W3C. I just want to make sure we have a constructive uh
respectful conversations here.


00:05:26 {#00:05:26}


*Harrison Tang:* Right. A quick note about the intellectual property. Uh
anyone can participate in these calls. Har however all substensive
contributions to any CCG items must be member of the CCG with full IPR
agreements signed. So if you have any questions in regards to getting a W3C
account or the W3C community contributor license agreement, uh please feel
free to reach out to any of the coaches. Uh these meetings are
automatically recorded and transcribed and we'll send out uh the meeting
recordings and transcriptions uh in the next hour or two automatically. And
again big thanks to uh Manu uh for his uh contributions there. Right. Just
want to take a quick moment for the introductions and reintroductions. So,
if you're new to the community or you haven't been active and want to
re-engage, uh please feel free to just uh unmute and uh introduce yourself
a little bit. All right. Uh, want to take a moment for announcements and
reminders. Any announcements and or reminders. So, a quick preview of
what's coming.


00:06:51 {#00:06:51}


*Harrison Tang:* So, uh, next week we'll have, uh, Denun, uh, to talk about
the Taiwanese government's digital wallet. And then the week after that,
we'll have Phil Archer, uh, to talk about VC's verifiable credentials at
GS1. And then the week after that, we'll have Brent uh, to talk about
what's next at the verifiable working group. Any other um announcements or
reminders? Any updates on the work items? Let me check the queue. So, we'll
have the next uh work item review on July 15th. And uh every week uh we
have uh work item promotions and incubation uh call at 8:00 to 9:00 uh
every Wednesday. Uh we'll put those events in the W3C calendar. And let me
share the
*Mahmoud Alkhraishi:* He's
*Harrison Tang:* link.
*Mahmoud Alkhraishi:* already on the condor.
*Harrison Tang:* Oh, okay. It's already on the calendar. Thank you. So, if
you click on the link uh in the calendar, you'll see all these events uh
not just the uh the CCG main call, but also the incubation promotions, data
integrity, and the VCEDU task force uh weekly calls.


00:08:33 {#00:08:33}


*Harrison Tang:* All right. Uh last calls for introductions, uh
announcements, reminders, or work item stuff. All right, I think everyone
uh can't wait uh to the main agenda. So this week uh very excited uh to
have Adrian. This has uh been long time coming. I've been coordinating with
uh uh Adrian's team uh to get him uh to talk about and present well they're
working on that tools uh for humanity and as uh a lot of us know um you
know tools uh for humanity has been working on orb the world coins and the
world wallet right um and those kind of uh interesting initiatives uh that
one of the co-founders Sen Alman uh so uh so very I think a lot of people
in this communities are quite interested uh to learn more about their uh
latest initiatives and work items. So Adrian, I look forward to yours and
thanks thanks again for uh spending your time uh to come here and
*Adrian Ludwig:* Yeah.
*Harrison Tang:* present.
*Adrian Ludwig:* No, I I appreciate the the invitation. Uh I have not
played with meat very much.


00:09:43 {#00:09:43}


*Adrian Ludwig:* We're a Zoom shop. Uh, so we'll see if I can figure out
how to have slides present and it would be nice to have some situational
awareness and be able to see if there's questions and things like that. Uh,
so let me let me see if I can do that. I think maybe if I share just the
window that'll work, but I
*Harrison Tang:* Yeah.
*Adrian Ludwig:* don't know.
*Harrison Tang:* And then I will also mo moderate the queue. So don't worry
about it.
*Adrian Ludwig:* Okay, cool. Yeah, if you just jump in and ask any
questions. Um, does that look reasonable? That does look reasonable.
Excellent. Cool. Um, so as Harrison mentioned, he reached out a couple
months ago, uh, or a couple I think it has been a couple months. Goodness.
Uh, and asked if uh, we could come from tools for humanity to talk about
what we've been doing on the world project. Uh, and so excited to be here
and and share a little bit of that.


00:10:35 {#00:10:35}


*Adrian Ludwig:* To give some context on myself, uh, my background is
mostly security, not credentials per se. Obviously, identity, credentials
sort of overlap. Um, but my background is is really uh in the security
space. Um, I I ran security for Adobe and Macromedia for a little while.
Uh, it's kind of weird. I'm now in the same building that I started my
career uh almost 25 years ago uh here in San Francisco. We just changed our
offices in Tools for Humanity and we're now in that same space that Macro
Media was in in the early the late 90s, early 2000s. Uh I spent about seven
years working on security for Android uh both the operating system but then
also how do we protect Google Play against malware. Uh and then I spent
about five years at Atlassian uh working on trying to build security for
cloud products there. Um what was striking to me throughout my career is
that there are a lot of foundational problems that had not been addressed
in the infrastructure that we had. And so as I was looking around a few
years ago to try to find something different, I was approached by this
organization, Tools for Humanity, which had a very exciting name and and a
very big mission.


00:11:48 {#00:11:48}


*Adrian Ludwig:* Uh and I found it really intriguing. Uh and so I want to
share a little bit about what we're doing. Um and then hopefully I think I
think there's actually really interesting opportunities for collaboration
with this community. Uh and and some changes that we want to make to make
sure that that's uh able to be fruitful in the future. So uh Harrison
mentioned company was founded by Sam Alman and Alex Blania. Uh the origin
story basically comes down to we're worried about AI in the future and the
implications that it'll have in terms of changes on the internet and how do
we make sure that that future is one that can be as successful as possible
for humanity um not just for the AI and the bots. And so out of that came
this company Tools for Humanity. Uh and eventually uh what they settled on
is that one of the first projects that was appropriate to be built was an
anonymous open digital identity infrastructure. Uh and all of those words
are really important um and they have implications and we'll talk through
them.


