9 crypto leaders share advice for proof-of-humanity solution builders

1 year ago

Trust is successful shorter proviso successful the integer satellite these days. As artificial quality evolves and produces much “humanlike” and realistic results, users of integer services are progressively acrophobic with knowing who and/or what, precisely, they’re interacting with. With a committedness to decentralization and wide access, the crypto manufacture successful peculiar needs proof-of-humanity solutions to debar issues similar fake accounts and automated bots — and, of course, to comply with Know Your Customer and Anti-Money Laundering regulations.

The crypto manufacture is thing if not innovative, and proof-of-humanity solutions that leverage verified video registries, societal connections and biometric recognition are among those successful the works. But idiosyncratic privateness and power are a cornerstone of the crypto philosophy, truthful it’s indispensable that developers show a committedness to these principles. Below, 9 members of Cointelegraph Innovation Circle stock their proposal and ideas to assistance developers of proof-of-humanity solutions sphere the privateness of idiosyncratic information.

Aim for anonymous verification methods

Developers should purpose for anonymous verification methods, specified arsenic zero-knowledge proofs, and process information connected the user’s instrumentality to forestall idiosyncratic accusation from being transmitted. When transmission is necessary, usage end-to-end encryption. Emphasize transparency and idiosyncratic consent, and see decentralized retention solutions to minimize centralized information breach risks. – Irina Litchfield, Lumeria

Consider blockchain-based “proof of burn” 

Since the latest proof-of-humanity measures impact facial oregon video designation methods, it’s concerning that these providers grounds and store caller layers of idiosyncratic accusation beyond the “normal” idiosyncratic information that could beryllium exploited. It would beryllium absorbing to spot whether blockchain could beryllium employed to amusement a “proof of burn” of the idiosyncratic accusation obtained during a proof-of-humanity verification. – Timothy Enneking, Digital Capital Management

Verify individuality without revealing it

Privacy isn’t an add-on; it’s the instauration of crypto. The pursuit of proof-of-humanity solutions mustn’t overshadow the sanctity of idiosyncratic data. Use techniques similar zero-knowledge proofs oregon homomorphic encryption to verify individuality without revealing it. When done right, the effect is simply a solution that respects individuality and cherishes privacy. – Erki Koldits, OÜ Popspot

Implement a “forget me” feature

Give users the quality to afloat delete their data. If a idiosyncratic changes their caput astir utilizing a peculiar individuality solution, they should beryllium capable to wholly exit the ecosystem without immoderate lingering privateness concerns. This means developers should instrumentality a “forget me” diagnostic for users to region some their information assets and their full relationship history. – Wolfgang Rückerl, ENT Technologies AG

Adopt privacy-by-design principles

Adopt privacy-by-design principles during the improvement phase. Integrate privateness and data-protection measures into the architecture of the individuality solution, including information minimization, idiosyncratic consent and unafraid information handling passim the full system. Implement robust encryption and decentralized retention to support users’ information from unauthorized breaches. – Anthony Georgiades, Pastel Network

Practice information minimization

While it is tempting for Big Tech to harvest our information for profit, developers of proof-of-humanity individuality solutions indispensable signifier information minimization, collecting lone the indispensable accusation to verify humanity. By limiting the scope of information collected, they trim the imaginable risks associated with unauthorized entree oregon misuse, thereby safeguarding individuals’ privacy. – Sheraz Ahmed, STORM Partners

Focus connected self-sovereign individuality and multiparty computation

In the discourse of integer individuality successful a Web3 world, we truly should beryllium talking astir self-sovereign identity, which gives users existent ownership of their data. While zero cognition is large astatine elemental proofs, the Holy Grail for privateness is the usage of multiparty computation, wherever privateness becomes afloat programmable, allowing for multi-input computation without compromises. – Tiago Serôdio, Partisia Blockchain

Leverage homomorphic encryption

The anonymization-individuality conundrum is commonly disregarded. Proof-of-humanity systems authenticate unsocial quality identities, which whitethorn interruption privacy. Homomorphic encryption tin compute encrypted information without decrypting it; thus, humanity tin beryllium proven without compromising privacy. – Arvin Khamseh, SOLDOUT NFTs

Be wary of stockpiling biometric data

There’s a existent question to reply erstwhile it comes to proof-of-humanity protocols: “Just due to the fact that we can, does it mean we should?” History demonstrates, connected a wide scale, the unwieldy quality of power. Not lone is this a pivot from crypto’s contented of eschewing institutionalized control, but collecting stockpiles of biometric information invites a script wherever it falls into the incorrect hands. – Oleksandr Lutskevych, CEX.IO


This nonfiction was published done Cointelegraph Innovation Circle, a vetted enactment of elder executives and experts successful the blockchain exertion manufacture who are gathering the aboriginal done the powerfulness of connections, collaboration and thought leadership. Opinions expressed bash not needfully bespeak those of Cointelegraph.

View source