Foresight Ventures: understanding the post-scenes of Web3's "private life"
Recipe
In the age of WEB3.0, users have their files on-line, and files are open, transparent, and traceable. We seem to have seen the utopia of freedom and equality. On the other hand, the way you protect yourself is different. Holy Grail.
Here is the top graphic of the sentence.
In the age of Web2, we had no privacy
In Chapter 10 of the Free Bitcoin Charter, Satoshi Nakamoto used the entire chapter to explain the privacy model of the Bitcoin network. The banking model always restricts access to information by participants and users, third, to ensure full protection. In a network blockchain, transactions must be publicly acknowledged, so the privacy of Bitcoin is governed by the anonymity of the public key. Often this cannot be associated with a key created by the public. Who is it (he currently has tools like Giant, but whale analysis to measure that data).
In the example provided by Satoshi Nakamoto, the blockchain privacy model has evolved “from a commercial network to a Bitcoin network”. You can extend this example to the private version of "Web2 to Web3".It is assumed that Web3's core network will be a blockchain network like Bitcoin, and the privacy we are discussing presupposes open transactions, open data, and decentralization.
We know very early on the importance of privacy on the Internet. When seen online, elementary educators and parents will tell you not to post your real name on the internet in a dangerous way. It is located behind the screen.
However, we have also learned too late the importance of online privacy. Our catalog has been read multiple times by third-party apps, and our favorites and features have been submitted to Google Analytics through various websites (press F12 now to open the console). visible by clicking on the site in your browser), our data is sold at a reasonable price, and these actions are not intended to steal our data and personal information. In recent years, we have only seen later. For a long time, it was dismantled by some internet companies and began to use applications such as Telegram, DuckDuckGo, and Mirror. Of course, the most important thing is that in the age of Web3, personal data has finally become popular among blockchain and developer interests.In the open, user-centric era of Web3, privacy would be a good example.
1. What is privacy in the Web3 age?
Privacy in the Web3 Age = Privacy, Anonymous = Personal Information, Privacy, Computer
In the era of Web3, for example all the interfaces and lines of the network that we create are interfaces with the applications in the chain, all the data will be business and the data they contain. , _value) For example, fair trade includes wholesalers, suppliers and remittances, and for these companies, confidentiality, anonymity and confidentiality The experience of the Web3 era can be interpreted.
Anonymity means that the sender and the recipient of the exchange (real ID) must be personal and that the exchange number can be displayed (only the _value parameter is known).
Confidentiality refers to the fact that the exchange rate of the transaction must be personal, and that the sender and receiver can be publicly disclosed (only _of and _ ie).
Real privacy (private life) should be anonymous and private. This means that everything about the transaction, including the sender, the exchange recipient, and the shipping costs, should be personal.
On this basis, more confidentiality isWeb3 users should have the power to choose whether or not to disclose information prior to shipment, allowing the user to choose whether personal information is required for this change.After the exchange, the user frequently selects the confidentiality of the execution of the exchange. This can be more difficult to accomplish due to the immutable nature of the blockchain.
2. Personal information (Confidentiality)
Personal information is confidential and generally consists of two parts: the management and ownership of the information and the confidentiality of the content of the information itself.
a) Manage and create information
User data must not be material. Users have control and ownership of their data, which enables data ownership and illegal data removal from the platform, which is a private speed guide.
In the era of the Web2, consumers are objects.Hundreds of ads on almost every search engine, ecommerce platform, and video site? In the Web2 age, businesses counted the number of users based on their product, and users were the primary source of revenue. From cookie tracking to Google Analytics, everything you do when you're on the page for a few minutes is tracked. And you can check the confidentiality agreement without anyone noticing. As the internet becomes more popular in the future, more users and data will flood the internet with more rewards for companies specializing in data theft. The simple problem in the Web2 age is that users don't have privacy, and users don't have control and ownership of their data.
file management
Data should be data, not objects.In the age of Web3, users need to be in control of their data. All interactions, edits, and output files must be user-generated. Only you can decide how to dispose of your data. The app does not decide on membership. More than data, the identity of the user is a measure, and it is also the identity of the user.
The applications of the Web2 platform are like farmers. Provides users with 24-hour terrain and monitoring, allowing users to create files. We use the generated data to earn money. The Web3 platform applications help you manage your data more like a personal administrator, without having to think about analyzing or misinterpreting your data.Using public data like blockchain, the Web3 app hands over data management to users, and each app needs to help users manage data better.
file owner
According to Vincent's article on Web3 Reshaping Data Value, users can set the value of each data. Have them distributed to users In the age of Web3, on-chain data is a hot mine, and many applications of the Web3 hot mine are available to users, a lot of information, the more the gold mine is big.