00:12:52 {#00:12:52}


*Adrian Ludwig:* I think the one that um is perhaps most important is that
our intention is that this is a public good. Uh our intention is that the
stuff that we're building all becomes available as an open platform that it
ends up being owned and controlled by the community uh in much the same way
that the web has. Um it didn't start that way meaning the web but also
meaning world. Uh but we're trying to have it move in that direction. Um
and that's consistent with the intentions of the team originally and that's
consistent with the direction that we're going now. Uh and so I just want
to make sure that that's really well understood. So I think it lines up
nicely with the W3C CCG as well in terms of a lot of what we're working on.
Um it's going to be global scale. Uh this idea that the users have control
of all their data is a foundational tenant. Um and then ultimately that it
needs to be owned by everybody. So those are the things that drew me in. I
thought this was a pretty exciting mission.


00:13:48 {#00:13:48}


*Adrian Ludwig:* Um so let's start off first with what is this thing called
uh proof of humanity. Uh it has basically two properties. Um the first is
that you need to know that you are dealing with a human uh and that they're
alive. So you're actually interacting with them in some meaningful way. And
the second is that they're unique. Uh and we think that is a foundational
thing that's required to have online communities actually be fraud
resistant and resistant to disinformation. Uh and ironically while lots of
identity problems, lots of credential problems, lots of security problems
have been solved, this proof of humanity problem is basically an unsolved
technical problem at scale. Um and the reason that it's unsolved is the
approaches that we've taken so far have really gnarly uh compromises
between protection, practicality, scalability. Most of the approaches so
far um either can't achieve humanness, uniqueness, aliveness or they
require a ton of information to be exposed about the user to a lot of
different services and so they just don't work uh at a global scale.


00:14:57


*Adrian Ludwig:* This is intended to to represent sort of how we think
about it. We think of proof of humanity as a piece of foundational
technology. Um by itself it is sufficient for things like preventing civil
attacks on large networks. Uh combined with things like authentication and
digital identity, it becomes a really really powerful enable of those
technologies to be even better than they are right now. Um what's curious
to me looking at the way the system has been designed is that most of our
internet right now has the idea of identity and authentication but it
doesn't have this underlying proof of human. Uh, and that's why in things
like a Facebook or an X or any of our large scale social networks, we've
been overrun by bots. That's why gaming doesn't work, etc. So, there's
there's lots of implications for that. And so, that's the thing. Um, we had
an event just last week uh here in San Francisco uh where Alex and Sam
talked about sort of the origin of what we're building and the trajectory.
They described this simple plan.


00:15:59 {#00:15:59}


*Adrian Ludwig:* It starts with the idea of building the technology to have
proof of humanness. Then it begins to think about how do we distribute the
network uh and ownership of that network. Uh our goal is to have a system
that can scale globally. So it has to work for billion plus users. Uh and
then we think that that will enable AI to be usable by everybody at global
scale. And it also has you know this has a very AI lens. I think it has um
the ability to enhance basically any online service. So uh it's very
relevant in some other markets as well. The pieces of technology, one is
the orb. Uh the orb is uh basically a fancy camera uh that allows you to
determine that someone is human. It does that in in a fairly sophisticated
way. We'll spend a few minutes on that in a moment. The second thing that
you want to be able to do is actually use that proof of human. Uh and there
are two parts to using it.


00:16:53 {#00:16:53}


*Adrian Ludwig:* one is connecting directly to services and the other is
allowing it to be uh joined uh with other identity and authentication
systems to make those more robust. Uh and so world ID is designed to do
both of those things uh and do so in a way that um preserves user privacy u
maximally by using zero knowledge proofs and we'll talk through some of the
details of that. There are two other critical elements to the
infrastructure. Um one is worldcoin. Worldcoin is a token. Uh the role of
that token initially was to bootstrap the network. So to encourage users to
join. Uh at this point we are in the process of transitioning to the next
phase of the token's life. Uh the next phase of the token's life is that
it's the operating mechanism to maintain sustainability for the network.
I'm not going to spend a lot of time on either worldcoin or world chain. uh
not because we're trying to hide anything but basically because I think for
this group understanding how the credential system is most valuable but
what you can think about for worldcoin is there's got to be a lot of orbs
out in the world there's got to be a lot of credentials that are out in the
world how is it that those credentials can have sustainable business models
how is it that the protocol can be sustainable because


00:18:05


*Adrian Ludwig:* there's a lot of expense associated with it and on the
internet what we ended up doing was having advertising support the internet
protocol u we don't really like that model we would like to have the model
be one where large organizations that are benefiting from the protocol have
to pay directly into it and so Worldcoin makes that possible for this
protocol. Um it's a mechanism for making sure that it's sustainable into
the future. Uh world chain is the underlying blockchain. Uh there's two
problems with existing blockchains. Uh one is that they don't scale very
well. Uh and then the second is that they have been overrun by bots. Uh and
so World Chain is intended to solve both of those problems. Again, I'm not
going to spend a ton of time on it. I'll sort of signpost uh those two
things, but we'll just kind of go from there. So, we'll focus really on the
orb and world ID for today. I should also mention um obviously I'm talking
too fast and I'm covering a lot of things.


00:18:58 {#00:18:58}


*Adrian Ludwig:* If you do have questions, I'm very comfortable with
questions being interjected and and going to them. So, u happy to do that.
And I'm also happy I'll make sure that we have 10 or 15 minutes at the end
to talk through questions. So protocols are only as useful as the
applications that get built on top of them. Um there is an application that
is most popular of all the applications so far which is the world app. This
is an application built by tools for humanity. It combines uh a crypto
wallet uh and a management of credentials connected to world ID to be able
to use them in other environments. So that's the first application that was
launched uh and it's the one that's out there right now. It's sort of a
general purpose application. Initially the team thought there would always
be a wallet. Uh we're now beginning to migrate towards a belief that
actually connecting to the protocol might be something that's embedded
directly into applications. So maybe this idea of a wallet is not really
the right metaphor for how proof of humanity is going to be incorporated.


