Space Summary
The Twitter Space Signed, Sealed, and Delivered: Sybil Resistance & Airdrops hosted by ethsign. The Twitter space 'Signed, Sealed, and Delivered: Sybil Resistance & Airdrops' delved into the critical aspects of establishing a Global Trust Layer for secure on-chain signatures. Emphasizing Sybil Resistance, Airdrops, and key players like EthSign and Signpass_world, the discussion highlighted the significance of partnerships with industry leaders. The session underscored the importance of a transparent and immutable digital signing process to advance blockchain adoption. Collaboration and technological innovation emerged as key themes for enhancing decentralized systems.
For more spaces, visit the Infrastructure page.
Questions
Q: Why is Sybil Resistance important in decentralized systems?
A: Sybil Resistance helps prevent malicious actors from manipulating trust and security in decentralized networks.
Q: How do Airdrops benefit blockchain projects?
A: Airdrops can increase community engagement, boost token distribution, and promote project awareness.
Q: What sets EthSign and Signpass_world apart in blockchain signatures?
A: These platforms offer secure on-chain signing capabilities, ensuring tamper-proof digital signatures.
Q: Why are partnerships with companies like Sequoia and Circle significant?
A: Partnerships provide valuable support, expertise, and credibility to innovative blockchain ventures.
Q: How does a Global Trust Layer enhance digital signatures?
A: By establishing transparency and immutability, a Global Trust Layer strengthens the integrity of digital signing processes.
Highlights
Time: 00:15:42
Sybil Resistance in Decentralized Systems Exploring the importance of Sybil Resistance in preventing network attacks and maintaining trust.
Time: 00:30:18
Airdrops for Community Engagement Understanding how Airdrops can drive community participation and project visibility.
Time: 00:45:56
Partnerships with Industry Leaders The impact of collaborations with Sequoia, Circle, and Balaji on project success.
Time: 01:00:32
Role of EthSign and Signpass_world Examining the innovative solutions these platforms offer for secure blockchain signatures.
Time: 01:15:21
Advancing Digital Signature Technologies Insights into the evolution of digital signing processes and the role of TokenTable in innovation.
Key Takeaways
- Sybil Resistance is crucial for establishing trust and security in decentralized systems.
- Airdrops can be a powerful tool for community engagement and token distribution.
- EthSign and Signpass_world are at the forefront of leveraging blockchain for secure signatures.
- Partnerships with industry giants like Sequoia, Circle, and Balaji provide strong backing for innovative projects.
- Creating a Global Trust Layer fosters transparency and immutability in digital signatures.
- The importance of on-chain signing capabilities for blockchain-based applications cannot be overstated.
- Sybil attacks pose a significant threat to the integrity of decentralized networks.
- Innovative solutions like TokenTable are contributing to the evolution of secure digital signing processes.
- Ensuring authenticity and integrity of digital signatures is paramount for blockchain adoption.
- Collaboration between key industry players propels advancements in decentralized technologies.
Behind the Mic
Introduction
Our channel. Hey, everyone. Welcome to the space. Let's give our speakers a few more minutes, and we'll get started shortly. Hey, hey. GMGM, everyone. Hello. Hello. How's everybody doing today? Doing very well. Logging in from Asia. Have you guys been to a korean blockchain week or going tokin to a four night in Singapore? This has been the most common question I've been asked this week. It feels like everybody's going to 2049. Hey, I'm missing out. But my answer, it's like, at this point, copy paste. Our cryptographer will be attending. He'll be giving a talk at encrypt. So if you want to catch. Catch him and hell yeah. And if you want to learn more a little bit about biometrics and how we're using Eigen layer to create human keys, he's the man to talk to. Hey. All right, all right.
Speaker Interaction
Thanks for the alpha. That's great. And, yeah, I love this, asking this classic question, because it's, like, a great way for everyone to connect. And then, like, when we see each other in real life, it's like, hey, we've met each other here before, so, yeah, that's what this is all about. And one more second as we bring up the next featured speaker one. In the meantime, how is your guys week going? Absolutely great, especially now that we're here. Funny enough, this is the second Twitter space of the week. I feel like finally kind of getting my. My flow on this platform. It's a lot of fun. Nice, nice. I love Twitter's faces for the same reason, and we're very happy to have you here. And I am looking for our other speaker. If you're here, please send a request, and we'll get started very shortly also.
Discussion Theme
So theme of today's Twitter space is cyber resistance and airdrops, which I think is a huge topic for us to talk about right now. And it's the perfect time to learn about, like, cyber attack and safety and issues and how we're solving these issues. Let's go. And we are connecting. I see our other speaker in the audience. Oh, there he is. He's moving on up. Hey. Hi, GM. GM. I'm up. Gm, how you doing? All right. Very, very good. Very excited to start. How about you? How are you doing? Yeah, doing well. Also excited to start. All right. All right. So, yeah, this is going to be, like, a very open ended discussion. We'll have a few, like, key topics, and, like, feel free to jump in or answer questions with questions and like put your thoughts out here.
