Let´s talk about @Kiltprotocol $KILT, an open source BC protocol for issuing decentralized identifiers and verifiable credentials who intends to become the identity solution for Web 3.0 Currently running in #Kusama plans to get a Parachain slot in #Polkadot.
1/14
$KILT is a decentralized blockchain protocol for issuing self-sovereign, anonymous and verifiable credentials, enabling trust market business models in Web 3. KILT’s mission is to return control over personal data to its owner, restoring privacy to the individual.
2/14
Internet users need to register for using services. If those services become successful, they accumulate millions of logins and often collect data on users. This leads to three major problems:
1. The data silos are honeypots for hackers and thus a high security risk.
3/14
2. The vast amount of users on one service automatically generates a monopoly. Better services coming up have little chance of being recognized, and the monopoly service will not evolve as fast as it could because it does not fear competition. #Decentralization
4/14
3. The amount of data collected by only a few services gives these services an unfair advantage in the age of artificial intelligence.
$KILT enables an alternative:
5/14
$KILT provides a new mechanism for manage user data, enabling the issuance and holding of credentials digitally. An Attester issues a credential at the request of a user (Claimer). The credential describes certain attributes of the Claimer, which the Attester can determine.
6/14
The Attester sends the credential to the user who stores it locally. The user gains full control over credentials and data. $KILT works like the real world, where trusted authorities issue documents to be owned and controlled by the individual. Controlled by THE PEOPLE.
7/14
$KILT stores a checksum (hash) of this credential on the KILT Blockchain. Blockchain technology enables the user to prove the authenticity of their document to anyone they decide to show it to.
8/14
$KILT is built on privacy by design principles, never storing any personal data on the blockchain. The personal data is in the credential which is under complete control of the user, while the blockchain only stores hash values. #privacy
9/14
Just like the real, analogue world, the user can hold many different credentials in their private wallet and use them for different purposes. The user is always under full control of their data and can decide when, why, and to whom they show a credential. #DataSecurity
10/14
Unlike the real world, $KILT even allows the user to only show selected sections of their credentials while still allowing the validity of the credential to be checked via the hash value on the blockchain.
$KILT enables Data Sovereignty.
11/14
$KILT decouples the verification process from the Attester just needing the KILT blockchain to verify validity what makes the system extra scalable and ensures privacy. An out of process Attester cannot be corrupted and will never know where and what the data was used for.
12/14
We are faced with a powerful tool that solves some important problems: it returns ownership and custody of data to people, promotes a fairer environment of competition between companies and allows total decentralization while maintaining high levels of security.
$KILT
13/14
It even opens the possibility of stopping being the product and deciding to whom and how we sell our data.
For all this, and with regulations just around the corner in the crypto world, $KILT has serious chances of becoming a winning project. #Kusama#Polkadot
14/14
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Do you know the differences between #Polkadot and #Kusama?
Let explore the matter to understand how Kusama plays a very important role in the development of #Dotsama ecosystem and is, in itself, much more than a testnet.
1/19
Although they share many parts of their code, #Polkadot and #Kusama are independent networks with different priorities.
Kusama is wild and fast, great for experimentation and early-stage deployment. Polkadot is more conservative, prioritizing stability and dependability.
2/19
1. Points in common: #Kusama was released as an early version of the same code to be used in #Polkadot sharing the same underlying architecture: a multichain, heterogeneously-sharded design based on Nominated Proof of Stake (NPoS).
Do you know what Common Good Parachains are?
I often hear that @Polkadot lacks this or that feature. Today I want to talk about CG parachains to understand one more aspect of the chances of #Polkadot and why it makes no sense to talk about lack of functionalities.
$DOT
1/11
"Common Good" parachains are slots reserved for functionality that benefits the whole ecosystem. They are not allocated via auction process but by the on-chain governance system.
Generally, a CG parachain's lease would not expire; it would only be removed via governance.
2/11
The purpose of these parachains will probably fall into one of two categories: system level chains or public utility chains.
They are not chosen by auction, because they are profitable. They are chosen via governance for being useful to the ecosystem. #Polkadot $DOT