Free Web3 users bring their own gold mining information to the wave of the Web3 era.Consider banking interoperability, social media data interoperability, video website data interoperability. In fact, no need to think about it. This is already happening with Web3. Each imprint remains at the location of the chain. No need to start by checking the different DApp interfaces to switch. Because your old records are still yours and will stay with you.
When using chat software on Web2, you are chatting with others on a Facebook based server, while on Web3, when using chat software, you are chatting with yourself and all data is stored in your account. Communication software goes to the channel to get the information it has.
The relationship between property information and personal information is not particularly important, so I won't expand it too much here, but want to read the above.
Arweive
Arweave is a stable blockchain platform, which in the worst case allows Arweave to store data for up to 200 years (long for the average person).Regular storage is not competitive, but the real value of Arweave is constant control and ownership of your data.
The data transmitted to Arweave by Web3 users and developers is never closed (> 200 years) and always depends on the user and the entire network distribution. The first step, the real meaning, is that in all archives on a regular basis, all Arweave participants report the risk of data deletion. NFTs uploaded to Arweave are never deleted. This is the true value of the NFT property for users. . Regularly, NFTs and NFT members should be at the heart of NFTs.
In addition to the Arweave solution, the censorship-resistant content platform can be created by opening the source code of the contract (filtering and data processing tools) and the public data on the chain (raw data) Alexander Indestructible. Libraries This is the last mile of user data ownership in the Web3 age - the perpetual existence of information and ownership.
Recently, EverFinance developed Arweave mirror search engine, all Arweave data, users don't have to worry about whether their favorite platform is affected by various high issues. To use BUIDL files for multiple platforms, you can try this open library.
crypto wallet
Encrypted wallets are very important in data management, and with the advent of the Web3 era, crypto wallets are just as important as the Google search engine of Web2 (of course, crypto wallets don't collect and sell no data like google)
All encrypted wallets (Metamask, Bitkeep, etc.) affect how Web3 users manage their data.All operations and actions in the chain are signed or approved by the user. The user confirms that the information is leaked and that all interactions are recorded on the channel, so that the app does not have to worry about following them.This is an extended but generally overlooked privacy issue in Web3, but Web3 users are already aware of the privacy concerns with which they quietly manage their data.
Management materials and members will carry uX better
Web3 Trends gives you full access to all user information, and how this information is used is determined by the project itself. Instead of thinking about how best to use the app to attract users, DuckDuckGo's review of popular Android apps shows that 96% of free apps on Android include third-party app followers and 87% were referred. to Google. , 68% are submitted to Facebook. The homogeneity of blockchain data will allow Web3 developers to compete for related products and goals, which will directly improve user experience.
In the Web3 age, users are not commercial products, and user data is not controlled and used by a single source.Web3 files are also transparent with full reflection, which is ideal for private users.
b) Confidentiality of information content
Confidentiality of data content is ensured through commercial privacy applications, and coin and scratch proof mixers and other technologies provide privacy protection for content, equipment, production and marketing costs.
Privacy of personal information generally refers to the specific nature of the exchange or user information being exchanged, unencrypted or anonymous. Hide the ideas and free up the place of the exchange or trigger the negative effects of the exchange if you wish. Confidentiality of the incorporation of the content of the information.
private matter
The Ethereum account system itself is not "private".Making an ENS Airdrop Invoice expands your space in the form of interdisciplinary contracts and allows others to explore your entire business. In real life, it's like going ahead to buy coffee. The expansion of patient location during the new cap, which is good for the security of the entire healthcare system and the blockchain network, but affects people's privacy.
For example, the image below is the location of a hacker who gained access to a private key by someone else on the internet, at the same time as the plane crashed, the victim tortured is carried by the thief, so you can clearly see the criminal investigation process. According to the investigation, the crime was justified, but my privacy ended ...
A very simple and malicious way to privatize is to encrypt and then decrypt all the money and transactions, but this method is expensive and time consuming as it also involves the use of the corporate network.
It is important to note that the privacy of this site allows only transparent channel data to be hidden and not disclosed. Channel privacy and security and external channel links will be discussed in the next chapter.