Welcoming the Guests
This is a free, safe and fun space. Alright, so let's welcome you guys very warmly and we'd love to hear an intro of like both the projects, zero mem and Holonim, and also about like the bit about you guys and your guys story. So yeah, the space is all yours. Incredible. Well, thanks for having us here. You guys have been an incredible partner and really meticulous about curating the most immaculate vibes. Really, really excited to be here supporting you guys. Sign protocol and thanks for the platform to kind of share what we're working on a little bit. So we're Holland and Foundation. Nanak and I are two of the co founders. Helen and foundation is basically, it's an organization with the mission of proliferating this novel technology that we've developed called human keys.
Discussion of Human Keys
And we think it's probably going to be a very big thing. It's probably nothing really, but once the rest of the web catches on, we'll find that it's the best way to scale all of the benefits of cryptography applied to consumer digital tools without sacrificing or making huge sacrifices on security, privacy and usability. So the foundation has three products. The first is Mishdi network, which lets you derive human keys from human attributes instead of randomness like you typically do with private keys. Mishd is pretty cool because it uses the security mechanisms of proof of stake with Ethereum on Eigen layer to secure human key derivation. And this is something that's pretty novel, hasn't been done before. Zero Nim is what we're most known for and which is in the audience today and how we work together with sign protocol and that uses human keys to make proofs on identity or really with any wallet so that you can achieve Sybil resistance and prove that a person is a unique individual person.
Products Overview
We can talk more about that as we dive in. And the very last product, one that we're super stoked about and we think is going to be a huge deal, is silk. Silk is our elegant user interface expressive design language for using human keys all over the web. It's pretty much an embeddable wallet that lets you derive keys using machine network or inject other wallets if you need to use them. And you can also use zero Nim, produce identity proofs, interact with dapps, clean airdrops, etcetera through silk. So that's the down low. Really excited to share this stuff with you guys today. Definitely give these accounts a follow if you'd like to learn more about incentives and campaigns we have for the community. All right, thank you for sharing.
Clarifying Names
Sheik, is that how you pronounce your name? You can call me Sheikh. Or wait, could you pronounce your name again? I want to get it right. You can actually just call me Shadi. That's my first name. Shawi. Shadi. Shadi. All right, Shadi. Yeah. Thank you so much for sharing. And I love that you mentioned that we have the vibes. Cause that's what we operate on. And I love that you said, like, probably nothing, meaning it's gonna be probably something huge. So congrats on, like, the novel type of human keys and learning about the scaling, the benefits of cryptography. And I love the idea of not sacrificing the privacy or usability, which is a huge problem in the space.
Addressing Challenges
So it's great that you guys are focusing on that and. Yeah, so shout out to all of your projects. Misty, network, zero nine, and silk. So we got private keys that are not random with security of proof of stake and zero Nim human keys to make proofs on identity and proving that the person is unique. And that's a huge problem now, especially with the new upcoming chain of ton and all the new meme coins and an entirely new era of airdrop farmers. And it's getting more challenging to distinguish who's a real community member and who is a bot that's just trying to take airdrops. So, like, us, we're like, we. One of our biggest projects is token table and airdrop distribution system.
Importance of Identity
So we, like, very much closely relate to that of the idea that, like, proving someone's raw identity is very crucial to not only the project, but to the space. So, yeah, like, thank you guys for what you're doing and also very much looking forward to new progress on Cilk user interface that has the language to use human keys, which is amazing. So, yeah, thank you for the. Thank you for the intro. All right, now passing the microphone to Nanak. Hi, there. So should I give, like, a summary of myself or the company or I. Yeah, yeah. Like, any intro that you would like to give. The floor is all yours.
Continuing Story
Sure. Yeah. So I'm Nanak. I am a co founder of Holodom. Shadi and I started Holonim. It actually started as a science related hackathon project. We were both doing computational neuroscience, surprisingly, at Georgetown, and were working on a hackathon to bring data on ipfs. We started just building stuff together and talking about he Web three pilled me. And eventually we realized there's a big problem bringing reputation on chain, because we want to do this for science led use cases. There are other use cases for projects were working on that all needed identity on chain, as I'm sure you all are familiar with at sign protocol, that you often do need some sort of reputation on chain.
Challenges of Web 3.0 Privacy
But it can sometimes be challenging to do the same way we do in web two, where we have email accounts, we have the sensitive data that we're just sharing with one server because now we're putting it on public blockchain where everybody can see. So it really limits the use cases you can do unless you can somehow find a way to figure out privacy on chain. So that's how we got started, and we started working with folks.
Niche Use Cases and Unique Challenges
Like, our first client actually was Andrew Yang Stao. So Andrew Yang, the us presidential candidate, a while ago, he did campaign financing using nfts, which was really novel, but also had some novel challenges, like, how do you prove people are us resident on chain? So this was our first sort of flagship use case of ZK technology to enable use cases on chain with civic infrastructure. And so then later on, when we started focusing a lot on proof of personhood, using ZK to prove you are a unique person, this is useful for use cases like voting with privacy for airdrops.