00:20:03 {#00:20:03}


*Adrian Ludwig:* We're not totally sure. Uh but there's some thoughts that
maybe it's going to be a slightly different model than the one that is a
more classic wallet type model. Um in terms of applications, in addition to
that sort of base level wallet application, we're starting to see some
large organizations believe that proof of humanity and world ID are useful
for them. One of them uh that we announced last week is Match Group. Uh
they make a bunch of the most popular dating applications. Tinder is the
one that uh is the most popular in the world right now. Uh and they have a
an issue with fake accounts and bots uh and are exploring world ID as a
solution for some of the challenges that they have. Razer is one of the
world's largest gaming corporations. Uh they build something called Razer
ID that's incor that's embedded in an SDK that ends up in a lot of the more
popular online games. they're pretty excited about the possibility of
reducing uh bots in the context of those applications through use of world
ID.


00:21:03


*Adrian Ludwig:* Um so there's some big sort of companies that are looking
at us as infrastructure for their services. Um we're also having
conversations with a lot of different countries. Uh these are the flags of
Malaysia and Singapore which are two of the countries where we're furthest
along in thinking about how their national identity system could
potentially use World ID as a way to extend uh access to services globally
to their citizens. And there's some interesting things there. So point
being, uh we're fairly far along in conversations that are tactical in
nature about how some of these folks could potentially use it. The logos on
the bottom are what we call mini apps. Uh inside of the world app, there's
the ability for a a developer to build uh a HTML, so a web- based app uh
that can use proof of humanness uh to protect its services. And so there's
a lot of small developers that are building applications directly inside of
World App. Um and all of these I think are use cases that we think longer
term are going to be particularly interesting.


00:22:06


*Adrian Ludwig:* So um just wanted to give a sense there about 150 or so
different developers that are that are building at this point uh using uh
world ID and world app. Uh in terms of the network uh we have about 12
million people actual people unique humans who have gone to an orb
somewhere in the world. There are over a thousand different locations
around the world right now that are hosting orbs and make it possible for
someone to go get verified as human. Uh in the United States, just last
week, uh we announced uh scaling up operations here. There are six
different locations around the United States right now. I'm in San
Francisco. There's one in Union Square and there's a couple other smaller
ones in the city. Uh Los Angeles, Austin, Nashville. uh we expect that the
number in the United States by the end of this year is going to be on the
order of several thousand. So that was announced last week. So very rapidly
growing the number of locations where people can go to an orb.


00:23:03 {#00:23:03}


*Adrian Ludwig:* Um the number of users of the world app and therefore the
protocol is about 25 26 million at this point. Um I like to highlight that
I don't know whether those users are people or not. We think most of them
probably are. Um but as with any uh internet service, we just don't know.
Um so uh we definitely know though that that 12 million plus are people
that have gone to an ORB and been verified. Uh we are in a wide range of
different countries. So we have physical operations in about 25 different
countries with orbs. Uh and then we also have uh about 160 different
countries where there are people that are using the app. So just to give a
sense for the scale and how things have been progressing. Okay. So what is
the orb? How does it work? Uh why does it exist? So, we talked about proof
of humanness. You want to prove that someone is unique, that they are
human, that they're alive, uh, and that that's a useful primitive for a
bunch of different types of services.


00:24:01


*Adrian Ludwig:* Um, the team initially did lots of investigation into how
that could be done. Can you do it with social graph? Can you do it with
attestations? Can you do it with government identity? Uh, and all of those
basically end up with a problem. Uh it could be that they're not inclusive.
Um most people don't have government IDs around the world. Uh it could be
that they're not scalable. Uh a lot of them are that they're not not AI
safe. Um things like the social graph work really well. Uh but they don't
give you the ability to determine uniqueness because social graphs just
don't work that way. Um and so they don't solve sort of the core problem.
Um the result of it was a belief that biometrics uh is basically the only
way. Um so the team somewhat reluctantly uh began exploring how that could
work. Uh they ended up with the realization that there wasn't an existing
mechanism that had enough fidelity to be able to determine uniqueness at
global scale.


00:25:05


*Adrian Ludwig:* Uh and so what do I mean by that? Um there's lots of ways
that you can determine uniqueness. Like you can use fingerprints. Uh you
can my my favorite example is actually I can use birth date not birth date
with your year although that would work too um but just like what date of
the year were you born in um there are 365 of them you're unique as long as
you have a population of something on the order of less than 20 people
because you start to have collisions above 20 people. Uh so birth date
doesn't work particularly well at global scale. Doesn't even work that well
at like classroom scale if you've ever seen that problem. um fingerprints
tend to work on the scale of like one in a million, one in a few million.
Uh you start to have collisions and complexity above that. Um and every one
of the mechanisms that we looked at sort of had that same problem except
for iris. And so that's what the the team settled on.


00:26:00 {#00:26:00}


*Adrian Ludwig:* Um palm print also doesn't have that problem. They're
different issues there. Um and and then DNA um although DNA does have some
very specific collisions around identical twins. Um so at any rate we
determined in the early analysis that biometrics was probably the only way
that this could be done at global scale uh and uh that custom hardware was
going to be necessary. So that's where the orb starts being built. Uh how
does the orb actually work? Uh it looks at a bunch of things. So it is a
camera. Uh it takes images in both visible light and then in other uh
bandwidth. So infrared in particular analyzes that to determine that what's
in front of it is a person uh shape of the face elements uh within that
face. Uh does it have heat that is similar to uh is there movement at a
micro scale uh that implies blood movement? Uh there are bunch of different
analyses that are happening. So there's uh people like to now say there's
AI models uh that are running on that device to do that analysis.