Aztec (zk.money)
Aztec's zk.money is Ethereum's zkRollup Layer2 that specifically addresses privacy concerns.
zk.money directly closes the Ethereum account system and switches to the UTXO system to access private transactions. He uses direct mail to manage accounts. There is no swapping of two accounts involved, but swapping members of Accounts is easier than encrypting exchanges between accounts.
The marketing of zk.money is invisible to third-party users at the same time to avoid such issues as double spending on the entire Aztec network system, corporate privacy. UTXO owner Create a personal certificate. To prove that the system has these costs and that the consumers are theirs, the user does not have to declare true market value to prove that the business is legitimate.
Remember that the members of zk.money are stored in two Merkel trees. One has all the tickets that were created and the other has all the tickets that were discarded. Costs one tree, but adds value to the second tree.
The procedure for using zk.money is as follows: User deposits from the main network to Layer 2 and creates a certificate → Users move from Layer 2 (with privacy protection) → User transfers from money to the main network
Tornado. Money
tornado.cash is Ethereum's own proprietary coin chain, similar to the anonymous DASH industry. A great name, he put the money in the storm and took it away. I don't know who sent it.
tornado.cash also uses zero authentication credentials to hide account receipt on the exchange and to turn left for privacy to the private sector.
It breaks the connection between the sender and the recipient using a smart contract like a black box in the middle of an exchange. Please provide your zkSNARK certificate to accept direct deposit.
There are also public-private platforms like monero, ZCash, and DASH, which are starting to use private data to ensure the privacy of technologies like unacknowledged evidence and mixed results.
We already have mature solutions for the basic token function of exchange trading.Web3 can be created around tokens with different values and functions. Although exchanging tokens is only a small part of using Web3, it is a confidential process. In the era of Web3, our industry is Private.
3. Confidentiality (anonymity and confidentiality in the census process)
Privacy is a continuation of changes in data privacy. Privacy in the execution of smart contracts is usually achieved through cryptography, AI technology, a reliable working environment and other technologies, but it is very difficult to achieve a good balance between function and privacy. . .
Privacy computing takes one more step towards the private data privacy industry and continues to transform into smart contracts. The privacy protection of smart contracts often focuses on the process of completing smart contracts and documents and the states involved in the implementation are presented. On the third shield with nodes running smart contracts.Privacy technologies fall into three main areas: cryptography (such as multi-party security, including MPC), AI technologies (such as government education), and trusted work environment (such as SGX ).
Multi-party security computing is typically performed using a variety of cryptographic processes, including unconscious transfer (OT), scrambled circuit (GC), sharing secret (SS), and homomorphic encryption (homomorphic HE encryption). . There is no link to this form.
Federated education is aimed at ensuring data security in large data exchanges, protecting the confidentiality of device data and personal information, ensuring compliance in general and can be very effective machine learning on multiple parts or multiple computer nodes. Sharing information with other parties without presenting personal information together improves the alchemy process of machine learning. Federated Studies is about AI content and this article is not a continuation.
Environmental reliability is often associated with basic peripherals and CPU allocation in a reliable, isolated, and confidential environment that is generally independent of operation. Since the data processing was performed in a trusted environment, Data Privacy is a reliable hardware utility. The main challenge is how to balance performance and privacy.
Oasis Network
Oasis Network typically uses a scalar map, trust and layer counting and a ParaTime chain link for the link count process. In an environment of trust, there is better integration and confidentiality.
The ecology of the Oasis network is very advantageous in terms of privacy, and at the same time, the Oasis network is compatible with EVM and strong ecological scalability.
The scenarios used for the Oasis network are generally data tokenization (data guarantee, revenue, special management) and high performance L2 EVM.
The disadvantage of Oasis Network is generally that it cannot be set up, the process is very difficult, the communication of the different ParaTimes is not possible, the contract has no status, the application is unchanged and the application scenario remains unclear.
Plato Network
The PlatON network is generally a private public AI network, with several parts securing Chinese and AI based on its key characteristics, segmentation and counting, channel identification and interconnections (SCP preferences) . Chain arithmetic can also be incorporated into a variety of integrations (especially in AI and machine learning) to achieve better performance.
The main differences between the Oasis network and the PlatON network are as follows: the Oasis network uses the difference of a non-node agreement, the PlatON network uses an all-node agreement and PlatON uses homogeneous encryption to ensure the reliability of computing off-chain.
In addition, projects such as the Secret Network and the Phala Network are underway, and PKIs also plan to partner with trusted work environments to achieve personalized computing.