Partnerships and Technological Innovations
And this is a big part of our partnership with Time protocol, this proof of personhood. And then we also started looking at use cases like the one Shadi mentioned for ZK, beyond just proving government id, but also starting the human key technology and using this for wallets, for biometrics, etcetera. All right, thank you for sharing.
Transitioning to Opportunities and Challenges
And, wow, that is a very unique beginning to the project. And I am personally a fan of that as well, because in web three, things are always changing. And some great ideas start with one and then blossoms into something that's huge. So, like, shout out to that and the Yang gang dow. Okay, that's very interesting.
Importance of Balancing Identity and Privacy
And I like that. Like, you guys started as the science leader, the hackathon, and really saw a problem of having someone's reputation on chain and meeting the solution where you need to identify, you need to, like, secure the identity of that person, but also let them have privacy. So that is an extremely important issue and a very significant one to balance. And it seems like you guys are doing a really good job in finding that balance.
The Growing Use Cases of ZK
And ZK is definitely very important for that. And the use cases, it seems like it's, like, growing and. Yeah, like, this could solve a lot of problems. So, yeah, thank you, guys. So much for the introduction. And also I saw that Aaron has also joined. If you also want to, like, say hi or give an introduction, let me know.
Community Involvement in Airdrops
Hey, thanks for organizing us. Am I Arabin? Yeah, I can hear you at least. Cool. Yeah. So around here, part of the Hollands team, I write content, also do some bd stuff. Sybil resistant airdrops is very interesting. Me and Shadi have actually co written an article as well, so you kind of dig deep into airdrops a lot.
Humor and Engagement
So, really excited about this. Oh, cool. By the way, I have a joke for you guys. Do you guys want to hear it? Of course. Just a little fun between the transitions. So the joke is, why did the zero knowledge proof go to therapy? Oh, okay. That's a good one. Why does zero proof knowledge go to therapy?
Exploring the Punchline
I feel like it's like a play on words. Like something that's kind of punny and also something that's related to psychology, maybe, but also something that has to do. Oh. To find itself without finding itself or. Okay, does anyone else want to give a guess? Nanak arun? No, I do not.
Understanding Zero Knowledge Proofs
Well, you know the most about ck proof, so I'm a little disappointed because. It cannot reveal anything. It cannot reveal anything to anyone. Oh, ding, ding. Yes, it's a terrible. It's a terrible joke. It's a terrible joke. But the zero knowledge proof had to go to therapy because it had too many secrets and just couldn't open up.
Further Analysis of the Joke
Nice. I had commitment issues. Oh, yeah. So it sounds like zero k. DK has an avoidant personality, keeps things to themselves and does not open up. Good one. I love that. Like, you guys started off with that, with a joke. And it's a perfect segue to our next topic.
The Importance of ZK and Human Keys
So I know that we all kind of touched on, like, the importance of ZK and human keys and, like, balancing identity with privacy on chain. And for those who are not very familiar, and since the topic is, like, cyber resistance and airdrops, do we want to start out. Start off by defining what a Sibyl attack is and its main issues.
Understanding Sibyl Attacks
So a civil attack is an attack where you make a bunch of fake accounts. You know, a lot of times there are systems where you want to ensure that everybody's rewarded equally. So let's say in voting, you want to make sure that one person corresponds to one vote. You know, one person can't have ten votes.
Implications for Airdrops
And then you have other situations. Similarly, with, like, airdrops, you want to make sure that each airdrop goes to one person. One person can't get like 100,000 airdrops and take it from somebody else. Similar with quadratic funding. Let's say you want to, you know, quadratic funding is like a novel funding mechanism that aims to be more democratic by making more funding go to projects with more votes instead of more money.
Democratic Mechanisms in Funding
So it takes away the idea of $1.01 vote for funding pools and makes it more into one person or a nice combination, nice blend of dollars and people. So dollars do matter, but democracy also matters. So there are lots of use cases, lots of very interesting voting and consensus mechanisms. Like even blockchain consensus has this requirement of, you know, the blockchain just does it by saying, okay, $1.01 crypto equals one voting consensus.
The Importance of Proof Systems
Right? So there you see this almost everywhere, not just in web three, also in web two. Like, you know, voting. Web two definitely happens that way. Even like, non-web stuff like voting, still there. But there's a huge issue of how do you actually enforce this? Because if you can't enforce this, then all these systems that rely one person, one x, are vulnerable and can't really be useful.
Challenges in Cyber Resistance
So you need some sort of system to say, okay, each person could only have one vote. And to do this, you need a good proof of personhood. So this has been the big challenge in civil resistance. And there's always been a trade off between civil resistance, decentralization and privacy. It's like you can have like one or two, but you certainly can't have all three.
Trade-Offs and Solutions
You know, easiest thing, you could just verify someone's id, but then you've lost privacy and decentralization. So then you verify it with ZK, and you. Then you also have the privacy, and you have at least some level of decentralization depending on how you do it. So this is how we think about it. There are all sorts of methods to perform civil resistance.