00:27:03


*Adrian Ludwig:* uh which is true by the way for all cameras. So I think
it's kind of a a funny thing that we focus so much on it like when you pick
up your uh your Nikon camera and it does autofocus in order to find that
you're taking a picture of a bird and zoom the autofocus it's using AI to
do that too. Um so in many ways it's looking for a different set of things
than other cameras but it's behaving just like any other camera does in
terms of determining that. um and then in particular focusing on the iris
of the eye which is the front of the eye and then analyzing that. Now this
is not intended to be a general purpose consumer camera. It's very focused
on solving a specific problem which is uniqueness and doing that in a
robust way that is resistant against lots of different potential attacks.
So it could be attacks by the person who's standing in front of the camera.
It could be an attack by the person who's operating the camera.


00:27:56


*Adrian Ludwig:* It could be an attack by the government which is hosting
uh the country within which the camera is operating. And so yes, a lot of
work is done on the optical system and the AI to analyze. But also there's
a ton of work that's done on security to protect against all of those types
of threats. Um which is actually why tools for humanity was interested in
talking to me because I had helped work on some of the these types of
threats when dealing with Android. uh and how do we deal with building a
device that is resistant even against potential attacks by a government. So
uh most of our investment uh is in solving those things. Uh it's in making
sure that the camera takes a set of images, analyzes those images, the
analysis of those images is robust. Those images are then given to the user
and they're deleted. Uh and so a we're trying to do everything we can to
the highest degree of security and privacy on that device and b we want to
make sure that uh anybody in the world is able to do two things.


00:28:56 {#00:28:56}


*Adrian Ludwig:* One analyze the system. So we've made it open source both
for hardware and for software and two uh we want them to be able to build
their own. Uh it is not the case right now that there are a lot of other
people building orbs right there's no business model yet. there's no
large-scale uh network that they could incorporate themselves into. But we
believe that in the long term there will be those things. Uh and therefore
we want this technology to be open so that any manufacturer could
potentially build an orb. Uh and initially that might be an orb as we now
have it which is this standalone device. Longer term we think it might also
be something that could get incorporated into other devices. Uh we
announced uh last week something called Orb Mini uh which is about the size
of a cell phone. Uh we believe miniaturization of those components is
possible. Uh and then it could be incorporated into other devices in the
future. So that's sort of the long-term trajectory, but we're setting the
stage for that right now by open sourcing everything and making um sort of
a baseline for that progress in the future.


00:30:02 {#00:30:02}


*Adrian Ludwig:* When you walk up to an orb, what's it actually do? The
goal of the orb is to produce a credential that can do two things. It can
prove that you're a human uh and then it can be used to determine that you
are a unique human. So the first thing that it does is it takes those
images, analyzes them and then it gives that data once it's confident that
you're human to the user. Doesn't keep it, doesn't need it, doesn't store
it. Uh so specifically the user device creates an encryption key when it
walks up to the orb. The orb takes pictures, analyzes them, encrypts them
with the user's key, and then hands them to the user. There's no data
that's retained on the orb. At that point, the user now holds what I think
of as a verifiable credential. It's a thing that an orb gave them that has
been cryptographically signed that they could use to say, "I've been to an
orb and I am a human." It's not enough to prove that they're unique.


00:30:58 {#00:30:58}


*Adrian Ludwig:* It's just enough to prove that they're human. But they
have it and it's theirs and it's self-custody. So how do we do uniqueness?
Now this turns out to be um one of the more interesting challenges. Uh I
already mentioned that you need to have something that has enough entropy
using my crypto background uh to be able to determine that there's a
difference between one user and another to determine uniqueness. If you use
something like your birth date, uh what day of the year you were born in,
you have enough entropy to prove that you're sort of unique within maybe 10
to 12 people. Once you get up to 25, you start having collisions. So the
iris has enough data in it to be able to determine uniqueness. But there's
a second concern uh which is how do you protect that data? And so we'll
talk through some of that. So to the first point uh you use the iris code
uh which is an image of the iris that has then been decomposed broken into
pieces uh where the way the code is generated is designed to have maximum
distance between people.


00:32:06


*Adrian Ludwig:* So specifically uh there's a series of filters and
mathematical transforms that are done that are designed to have every Iris
code be as separate from other iris codes as is possible when I have them
be uniform. Um interestingly the iris in general does not reveal any data
about a person. Uh identical twins have irises that are as separate from
one another as they are from any other person. We are not aware of any
specific characteristics of the Iris code that are related to age, gender,
race, or anything else. U in that sense, it's very similar to the day of
the year that you're born in. Right? People who are born on January 20th
are no more similar to one another than people that are born on December
14th, assuming that you don't trust astrology. So that's what we're
striving for something where everybody is uniformly distributed uh and are
able to be differentiated from one another. Now the second concern is in
order to determine uniqueness you need to be able to compare one against
many. And so I want to take a moment and talk about authentication versus
uniqueness.


00:33:26


*Adrian Ludwig:* Um, most systems that we're familiar with from a biometric
standpoint look like the one that's at the bottom where it's authentication
where a user enrolls in the system and after they've enrolled the goal is
to confirm whether they match their previous enrollment. And that's an
important property. I'll talk a little bit how we expose that property in
the context of a world ID. But there's a second property uh that's
important that is not accomplished by just a comparison of enrollment to a
subsequent interaction which is you can't tell whether multiple people have
the same enrollment which is actually one way of saying the same person has
enrolled multiple times and the system believes that they are different
people. And so one of the core properties in order to prevent civil
attacks, in order to prevent a bad actor creating lots of accounts on a
particular service, is to be able to tell whether it's the same actor. And
we need that and have always needed that in the context of humans. And we
think we're going to need that even more in the context of AI where it
becomes uh basically free to create an infinite number of accounts and to
overwhelm those services.


00:34:35


*Adrian Ludwig:* We're already starting to see that, but we think it's
going to get even worse. And so in order to do uniqueness, you need to be
able to compare against all of the other members that have previously
signed up and say, does it exist within the set or not exist within the
set? And of course, the risk associated with that is that you now have a
set of all the previous signups. And so while the Iris code is not believed
to have any meaningful information other than that this is a unique person
because that's the way the code was generated. we still want to make sure
that we provide the maximum level of protection. How do we do that? So
that's the question is how do we determine uniqueness and then provide
protection. So think about your birth day for a moment. If your birth date
is February 21st, which is what mine is. I don't mind telling people that
because it's not particularly sensitive. That means that my day of the year
is something like I think 51. I can add a number to that 10 or I can
subtract a number from that 10 and I end up with like 61 and 41. And if I
told one of you that my number was 61, I told another one of you that my
number was 41 and didn't tell you the central number, you wouldn't know
what my actual date was.