The confidentiality and confidentiality practices aim to protect the sensitive information of third parties. Changing privacy is an easier and less time-consuming exchange than the privacy that can be achieved directly on on-chain DApps combined with mixed coins or zero proof.Data collection is more complex and must be developed through a blockchain network to avoid the stress associated with network congestion and harvesting issues.
4. Personal protection (anonymous)
Personal identity is anonymous and usually consists of two parts: the separation of physical and digital symbols and the independence of digital symbols.
a) Separation of physical and digital numbers
The separation of physical and digital identifiers represents the separation of physical users and online identifiers. On Web1 you don't need to provide your phone number and name to guide you, but in Web2 you need to submit them. Here is the information about kyc. It's a big impact on privacy, but it's still difficult to talk about this step.
Separation of the personal body and digital identity refers to the separation of the real self and the personal network, which is the essence of the anonymity of the individual in the standard Internet access layers.
Seems easy to do. Giant Whale is lifting Bitcoin Holdings unless your business name is not required to use real names like pseudonyms or real names. But in fact, the most difficult aspect of privacy, we cannot have strict separation to protect our real name. , e-commerce platforms can get hold of, and human bodies can get out as long as we use ENS ...
In addition, many third parties accessing the Web2 website have posted real names and addresses to our network, and for your convenience, you can access the website directly from Google or Facebook, which helps participants reach them. Centralization also violates our anonymity.
In terms of physical and digital separation, the most suitable model I can think of is the Dark Web. We should be thankful for the dark web. If networks like the dark web don't use Bitcoin and Monero as a means of payment, businesses will see that the dark web is trying to be some sort of separation between the real and digital world, but users are making illegal purchases on the web. dark web. will have to tell themselves. Maybe. So the Dark Web didn't do all this distribution.
The anonymity of the body and the exclusion of digital characters are real elements of Web1, but once arrived at Web2, they will be in the spotlight. and violate privacy.
b) digital privacy
In addition to the separation of physical and personal online, what can further enhance privacy is the independence of digital symbols.If our digital identities are not directly identifiable, it means that our digital identities are always “erased” on their own and our personal information remains at high risk of being tainted and exposed.
The definition of a legal entity in the Metaverse is as follows: The Metaverse is a virtual space that is found on the Internet and exists in parallel with the real world, capable of showing the real world and is independent of the real world. Personally, I think this definition is consistent with my best idea of the meta world.This "virtual space which maps the real world and is independent of the real world" perfectly combines digitalization and confidentiality. We can not only enjoy the real world that has formed more than ten thousand years of history, but also become independent and private individuals in the “meta-cosmic world” “meta-cosmic world”.
digital social social
The freedom of digital symbols adds to the creative content of Blockchain Web3.Depending on the freedom of your personal digital, you can enhance the digital digital social network in the age of the Web2, with instant messaging or communication tools like Twitter, Facebook and Zoom, but tab relationships in this software cannot not be complete. independent of the physical body.Social media freedom is an important application of privacy, and it is also one of the most important meta in the world.
Promote and reactivate digital autonomy
All Web3 user data is at their disposal, making it easy to set up the digital ID, and data communication always establishes a seamless connection between operations and open information islands.Degen scores for your channel, CryptoPunks avatar and management features allow us to create reliable, transparent and straightforward characters.
When you want to switch from a physical ID to a digital ID, you can resume your KOL or idol job directly with a digital ID with a new face. The most obvious examples are virtual idols. Most of the time, we know everything about that ID number. Reality is behind it, but people behind the scenes can always support new communities and create more memes thanks to new digital characters. Of course, this situation violates privacy.
Even if you don't need this digital ID, you can start from scratch by creating a new account (of course your real identity cannot be displayed on this digital number), but trying to reopen in real life is more dangerous.Every social identification number exists in the digital world. What's going on in Vegas in Vegas. Your true identity does not matter.
really
Realy proclaims the idea of City DAO as a meta-global project that connects the cultural landscape and the urban core. Real change of 3D virtual costumes, virtual concerts and offline fashion modes for the channel. It also hosts virtual concerts and assists users with city management and other meta-world activities.
The future meta-world will not be seen as a “connection between real and virtual”. Based on this, he should be able to live on his own without depending on the real world. What Realy has is a comprehensive insight into fashion culture. It's a channel for young people, it's very attractive. Personally, I like to experience various aspects of Digital / Meta Universe ID. By default, social accounts and in-game genders are set for women. It brings a lot of digital numbers and social interactions to the community.