Exploring Various Approaches to Civil Resistance
We don't think that government ids are the best for all use cases. We think they're the best for some use cases. And there's a place for all sorts of types of civil resistance, depending on how much rigor you want, how much security you want, how much privacy you want, how much decentralization you want.
Summary of Cyber Attacks
This was very nicely said. And so for everyone out there, a cyber attack is when someone makes fake accounts and they're not sure if everyone has the equal parts, which is very important because, like, inherently, blockchain does give people that sense of privacy where everyone has their own wallet.
Impact of Wallet Privacy on Votes and Stakes
That wallet is anonymous and like, whether it's in web two or web three, it is common that when there are a access available for people to have more votes or more stake with more wallets, then people are more likely to either create more wallets themselves or use box. And that could throw off the proportion of people's power, whether that's like voting power or funding.
The Importance of Equitable Airdrops
And for like, airdrops, which is something that's very important in this space. And I like that you said that you're aiming to be more democratic in the sense that everyone has an equal share of power. And I thank you for sharing the new word for people who don't know yet of quadratic funding, which is a novel funding that aims to be more democratic, to make funding go to more projects with more votes instead of more money, which is very important, because even in web two politics, it's almost like more money equals more power.
Blockchain as a Tool for Fairer Power Distribution
And blockchain and decentralization could give more people that fair voting power, which is great. And then, like, back to the idea that, like, there's an inherent privacy in one's blockchain Persona, then it's relatively easy for someone to take advantage of that privacy. And the solution to that, which I totally agree, is the proof of personhood for everyone that gets a stake to be proven that they are one person, and that's very important.
ZK Proofs: Balancing Privacy and Equity
And that's where ZK proof comes in, where they have enough privacy, see that all their information is not out there, but it is known that they are one person and they have their own fair share of votes. All right. Yeah, thank you for sharing that. And then I think that also touched onto the second question of, like, defining cyber resistance and its significance.
Cyber Resistance: Understanding its Role
So I'm assuming that the cyber resistance is the solution to cyber attacks. So also opening the floor on this topic as well. Yeah, it's interesting. I know, you know, the airdrop community, the airdrop hunting community, I would say it's pretty united in their distaste and overall just revulsion towards industrial Sibyl farms.
The Threat of Sibyl Farms
So these are organizations that can sometimes span countries. They could be completely digitally coordinated, and they might be using, like, for example, like entire, like, what we call, like, Sibyl farms, where they might have a facility with people working there with phones all wired up and controlled by, say, like a single computer. I know there's.
Cyberpunk Farms and Web Three Challenges
There's a tweet out there that shows a video of one of these farms, and it's kind of like, it looks like something out of cyberpunk. What is it? 2077, the video game, something like that. And you know, these projects kind of really sour the game for everybody else who is looking to participate and be engaged in Web three, incentives are a huge part of it, right? So ownership within the network, being able to contribute, make sure your voice is heard. These ideas of pluralism and utilitarianism around the technology. But when an industrial Sybil attacker comes in, they can scoop up a huge portion of the actual airdrop. And so this means that if, say, the airdrop was like 100 of Token X to everybody, an industrial farmer can come in and scoop up 20% of that. And in the end, maybe users end up getting a significantly less portion of that, like 50 of that token, or 70 of that token, or 80 of that token, depending on how much they scooped up.
The Community's Role and Trust Issues
So it's really important, I think the community recognizes that to combat this, we need to be able to prove that we are unique individuals, that we're not bots, that we're not exploiters, and that we're all in this together. Now, one side, you know, I think like simple attacks really aren't an individual with one or two or even like, let's say ten burner wallets. That's nowhere near as big of a deal as say, like somebody with thousands or even tens of thousands of accounts that are doing, you know, anything they can to prove that they're a real person. Like creating fake GitHub accounts with fake commits and fake pull requests, to creating fake social media accounts that are scripted engagement and all of that. And now we have LLMs on the scene, things like chat, GPT, which in some cases can pass a cursory turing test and make it really seem like these are real people. So the community realizes we need to figure out how to prove our humanity.
Proving Individuality and Various Methods
And we have a couple options for this, right? I keeping in mind what Nanak said around privacy, security and decentralization, we can prove based off of our web accounts, right? But then again, these are pretty weak. We can prove by taking a video of ourself, like for example, using proof of what is it, humanity protocol or bright id, where we take a video of ourselves reading a poem or something to show that it's real. But somebody's going to have to look at that video and know that it's you. And you'll have to trust that video as stored responsibly and never leaked. Or you can do something like with Worldcoin, you can go to an orb, you can put the orb to your face and scan the unique patterns of your iris to create a unique identifier that worldcoin is responsible for storing and keeping secure to generate a proof that you can attach to a pseudonymous wallet on chain. That's pretty cool too, but it does have some problems as well.