00:35:52 {#00:35:52}


*Adrian Ludwig:* It gets even more exciting if I add say 100 um or 200 so
that it wraps around, right? And so that model is basically how we have
implemented protection for uh iris codes. This idea of taking a value
mathematically transforming that value and then collectively performing an
operation uh is what we've tried to do. So we want to have a system that
can answer only one question. Is this person unique? We don't need to know
their actual iris code. We're never going to use that. We just want to know
has the person enrolled previously? And so that's what AMPC is designed to
do. Uh we have open sourced it. Uh it has this really interesting almost
accidental property that it's quantum resistant. Uh which is nice uh
because it's just generating a random number and then just exoring it. So
there's not actually a crypto system that can be quantum uh exploited. uh
and uh once they have been encrypted uh they are then handed to multiple
different parties.


00:36:57


*Adrian Ludwig:* we use three and then we have a fourth that provides the
ability to have redundancy and backup. Uh each of those parties holds an
encrypted instance of an iris code uh encrypted with a different key uh in
such a way that together those three parties are able to perform a
comparison and together they're able to answer the question of has this
person enrolled in the system. No one of the parties is able to answer any
question about who is enrolled. Uh no one of them is able to answer this
party is enrolled or not enrolled. Uh nor are they able to reconstruct any
of the previous enrollments. Uh and importantly uh we don't want world uh
or tools for humanity have access to any of the information. So we're not
any one of the parties. So currently the systems being operated by Berkeley
University of Zurich uh and FAU which is a university in Germany. uh and
then backup and recovery uh is enabled by having a fourth party nethermind
uh which is a company that works in the blockchain space.


00:38:00


*Adrian Ludwig:* So the core here is uh the system is fully anonymized. The
only thing that can be answered um is if a person were to go to an orb and
produce a iris code and then submit that iris code the system can answer
has this person done that before or not. Uh and that's the totality of what
can be done. Um there are both technical and legal controls uh that prevent
uh the parties from colluding. So uh that's the the mechanism for making
sure that it can be secured into the future. So our goal is to provide a
personal custody credential uh that you are a human uh and then have an
enrollment of that credential uh that allows uh you to interact with a
service and demonstrate to that service that you are a unique live human.
Uh and so the personal custody credential is held on your phone. Uh and
then there is a proof of enrollment that is put onto the blockchain so
you're able to demonstrate that that credential was used. uh and enrolled
uh through the blockchain so that in the future you're able to interact
with other systems.


00:39:10 {#00:39:10}


*Adrian Ludwig:* So that's our goal uh and that's what the orb gives us uh
as well as the AMPC backend and the enrollment process for that. So at that
point the user has these two things uh how do they then sort of use it to
interact with the rest of the world? That's where world ID comes into play.
Uh it's a fairly straightforward identity protocol. Um turns out there's
some complexity uh which is always interesting. Um the goal of it is to
allow an individual to maintain their privacy and they interact with
services whether that be a social network or whether it be a game or
whatever um through zero knowledge proofs. So those services should learn
nothing about you uh as a byproduct of interacting unless it's a thing that
you've specifically chosen to reveal to that particular party. Um if it's
being used just with proof of humanity, just with the orb signal, there's
literally nothing else that they could learn. Uh if you incorporate another
credential, they may be able to validate some other things. I'll talk
through that.


00:40:15 {#00:40:15}


*Adrian Ludwig:* That could be your age, that could be what nationality you
have. Um but it's up to the user to decide whether they want to do that. So
it's totally in their custody and control. How do the zero knowledge proofs
work? Um the important thing uh is that the key that's used to produce the
proofs is controlled by the user. Um and the information that's required to
generate the proofs is either on the blockchain where it is public or it is
held by the user where it's in their self-custody. Neither of those things
is held by World ID's infrastructure. So, world ID allows the proofs to be
generated uh by creating something that's self-custody by the user or
that's on the blockchain and then the user in the future can interact with
whatever services they want and those interactions are independent of the
world ID infrastructure. So um unlike traditional authentication systems
where the authentication system provider ends up with a record of all of
the services that are being used by that user uh there's actually no record
that's being generated on the back end.


00:41:22 {#00:41:22}


*Adrian Ludwig:* There's just no interaction with world ID backend uh
during the authentication process with any given site or location. And so
it ends up being fully decentralized. And the interactions that you're
having with any given site uh are also isolated from uh other sites. So
when you're interacting with uh you know your social media site versus your
game, they're completely separate from one another. World ID also has the
second attribute uh which is the ability to link to other credentials. So
credentials were first introduced back in October of this year. The first
credential that was introduced was an NFCbased passport. So within World
App, a user can enroll their NFC based passport. It produces what's called
a personal custody package. It's held on the user's device, which is just
like how the ORB works except that now rather than generating the camera
images on the Orb and then transferring them to the user, with the
Passport, you're reading it from your passport directly onto your device.
They never leave the device. There's a unique code that is generated just
like the iris code.


00:42:30


*Adrian Ludwig:* The goal is to tell that a document is unique so that one
passport can only be used with one person. Uh and that uniqueness can be an
important attribute as well. And we used AMC to manage uniqueness in the
same way that AMPC was used for the orb iris code. Uh so that it is private
uh even though uniqueness is being confirmed. So it's anonymous. There's no
ability to link from it. The credentials uh format is at this point
proprietary, although there's no reason that it needs to be proprietary in
the future. Uh in fact, for me, it's a little bit of a pet peeve that it's
proprietary. Uh I think we want to get to a point where it uses verifiable
credentials just like everything else should be using. Uh and so that's one
of the examples of something where you know we need to be talking to CCG
and making sure that uh the the way that these credentials are being
represented can be used uh in an industry standard format in in the future.