At Realy, you can ignore gender and appearance restrictions, freely surround the culture, and even participate in virtual concerts digitally, ignoring restrictions on location, timing, and risk of infection. These are important lives for Web3 users. All of this can be accomplished without physical disruption. All information, including modern shopping and concert attendance information, will be provided with your personal digital in another world meta. 88 The trendy Rising player.
In essence, there are differences between reality and privacy. Even in a relationship, you have to be a citizen, you have to let go of a part of yourself, and you have to exchange information with others.
Sister tabBlockchain Web3 provides users: data management, digital token membership and freedom, full physical privacy, we can interact with the channels' real digital signage. life and second life.
5. Conflict between blockchain and privacy
The triangle does not block the performance, availability and privacy of the blockchain.
An anonymous login or integrity app specializing in privacy can improve the privacy of a blockchain without the inconvenience of malfunction and presence.
Contestation:
An article from BluemountainLabs said that privacy should be built into the underlying worldview, and Vitalik said, “Only anonymous scripting in the world is the norm. really reliable and safe. Global privacy is at an all-time high.
In fact, Bitcoin and Ethereum have waived some privacy protections to prevent distribution and metering fees. In Bitcoin, information about stolen goods sold and sent off-capture will be exposed to you and you will lose some. In Ethereum's design, the term “privacy” is only used in the account system and in the UTXO section. Ethereum does not benefit from more robust privacy protection, and the more scalable UTXO uses better performance and financial systems. Easier to use.
In the impossible triangle of performance, usability, and privacy, performance, usability, and privacy are the first things end users find themselves in. Manufacturers need it first.In the age of Web3, the last night before dawn was a private matter..
Solution:
What we want out of this conflict is a malfunctioning global privacy blockchain.
One of the most successful but viable solutions is to ensure privacy by creating unique proprietary channels (such as Monero) and then comparing multiple crosslinking devices and wallets to ensure privacy. But it is the user. Pity. It's like if you want to post pictures of your tattoos on social media but don't want your elders to see them, you have to add them and block them one by one or move on to another photo. Young social media only add peers as friends. This is especially true in Web2 and Web3 situations.
One way to provide partial coverage and improve user experience and performance is to use privacy-aware applications through pluggable or Layer 2 decentralized applications (for example, zk .money). This allows users to stay on the same blockchain network. In terms of protections (and performance improvements), the link is better than Layer2. Because, in my opinion, remote and beautiful Web3 would definitely be more stringent. It is flexible and “decentralized” (no channel will be billed to the service support). In this case, I'm very happy that the simpler design can create custom apps like Arweave's SCP.
The inability to edit and open blockchain data status affects privacy.
You cannot then remove or hide your trade-in information, but you can decide whether or not to disclose your information out of personal preference prior to shipment (eg, Volition like StarkWare).
Contestation:
The first is the proliferation of blockchain data, which makes data protection very difficult as concepts, versions, and business concepts can often be found in a blockchain browser.
The second is the immutability of blockchain data. When data is sent to the chain and written to a block, it cannot interfere with. When a user submits changes that present personal information, that information cannot be reversed or hidden. This may constitute a breach of EU data protection (all users have the right to "forget").
Solution:
Openness and inconsistency of data can be seen together, the main characteristics of both blockchains, such as performance, is the inability to achieve consistency, privacy is really second nature in the face of two peculiarities. Then open and unable. cash. It cannot be deleted (anonymity and anonymity can be resolved).
But what we do know is that these two features were born to secure and open up the network, in fact we have control and ownership of our data even though we can take our information exchange away. . Thousands of robots entered. In such cases, removal may not be effective. The Internet is a memory and online exchanges are open to the public.
Data cannot be deleted or hidden after the fact, but users can decide in advance to disclose it. Option This privacy option is very user friendly and can use your personal information. A similar solution would be: StarkWare: Volition file format of ImmutableX (but if you have a lot of data out of chain it will still follow the old web2 method), you can choose to keep your data out of chain or not . Then, if you don't want your information to be made public, privacy in some public organizations allows users to choose to keep their information private.
Actually, for the most part, channel information is its own worth and value, but for a small group of information that needs privacy, I think there is a need to prevent them from choosing privacy. .
6. Content
No one knows what will happen to Web3, and most Web3 users don't even know what they want, just as Web2 users have long known that they themselves have been raped. Paying for private services can also lead to a need for more privacy, making many people realize that better internet access will require more privacy in the future.
In the era of the Web3, the autonomy of data, personal data, computers and personal data are really necessary.
Web3 = Have your messages In the era of Web3, everyone can control themselves.
Scan QR code with WeChat