KYC and Legal Personhood
And then the last option is you could do some form of KYC where you can prove legal personhood. So if you have a government id, you can prove that government id was issued to a single person and that it is that person holding that id. So that has a little bit more accessibility and we can do a little bit more for privacy with this, which is why we're focusing specifically on government id. Civil resistance. I'll pause there before explaining kind of exactly what these are. All right, all right. Thank you, shady, for sharing this. And this is very eye opening to hear that there are videos out there of those Sibo farms where, like, as you said, it's not just one to ten burner wallets, but actually thousands or even tens of thousands.
Problems with Malicious Farming
And it's almost like a black mirror episode, imagining like, all these people in one room with all these phones or tech and just generating huge amounts of stake. And like, when you said the 20%, like, that is actually huge, whether it's from like a meme coin perspective or like any share perspective or any votes. And that is indeed a huge problem. I remember seeing a meme of like, right like, when iPhone really started taking off a while ago, also exposing that age, but there were videos of people holding, like, tens of phones, just downloading an app and deleting it and downloading it just to juice up that number. And at that time it was like, whoa. But now there's, like, much graver consequences when there are people trying to pass off as a huge amount of people when it comes to, like, voting or airdrops.
The Nature of Malicious Intent
And it's also assumed that, like, those types of things are have, like, very malicious intents that get the airdrop and they dump on everyone. Or if they all have a shared agenda and they all vote one topic, then that's like, very, like, that could be very disruptive. And so you also mentioned that there are current ways to prove, but a lot of them have issues. So you mentioned that, like, if you send a video of yourself, then it does kind of prove that you are human. Not kind of. It does prove that you are human, but it also takes a lot of trust from that person's side to take that video and trust that video of them is not going to be exploited or not going to be shared.
Challenges with Current Proving Methods
And like with Worldcoin, it is fair that people could go and scan their errors, but it also takes a lot of effort and a lot of resources, and not everyone has the equal share to that. And this is also like a perfect segue to the next question of how we're solving this problem. So, like, repay proof for those who are nothing very familiar with that topic, like the general gist, is that there is a way to prove something and have that proof not be stored where it's like zero knowledge proof. And that's like the very general Wikipedia answer to that. So the next question is, could you guys talk a bit more about the concept of ZK proof and how you guys are using it to solve that problem?
Understanding ZK Proofs
Yeah, so ZK proof essentially means proving something without revealing the underlying data. So for example, you have a government id and you prove that you're over 18 without revealing your age, your name, which country you're from, stuff like that. So now ZK can mean a lot of things. Now it started to mean a lot about scaling as well, compressing transactions. But for the sake of this discussion, I think we can focus on the original meaning of ZK, which is really this sense of privacy. You can prove anything. And the cool thing about ZK proofs is you can prove anything. There are some types of ZK proofs that are specific to certain things you want to prove, but they're also ones that can just take any sort of computation.
Use Cases and Benefits of ZK Proofs
You do the whole computation on your input, but you don't show your input. You show the output. You say, look, I know some input that results in this output. In other words, I know I have this government id, don't have to show it. But if you put it to this function which verifies the government id and says, if I'm over 18, that function says yes. So that's sort of the beauty of ZK, that you can do any computation, show the output without revealing the input. And you can imagine it has a lot of use cases everywhere. For sure. For sure. That is a very great explanation.
The Advantages of ZK Proof in Real Situations
So as Nanak said, it is a way to prove something without revealing the underlying data. And I really like the way that you gave like a very simple yet very powerful example of if you need to prove your age and you have a government id, you are able to prove that you are a certain age, but it doesn't reveal like where your passport is from or your specific other information. And in this case, like the sense of privacy that it can give, I'm sure it has a lot of real use cases, even the example of like in web two, if someone goes to a bar and they want to prove the fact that they are over 21, but they don't want the bartender to know their legal age and their physical address, then this would be like a case where the ZK proof could show that they are indeed over a certain age, but it doesn't show their legal address or their legal name.
The Importance of Privacy in Web Three
Which also like going back to web three is very important because people value their privacy. So. Yeah, thank you for sharing about that. And I think now we could like move on to like the core of like what you guys are building, whether it's like short term or long term vision and goals and the importance of ZK proof in this process. Yeah, so in our short term goals we really have been focusing on the use case of on chain reputation and you know, but really in the long term we see this sort of stuff as just helping security in general across the web, not even web three, like to think about ZK use cases.
Addressing Data Breaches and Trusted Systems
Data breaches are huge, right? Like how many sites have you entered your Social Security number if you're from the US or if you're not, you know, your government id, you know, probably at least 1020 sites and then what are the chances that none of them ever get hacked, right? Like pretty slim. So it's a huge issue that all of our data, you know, it happens all the time, right? Like recently in the US, practically everybody's Social Security number was just reached in India like a year ago. Similar situation with a DaR and just. Yeah, universally we have this system of trust with centralized servers where we're trusting them with our information. And so we see this as one of the major use cases of identity from Web three, you know, with ZK and advanced cryptographic technology.