00:43:25 {#00:43:25}


*Adrian Ludwig:* Um the other thing is right now uh adding a new credential
is dependent upon the application. So it's dependent upon the world app
being able to do it. We're in the process of getting to a point where new
credentials could be added in a permissionless way. um they can certainly
be added on the blockchain, they can be added uh you know in that format.
Uh but what's difficult is how to represent them in the context of an app.
So we're working through how to make that and and I'm talking to people
that know more about this than I do. Um but the challenge of course is how
do you ingest those? How do you make them exposed? How do you allow the
users to make smart decisions about where they're going to use them? So
those are some of the things that we're trying to think about is how to
have that work. um and we'll be looking to you to to help get some of the
guidance on that. There's a second interesting attribute that comes out of
having these credentials be self-custodial um and having zero knowledge
proof and people who work on zero knowledge proof which is that you can
generate proofs of other attributes.


00:44:27 {#00:44:27}


*Adrian Ludwig:* So specifically one of the ones that's most exciting is
doing real-time authentication against the user. So uh the orb signal uh
the orb credential has an image of the person's face. Your passport has an
image of the person's face. Your phone has of course a camera. Uh and so we
can do client side attestation that the person who is represented in a
credential is the same one that's interacting with the camera. Um this is
of course complicated. Uh you need to have confidence that the camera is
giving you a reliable image. you need to have a confidence that the
comparison was done in a reliable way. So there's a variety of things there
that require you technical work. Uh but we have it working. Uh and we think
this is is a real opportunity to be able to do uh you know face
authentication against a user controlled credential in a meaningful way uh
at scale. Um so that's up and working uh and it can be connected to other
attributes as well.


00:45:28 {#00:45:28}


*Adrian Ludwig:* So you could for example uh produce a proof that someone
is of a certain age uh and know that from their passport they're a certain
age and that they are the person that's still using that device but you
don't have to reveal any other information about them. So what does world
ID give you? Uh we think it gives the ability to have uniqueness which is
actually an attribute that is very rare uh in other systems. Uh it can be
connected uh to other existing identity systems. So uh to be able to prove
things like age, nationality, passport and more and do that in a private
way. Uh and then we're in the process of uh identifying how we can make it
more extensible so that other types of credentials can be incorporated as
well. Uh our goal is to have this be as open a system as possible. I
mentioned in passing uh worldcoin is a key part of the system. Uh I'll
spend 30 seconds on this. uh we started with worldcoin as a bootstrapping
mechanism.


00:46:28


*Adrian Ludwig:* So how do users join the system? How do you get the system
up and running? One approach was that people were excited to receive a
token. And so the token was made available to users. It is still the case
and will continue to be the case. In fact, the world foundation exists to
distribute that token to as many people as possible. And so uh about 75% of
the tokens that were minted are being distributed directly to users. uh we
can do that because we know that they are human. Uh they've gone to an orb
and so we know that that uh those tokens are being distributed uniformly
across the global population and it's not uh subject to some of the the
types of attacks that exist for these types of airdrops on other systems.
And then the second is uh enabling of fees. Uh we just announced this last
week and we're working through all the details. Uh there is a blog post
that describes them. The critical thing to recognize here is that we
believe one of the challenges that credential systems have uh is one of
externalities.


00:47:29 {#00:47:29}


*Adrian Ludwig:* The user of those credential systems uh often build an
atomic solution just for their problem. Uh and what we want to have is the
ability for a credential system to be usable by lots of different parties
in a uniform way. Um that encourages credential systems to be more
sophisticated, more valuable, more usable. And so what worldcoin does uh
through world ID fees is makes it possible for a credential issuer to
produce a credential that can be used by any relying party and have a value
transfer without the need to enter into a direct commercial relationship by
using world uh by using blockchain technologies. So that's sort of the core
idea is the credential issuer ecosystem can have value from issuing those
credentials and do so in a sustainable way. Most of the value is expected
to flow to those credential issuers and then a small portion of it will go
to the protocol that enforces the rules that are necessary uh for the
system to be sustainable and to work into the future. So uh we've described
that at a high level.


00:48:33 {#00:48:33}


*Adrian Ludwig:* Uh our expectation is that this summer, so we're aiming
for June or July, um this will be mapped out u at a binary level. So every
detail about how those fees could work um will be there. Uh and then the
credential issuer gets to decide what they want to charge based on the
market rate. Uh relying parties could decide which of the credentials they
want to use in the context of those proofs. uh and we think that this can
create a virtual cycle uh that has not existed previously in uh in this
space. Uh and then I also mentioned world chain. Uh we're really trying to
solve two problems with world chain. The first is just scale. Uh we're
already basically the largest blockchain in terms of how you measure by
number of humans with 13 million discrete humans uh that are verifiably
actually human. Um it's a lot larger than any of the existing blockchains.
Uh and if anybody here has come from the payment space, you know, you go
talk to a Visa or Mastercard or anybody in the payment space and they're
talking about thousands of transactions per second.


00:49:34


*Adrian Ludwig:* Uh if you talk to the blockchain space, they're like
orders of magnitude, many like three orders of magnitude slower than that.
Uh and so a lot of our work is how can we build a network that can be a
financial network but also an identity network at the scale that is
required by humans and existing blockchain technologies simply just don't
work at that level. So we're doing a lot of work on scalability. Um and
then the second thing is uh at this point most blockchains uh to be blunt
have been overrun by bots in the same way that our social networks have
been overrun by bots. Uh and so trying to use them for human speed
transactions uh just doesn't work. Uh and so we're trying to incorporate
technologies to give preference to humans. uh and one of those as an
example is what's called priority block space for humans. So if you have a
world ID, the number of transactions you can do in a preference for your
transactions goes to those parties that hold a world ID and are able to
demonstrate they're human in that context.