Onboarding and Enhancing Decentralization
Now another use case that we're really interested in is in the more medium and long term is onboarding people like finding actual use cases of cryptography and even web three outside our bubble. So right now I think there's been a big push to get people to log in with Twitter and Google accounts, which is good in many ways. Like it's getting web three to the masses to some extent. But then the issue is it's centralized again, if a single Google account controls all your funds, then it's not web three. So we think there's another really good use case of identity primitives to improve the safety and decentralization.
Creating a Robust Web Three Environment
So there's no single point of failure there. And that's the way we're really going to get everybody in web three. We're going to, one, show them more use cases of preventing data breaches, and two, make it so they can actually use it easily without having to fall back on centralized custodians. Yeah, definitely. Thank you for sharing that. And you gave a really good example about, like, Social Security number, which is something that's like huge, that like one person has one of each. And hypothetically, if it is hacked or maliciously manipulated, could have grave consequences.
Short-term and Long-term Goals in Security
So to paraphrase Nanaks, or to summarize, the short term goal is to use for use cases of on chain reputation. And for the long term, it's, and I like that you said that it's to help security in general across the web, which is not just limited to web three, which I agree, because the web itself is very pro to hacking and the privacy and security is extremely important. And data breaches, I'm sure that a lot of people, like, randomly get emails saying like, oh, like, this website was compromised. Please change your email or change your password immediately.
Consequences of Identity Theft
And the consequences are huge. Like for an example, for in a few countries, some country residency cards have, like, that id number and everyone has their own id number, and that number could actually be used to go to a bank to borrow money. So say that if someone's id number in a certain country is compromised, then the person that compromised it could physically go to the bank with that id number and borrow money, and that debt would be to the person whose id number was stolen. So that is like a very great, like, real world problem that you guys are trying to solve, which is great.
Onboarding and Use of Cryptography
And I also like the way that you mentioned that another, like, long term use case, or a very broad use case is to onboard people and have a use for cryptography. Because I think that as although web three is growing, there are a lot of people who are unsure about web three or haven't used web three in a very intimate sense. And in terms of onboarding, this is a very great pace that everyone, whether in web three or web two, would understand the importance of privacy and the importance that for a certain, like in certain cases, they need to upload their information.
Trust and Security in Data Handling
But it also takes a lot of trust in not only the project or the company that they're uploading it on, but to know that they won't get hacked, which is always a security risk. And I like the idea that you're talking about using cryptography in this case for security, for onboarding people. And you gave the example of the Google account login, which I agree, it's great in the sense that people could use one account to log into everything, but it's also very centralized.
Centralization vs. Decentralization
If Google controls like someone's bank account and personal information, then if any parts of this is compromised, then a lot of things would be compromised. And then. So if we look at the third pinned post from sign, we are also very interested in this topic. So Vitalik a while ago made a tweet about the importance of not only just privacy and against people farming maliciously. And he also mentioned.
Addressing the Challenges of Airdrops
So I'll read the tweet very quickly. Like he said, airdrops are fascinating. Initial use case for ZK blockchain based identity credential and he mentioned that the goal of like, in this case, the example is an airdrop is that it should be distributed to community members and not just randalls who immediately sell and reward contributors to the project and be reasonably egalitarian and resist the extractive adversarial farming. So what you guys are doing, and also including what sign is doing, is to solve these problems and to make sure that while we have like that mass onboarding, which in our case we're more focused towards airdrop distribution systems.
Ensuring Fairness in Airdrop Distribution
to, for example on telegram has ton and that has an onboarding of a lot of people who use Telegram would have that wallet that's native to them. And it's almost like an automatic onboarding way that like they don't have to create wallet codes, they don't have to understand seed phrases and everything, but the same accessibility for mass onboarding creates a problem of like vulnerability towards that airdrop farming and malicious botting and to kind of introduce sign. So sign itself is the goal is to sign all information on chain and one of her main products is called token table.
Token Table as an Airdrop Distribution System
So we're an airdrop distribution system that actually focuses on the questions and the problems that we're discussing. So we have attestation gated airdrops, which means that we distribute the airdrops based on KYC, which is one of like the solutions or one of the ways to combat the malicious botting system. And we have vesting schedules, meaning that the tokens could be distributed and unlocked over a period of time. So it's not like bots getting air drops and selling and nuking completely.
A Unified Approach to Privacy and Transparency
And then. Yeah, so I think that was like a perfect way to connect what you guys are doing with what we're doing. Like, we're on the same page when it comes to the importance of having a very fair and a very relatively transparent system while ensuring other people have privacy. So it's great that we're having this discussion on Zkhdem and the real life examples, whether it's like mass onboarding or web two or web three, whether it's specific things like Airdrop or general things like general security.
Open Discussion and Future Directions
So yeah, that's great that like all of this ties together and yeah, so based on that, like I'm opening the floor again for any other like comments or thoughts, like love to have like any discussions around these topics. How does token table work? I'm really excited to hear the announcement there. How do you guys imagine getting it out to market? And how is it going to change how airdrops are done in the future? Oh, that's a great question.
Introduction to Token Table
So, introducing token table, it is at its core a very tech advanced airdrop distribution system. So like at its core fundamentals, it is a distribution system that allows any projects to distribute airdrops. So where omni chain works for all EVM compatible chains, and Solana and ton and on top problems that I mentioned, that Vitalik mentioned. So in addition to just us being a product that distributes airdrops, we're really focused on the topics of privacy and fair airdrops. So in terms of fair airdrops, we have ways to kind of like deter the malicious airdrop farming or the bots or that you mentioned before, the Sibyl farms, where we have the option for projects to gate their airdrops based on KYC. So that means they projects could choose to only distribute air drops to people that have completed their KYC.
Airdrop Features and Functions
And we have the option for people to basically choose how long it is for everybody who gets the airdrop, how long they have it and how long they sell it for. And we have other functions like NFT gated airdrops. And all of these goes on our main sign protocol which is signing everything on train and attestation based airdrops. So with every information is stored in our attestations. And that could also solve the problem of like one person using multi like malicious links or lots of different accounts to farm airdrops maliciously. So like, in conclusion, we are token airdrop distribution system and it works on all chains. And we have, we give the option to gate these airdrops based on attestations and like, such as KYC.
Scalability and Onboarding
And we have this different schedules that could let the projects choose who to give the airdrops to, how long they hold the airdrops, and ways to deter the malicious types of farming. Got it? Yeah. That's super comprehensive. Really interesting. Actually, by any blockchain, do you mean non EVM as well, or just any EVM blockchain. So we have Evm and Solana and Tun. So we have the tech to be expanding to more chains. And in terms of the existing chains, we're also focusing heavily on the mass onboarding. And we believe that mass distribution and mass onboarding are interconnected.
Community Engagement and Future Plans
So in this case, we're focusing on tons of the fact that time is already automatically onboarding. So many people who use telegram into crypto and setting up wallets without seed phrases, and there's so many projects that's coming out, whether it's like tap to play games, like not coin or telegram. Native community, like dogs. We've done a lot of airdrops. I think for dogs, there was 42 million accounts, and we did the airdrop distribution systems. More than, I think, 80% of them that are like that pass a lot of the tests, and we are able to distribute them all at the same time, fully automated. And so in general, we are focused, so we are trying to be available for all existing chains, and we have a current focus on time, and we have dogs, not coin and a lot of upcoming projects.
Technological Innovations in KYC
I will also pin from token table. So this is the sign main account, and token table is our product. So I will pin a token table post on this stage as well. Cool. Yeah, that's super interesting. Yeah. Especially, I mean, like when you go from like say 50,000 or the 75,000 folks that claim, say like Optimus, the first optimism airdrop or the 100 something thousand, they claim the first airdrop about to like 40 million accounts. These are completely different scales, both from like, technical and real world practical and legal use cases. I mean, when we talk about civil farms, you have to think about like, who has the resources to really put these into action.
Significance of Privacy and Accountability
And if the incentive is there, you know, you could have organized crime or pariah state, you know, like the nation that must not be named participating. And so I think in the end, it becomes, you know, like KYc becomes really important. And so one of the things we really care about at Hollym is you don't need to sacrifice privacy to have transparent accountability on chain. And this is why we built and released a zero knowledge KYC service that allows us to keep the 99% of users and their data, their KYC data, private and encrypted and generated using proofs generated on the client side device. But in the event that a bad actor does infiltrate the airdrop or the community.
Mitigating Risks with Smart Contracts
We have ways for Dapps to be able to programmatically disclose the identity of those malicious actors using smart contracts with specific disclosure rules written into them that are presented to the user at the time of consent when they're using the application. So this is what we call proof of clean hands. We think it'll have an incredible impact, not only for tools like token table that might want to provide DApps for a way to protect against bad actors that might use privacy to take advantage of the protocol or the community to, for example, DeFi protocols or privacy protocols that don't want to go down the same road as tornado cash with regulations. So we're super excited to be able to provide this technology stack to builders, developers, and to give consumers within the space some default protections when it comes to privacy.
Concluding Insights on Privacy Technologies
Wow, that's very nicely said, Shadi. And I thank you for, like, the shout out of, like, the comparison between the scales of, like, what we're doing, like, over 40 million accounts compared to the previous airdrops. And I like the way that you mentioned this in the context of having practical and legal use cases. And it's almost like, chilling to hear that with Sibyl farms, it's the people who have the resources to put these into action and it's like they're not playing around. And again, shout out to Holodom. So for all the viewers. So for Holodom, what I'm hearing is that the model is that you don't need to sacrifice your privacy to have transparency on chain, which is very powerful.
Balancing Privacy and Transparency
And that is done with ZK so that the users KYC data are private. And I like the name of proof of clean hands of, like, in the case that a bad actor infiltrates, there are ways to disclose the identity of the malicious actors because it's like the joke of, like, everyone gangster until the mask falls off. So if people think they have complete privacy and they could, like, abuse the systems, then they would do horrible things. But if they know that, like, if they do horrible things and are caught, then their own, like, dirty laundry is aired out, that could be a very great, like, intrinsic and extrinsic deterrent against them being bad actors.