00:50:32


*Adrian Ludwig:* So things like um your ability to do transactions become
more efficient if you're a human than if you're a bot. There's just
preference given to those. Um so those are some of the things that we're
doing. I I promised I wouldn't spend too long on that. That could be a
whole another hour or two talking through the world coin and world chain
things. But uh hopefully that was enough focus on just credentials uh how
we use the orb to generate those credentials, how we're thinking about the
long-term integration of credentials using world ID. Uh and gave you a
little bit of an overview of what it is that we're working on. Um
personally, I want to make sure that we are increasingly open about
everything that we're doing. Um my work really is security, privacy and
decentralization. Uh by which I mean how do we make it as open as possible
and then how do we actually diffuse this in the way that a protocol really
needs to be diffused uh so that parties can rely on it and trust it.


00:51:30 {#00:51:30}


*Adrian Ludwig:* Uh with that I will click stop sharing uh which I think
makes the slides go away and I can just answer questions or whatever is
most useful.
*Harrison Tang:* Thank you. Thank you, Adrian. And NeAs, you're on the
queue.
*Nivas:* Thanks Harrison. I have uh two questions. Um one could be a simple
one. Uh what about fake eye lenses and stuff and civil attacks using that?
Uh that's one question. And the other one is uh how does the world coin
distribution of currency happen from the date of enrollment or is it
retroactive?
*Adrian Ludwig:* uh so so the first one uh the orb has dozens of discrete
models that it's doing to detect fraud uh as an example for contact lenses
uh it does analyze what those lenses are doing. So you can use polarizing
to detect like whether you have a film. Polarized light reacts to very thin
films in a in a specific way. Uh and then you can detect uh whether a
contact lens is actually manipulating the image or whether the image is
passing through has not been manipulated.


00:52:46


*Adrian Ludwig:* Uh and so there are AI models to do that. So uh color
lenses tend to be something that's detected and we basically say that's
fraud. you can't. Fraud is a little bit harsh of an assessment, but we
basically say that's a a manipulated iris and so it cannot be used for
determining uniqueness. Um, if there's one that actually tries to change
the image, same thing. U, but a normal person wearing contact lenses that
don't manipulate the image will go through just fine. Um, but there are
wide range of different types of specific attacks that we've had to look
for and identify uh and and are used in that way. We also think over time
uh enrollment is not going to be a one-time action. Uh so identifying uh
you know a reason why someone will go back and reauthenticate or reenroll
uh is going to be part of the system as well. Um and then uh one-time
tricks like that are not going to be as reliable. In terms of the uh the
granting mechanism, uh the World Foundation controls uh decisions about how
grants are given.


00:53:47 {#00:53:47}


*Adrian Ludwig:* Uh my understanding is grants are uniform around the world
at this point. Uh and that uh at any given time you can sign up and you can
request your grant uh and at that point there's an amount that's reserved
uh and then it's distributed on a periodic basis. I think it's monthly at
this point. So right now I think it's about 40 or 50 worldcoin are provided
uh more of them towards the beginning and then you get an ongoing stream on
a perpetual uh on a perpetual basis from that point. So for several months
at least so that's the basic structure. Um
*Nivas:* Yeah, thank you.
*Harrison Tang:* Dimmitri.
*Dmitri Zagidulin:* What's is there an offline strategy for uh like post
enrollment relying party verification?
*Adrian Ludwig:* Yeah. Um so offline uh yes uh it actually works right now.
Um so the way that the zero knowledge proofs are generated uh requires that
you have a Merkel tree that is an enumeration of virus codes and it uses a
semaphore proof. Uh but there's no reason that that needs to be uh sort of
current.


00:55:04


*Adrian Ludwig:* So you can cache it and then you can generate your proof.
Uh and then the the user that's on the receiving end, the verifier, the
relying party, uh has to make a determination whether we want to trust that
proof based on how old the Merkel tree was at the time that the
*Dmitri Zagidulin:* I see. I see. So, the offline verifier needs to have a
copy of the Iris codes of basically everyone, right?
*Adrian Ludwig:* No. Um, just I'll be really blunt. No. Uh, so the Merkel
tree is a list of uh hashes of cryptographic keys. The Merkel tree that
goes on the blockchain doesn't include the iris codes. Iris codes are only
used at the moment of enrollment. And then at the moment of enrollment, the
user's private key is used to generate a public key that's then used to
generate a hash. And then the hash of that public key is what goes onto the
blockchain. And then the Merkel tree uh of those keys on the blockchain is
used to use what's called semaphore.


00:56:01


*Adrian Ludwig:* So that you can prove that you're a member of the set that
has verified, but you don't have to demonstrate which member you are. Uh
and so as the number of enrolled users gets larger, the privacy promise to
users actually gets bigger. Uh but there's no point where anybody uh in the
world actually has the raw iris codes uh because they're given to the user,
the user breaks them into pieces, they're given to NPC, AMPC does the
enrollment and then subsequently it's just comparisons against those uh
hashed.
*Dmitri Zagidulin:* I see. So it's it's just the keys. Understood. Uh
*Adrian Ludwig:* Yeah.
*Dmitri Zagidulin:* does
*Adrian Ludwig:* Yeah.
*Dmitri Zagidulin:* that mean the offline verifier node has to have a copy
of the blockchain
*Adrian Ludwig:* Uh
*Dmitri Zagidulin:* like the latest?
*Adrian Ludwig:* yes. Yes.
*Dmitri Zagidulin:* Okay, got it.
*Adrian Ludwig:* They have to have one that's recent enough that they're
comfortable with it.
*Dmitri Zagidulin:* Got
*Harrison Tang:* Any other questions? By the way, I have I I have a Adrian,
I have a question.