Token Table's Role in Security
And I like how, like, this is like, the tech that you're providing for builders and projects to give that layer of security for the public, which is very great. Thank you for sharing. And I love this Twitter space. Like, I myself am learning a lot. And it seems like we have so much in common and, yeah, like, thank you guys so much. And I'm being mindful of the time. It is almost, it is almost time. So now I'm opening space for you guys to say, like any other information you want to share or any thoughts, also open to other jokes as well.
Upcoming Events and Community Engagement
I wish I had one. Let me really think. But yeah, like on this topic, opening the floor for anything. Any other thoughts or questions or ideas or inspiration or anything like that. Cool. Yeah, I just like to make a, share a few things and make a few small announcements. On one side, we are running a points program for the silk wallet. So every protocol, Dapp or developer that integrates cilk into their sign in flow as an option or as a native option will be distributing basically points to that developer account for every user that creates an account and for all the points that the users themselves create while using Cilk on that platform or across platforms.
Trivia Engagement for Community Education
So it's a really great way to, you know, for example, if you're onboarding a user with your dapp and they're creating a silk account for the first time, you're able to obtain a good portion of the points that they might create by swapping, bridging, or even using other applications, which is kind of cool. And the second bit that I wanted to announce is, do check out our discord. You can go to Hollandin Idae and scroll down to the bottom to find the social link for Discord. We do trivia ZK, it's a complicated topic and we have a lot of work to educate the community so that we can all talk about it with the same level of proficiency and onboard all the normies out there and tell them why cryptography is important.
Engaging Trivia and Competitions
So our fun way of doing this is kind of like some buzzer action, jeopardy. Style almost trivia questions every Sunday in the Holonim discord. And there are cash prizes associated with that. So if you'd like to take a drop or take a break from airdrop hunting and compete with your zero knowledge, not to be redundant there, you can go ahead and join our discord and yeah, give the trivia try. There's also some fun personalities in there and it gets pretty competitive.
Excitement about Community Initiatives
Hey, I love that. And it's a very catchy zero knowledge. I like that you said that for the suck wallet. You guys have a point program which also, like ties back to our previous topic about like on chain reputation. And that could be a great motivator for whether it's like seasoned airdrop farmers who are genuine about their intentions with their own identity or like onboarding normies, that's a very good idea. And like, this is also, like, my thoughts on, like, onboarding because if like, a real normie comes into the space and they see like, all these intimidating words like ZK proof or like even like airdrops, they're like, wait, what?
Simplifying Complex Concepts for New Users
Like on Apple iPhone when you share a photo, like, in terms of, like, normal normie onboarding, it could be great that it is great that you guys have, like, not only that education system, but also like a fun jeopardy. Style trivia where they have prizes. So yeah, like, shout out to your guys's discord. So for everyone, it's the discord on Holland ID. And from what I remember, it's every Sunday on the Holland discord. So yeah, everyone, please do check it out. And also, it's interesting that like, I am also personally revealing some alpha that has not been shared before for is that we are also like sign, we're also cooking something huge.
Open Source Initiatives for Community Engagement
And we, part of like, the fun marketing aspect is that we will have open source memes available so people could learn about sign as well as promote sign and how we're doing it. In a way that kind of also deters the malicious airdrop farming is that users in the very near future are able to make posts about sign and link their Twitter to one of our websites. And their own reach and their own quality of the content could be converted to points which will be rewarded upon in the future, in the relatively near future. So that's also like our way of kind of incentivizing the public, whether it's onboarding normies or getting the existing web three ecosystem hyped about us, is that we are doing something similar of letting them open source memes and letting them link their own Twitter, which like, in a way is almost like Kyc, but without, like revealing too much privacy and for their content quality to speak for themselves and also be rewarded.
Wrapping Up and Future Expectations
So, yeah, that's like a super secret alpha that hasn't been shared anywhere. But yeah, again, shout out to, like, everyone here. Thank you guys. I so much for your guys's insights and sharing all these information. Like, I personally am also learning a lot. And thank you guys so much for the audience for coming. And yeah, like, this has been very informative. So much alpha. And I personally and on behalf of everyone on sign, we are very excited to see what you guys are doing. And it's so great that we're all here and sharing and talking.
Conclusion and Future Engagement
So thank you guys so much. Thank you so much. No, right back at you. And if you guys get that social sentiment analysis points program going, you could definitely have that as a service for other dapps. I think we'd be interested in using it. So excellent work rewarding the users for all that stuff. Thank you so much for having us today. Of course, of course. And I will see you guys on your guys discord. Watch out for my jeopardy. Style. Promise. I don't know, but again, yeah. Thank you guys, everyone for coming and hope you guys have a great rest of your week.
Engagement in Future Events
And if you guys are in Singapore, check out our page. We'll have events and I'm looking forward to interacting more with you guys. Thank you guys for your time. Take care, everybody. I want to hear your best jokes next time. Yes, I will have that prepared. Love that you guys got that joke. All right, nice.