00:56:58


*Adrian Ludwig:* Although
*Harrison Tang:* Um
*Adrian Ludwig:* actually just
*Harrison Tang:* Oh,
*Adrian Ludwig:* to
*Harrison Tang:* sorry.
*Adrian Ludwig:* respond to Demetri's question. So that's specifically if
what you want to do is prove uniqueness. If you don't want to prove
uniqueness uh then you don't need to have a copy of the blockchain. You do
need to have a copy of something. Um so for example if what you want to
prove is that this is a person who uh has gone to an orb so they are human
and that they have uh are above age 18 and you don't really care about
whether they're unique or not then those two credentials are both signed uh
and can be kept by the user and we can produce a zero knowledge proof on
the user's device and so you could do an offline proof of age 18 and real
human. Um, so there are some types of proofs that don't require um the full
blockchain,
*Dmitri Zagidulin:* Got
*Adrian Ludwig:* but
*Dmitri Zagidulin:* it.
*Adrian Ludwig:* the uniqueness ones um tie into
*Dmitri Zagidulin:* Understood.


00:57:47 {#00:57:47}


*Adrian Ludwig:* a blockchain. Yeah.
*Dmitri Zagidulin:* Understood. Thanks.
*Harrison Tang:* So Adrian, so earlier I saw that the app can actually hold
like uh ids.
*Adrian Ludwig:* Yep.
*Harrison Tang:* So now the orb uh can ensure uniqueness and then uh
basically proof of humanity. But then the how do you actually ensure that
the ID is actually issued to the right person? Can you kind of explain that
a little
*Adrian Ludwig:* Yeah. So, uh that is face matching. Uh so, in the same way
that uh we check to make sure that the user uh that is doing a proof
against their orb enrollment is the same person by doing a match against
the image that's contained inside the orb credential. we do a match up
against the user uh inside their uh document as well. So that's one
element. The other element is uh we we check to make sure that the
documents are unique. Uh and of course they have to be signed by an issuing
party. So right now we support I don't know the exact number about 30
different countries.


00:58:54


*Adrian Ludwig:* Uh and so we check uh in the app is this signed by a
specific country. We also check is this a real document. So NFC gives you
the ability to do a document present test. It varies from country to
country how that's exactly implemented. And then the third thing that we do
is we check does the person who's got the camera on their phone match the
image uh that is on the passport.
*Harrison Tang:* Got it. Thank you. Any last questions? We have about two
minutes.
*Adrian Ludwig:* I should mention just to be clear about it like that's
what TFH is doing for the passport credential. If there is another
credential that someone wants to do, I'll say California's driver's
license. Uh California could decide to implement a similar set of checks
and then issue their credential on our on world ID world ID. not yet fully
implemented, but that's our intention is that anybody who wants to issue a
credential should be able to do that. And they would define what their
mechanism is for deciding whether enrollment is appropriate.


00:59:57 {#00:59:57}


*Harrison Tang:* Got it. Thank you. All right, NEAS, last question.
*Nivas:* Yeah, sorry. Uh, Adrien, uh, based on what you had answered, I
just did some quick query search and looks like there were many more uh,
fraud methods that is popping up that can uh, kind of, you know, uh, take
over the method that we're talking about. My question is, is there some
sort of documentation about how civil attacks are prevented in the world?
Uh, if there's existing documentation, a detailed one that we could go
through that would be nice. Uh, so we I just want to make sure it's
foolproof.
*Adrian Ludwig:* So, I'm not sure I understand the question. So, this
basically comes down to how does the orb check to see whether a person is a
real human? Is that what you're asking?
*Nivas:* Yeah. Yeah. I mean, we uh I did a quick query and it says fake
eyes, prosthetic models, textured contact lenses, video replay attacks,
synthetic biometrics, GAN based attacks. So, there is many things that I'm
not uh familiar with all I of this.


01:00:58 {#01:00:58}


*Nivas:* just wanted to make sure we've covered all of this here and it's
really profound solution and not has flaws in it.
*Adrian Ludwig:* Yeah. And there are actually some industry standard test
suites um that we're incorporating into how we're doing our fraud models.
So like NIST produces a set of biometric attacks that you would be worried
about. We do red team against those. Um it's an interesting question of
whether uh for fraud models we want to make them totally open source or
not. Uh it's an active debate within the company about whether that's
better or worse, but certainly test suites are something that we can
provide.
*Nivas:* Okay, thank you. Looking
*Adrian Ludwig:* You
*Nivas:* forward
*Adrian Ludwig:* bet.
*Harrison Tang:* All right, thank you. Thanks everyone and thanks Adrian
again uh for jumping on and uh actually uh gave this great presentation and
share you guys work. This is great stuff.
*Adrian Ludwig:* I hope it's helpful. Uh, and hopefully we can, you know,
collaborate on things in the future. Uh, this is just the beginning for us
trying to make sure the technology works and then try to make it as
extensible as possible. So,
*Harrison Tang:* All right,
*Adrian Ludwig:* um, feel free to reach out.
*Harrison Tang:* cool. I probably will reach out after you guys have the uh
more details on the on how the monetization and the
*Adrian Ludwig:* Yeah. Yeah, that
*Harrison Tang:* the coin
*Adrian Ludwig:* should
*Harrison Tang:* work.
*Adrian Ludwig:* be
*Harrison Tang:* Yeah,
*Adrian Ludwig:* I'm trying to have that be by June. full specification
about how that works and then how fees can be set, etc. So
*Harrison Tang:* sounds good.
*Adrian Ludwig:* Cool,
*Harrison Tang:* Cool.
*Adrian Ludwig:* thank
*Harrison Tang:* Thanks a lot. All
*Adrian Ludwig:* you.
*Harrison Tang:* right, this concludes this week's CCG meeting. Thanks a
lot. Thanks for for attending.


Transcription ended after 01:02:35

*This editable transcript was computer generated and might contain errors.
People can also change the text after it was created.*

Received on Tuesday, 6 May 2025 22:32:58 UTC