Cointime

Download App
iOS & Android

The Verifiable Web: Fixing the Internet’s Truth Problem

Validated Project

From Chainlink

In early civilizations, truth was based on myth. Observations of worldly phenomena were wrapped in symbolic narratives, religious beliefs, and ancient wisdom. Over time, humanity began to value objective measurements and reasoning, birthing disciplines such as science, mathematics, and logic. 

After the invention of the written word and, later, the printing press, books and documents captured the world’s information in written form, from academic literature and legal contracts to statistics and opinionated analysis. Then, in the twentieth century, phones, computers, and the Internet started a digital revolution in how information was created, distributed, and verified, with supercomputers now performing large-scale computations on complex data sets and billions of users across the globe generating, sharing, and talking about content every day in real-time.

Now, with a simple Internet connection, anyone in the world can instantly access a seemingly infinite flow of information. But while individuals are now empowered to consume and share more information than ever before, high-velocity, high-volume information scattered across a variety of applications poses extraordinary challenges: How can an everyday user make sense of such a vast, complex, and sometimes contradictory information landscape? Information warfare and advancements in AI are only compounding this problem.

Information is the basis for sound decision-making by humans, institutions, and systems, and we need a better foundation for obtaining and evaluating it. This new foundation starts by increasing people’s ability to verify the source of information, the method used to calculate it and the integrity of the systems used to do so, and the historical reputation of these sources, methods, and systems. Doing so will require the creation of a more advanced informational and digital age powered by cryptographic truth. We call this the verifiable web.

The evolution of truth.

What Is the Verifiable Web?

The Web Is Flawed

In the established web model, the Internet is shared networking infrastructure that enables communication between computers via online applications. Each online application handles its own computing (executing code), storage (storing code and data used and produced), and management (updating code and maintaining a successful business) by either running it in-house or outsourcing it to a centralized company. Users of applications are then responsible for establishing a connection to the Internet in order to interact with the online application, generally by paying for a data or Internet plan.

The problem with this model is it directly or indirectly gives centralized entities— whether it’s the application or Internet Service Provider (ISP)—extensive control over online data, computing, and/or networking. This means how the application works can be arbitrarily changed at any time—a social media company quietly changing its algorithm, for example. It also means that user data and connectivity can be arbitrarily censored, omitted, or monetized for personal gain, oftentimes with little user oversight or awareness of how it’s being done. As a result, the user has to trust the application and Internet infrastructure to act in a reliable and honest manner because they have no actual guarantees—just paper promises that take time and money to fight against in court if broken (assuming the user even has access to a high-integrity legal system).

With the web extending far beyond information-sharing applications to span financial transactions, health management, election systems, supply chain tracking, and more, fixing it means fixing the nature of almost every digital interaction the modern user has. The stakes couldn’t be higher.

A Verification Layer for the Internet

The verifiable web is not a replacement for the established web but rather an extension of its capabilities. The verifiable web provides applications with a decentralized, cryptographically secure, and verifiably fair environment for running computations, storing data, governing operations, and facilitating networking across systems. 

With some or all of an application’s backend infrastructure run on the verifiable web, users are able to obtain proof and guarantees about the application and its data, such as that it’s manipulation-resistant (secure), always available (reliable), permissionlessly accessible (censorship-resistant), logically sound (accurate), authenticated (genuine), private (privacy), and traceable from inception (provenance). 

Instead of requiring users to trust that an online application will keep its commitments, the verifiable web provides technologically enforced guarantees that users can independently check. 

By knowing how an application works and that it cannot arbitrarily change, users can make more informed decisions about whether or not to engage with it and whether to disengage at any point in the future. This is because the user is able to know its state at all times with near-complete certainty, including how it makes decisions, how rules are enforced, how data is generated, and what updates will be made.

The verifiable web provides verifiable guarantees instead of trust-based promises.

The verifiable web is underpinned by game-theoretical design—using the science of strategy to produce desired outcomes. The verifiable web combines various technologies to create game-theoretical environments where rational participants are incentivized to produce fair outcomes (i.e., it’s deterministic), even in the presence of adversaries. Furthermore, users can inspect these environments to check if they meet their own standards of trust and fairness. In contrast, the established web relies on trust in probabilistic and unverifiable promises made by the centralized entity that owns the application or runs its backend infrastructure.

For example, central banks manage monetary policy based on subjective assessments while banks manage payment ledgers with relative opaqueness. While there are various reasons for doing so, it is a less predictable process that can create systemic risk. Alternatively, Bitcoin uses a game-theoretical design to incentivize a decentralized network of nodes to manage monetary policy and maintain a payment ledger according to a publicly available set of rules enshrined in the software that nodes on the network run. This provides users with verifiable proof about how the ledger is managed and how difficult it is to tamper with the ledger and alter the monetary policy, ultimately creating more predictable risk management.

The verifiable web moves society away from probabilistic promises and toward guaranteed contracts.

Why Do We Need the Verifiable Web?

The verifiable web is what crypto is really about—it starts with fixing money and financial markets, before expanding into other industries to bring greater proof and transparency to the digital interactions that determine our lives. If trust in institutions continues to decrease, demand for technologies that provide verifiable proof about the world will only increase. Some of the areas of growing distrust that the verifiable web can help to improve include:

Cryptographic guarantees restore trust in systems.

Financial Markets and Services

Financial markets have historically been subject to boom and bust cycles as a result of mispriced asset valuations and resulting systemic risk due to their cross-dependencies. People want better guarantees that financial markets and assets are as healthy as the official reports state, and that financial services will be honored as agreed upon. The verifiable web can be an important tool in providing a golden record across market infrastructure or forcing timely and in-full financial payments, ultimately creating more stability and reducing systemic risk.

Images and Videos

With the acceleration of AI, it’s becoming harder to distinguish between real and fake images and videos. The spread of fake content is leading to the proliferation of false narratives in society, and, as a side effect, increased skepticism in legitimate sources. The verifiable web can play a key role in authenticating the source of images and videos, such as a camera cryptographically signing a photo/video with a unique private key from an HSM hardware module and then hashing a copy onchain as a tamperproof record of who took the photo/video and when it was taken.

Information and Analysis

The acceleration of AI and information warfare has also made it hard to filter misinformation and disinformation and decide who to turn to for unbiased analysis. The verifiable web can not only help create a single, globally accessible source of truth about the origin of information, but it can also help establish methods for verifying the track record of news sources and analysts over time and incentivize sound research and analysis. 

The public has lost trust in news and information sources.

Food and Goods

As society has become more educated, it has also become more interested in the source and quality of food and goods. However, it can be difficult to verify the true origin of a good or that it’s authentic, hasn’t been diluted, and is backed by a manufacturer with a reliable track record. The verifiable web can help users track and rate food and goods from inception to the storefront with more certainty.

Contracts and Legal Systems

Having verifiable proof that a contract will be honored is critical to running a reliable business or purchasing a product (e.g., warranties). Unfortunately, contracts are not always strictly enforced, especially when one side has a clear economic and political advantage over their counterparty. The verifiable web can level the playing field by replacing clauses in digital contracts with technologically enforced guarantees via smart contracts and oracle networks. This can help improve trust between people, businesses, and institutions globally, particularly by making the levers that can dictate the outcome of contracts impossible for any party to tamper with.

Social Participation and Consensus

Obtaining a realistic view of what the public thinks helps institutions and society at large make better decisions. AI, bot farms, and closed-source algorithms make it hard to know whether social consensus derived from online debates, surveys, elections, viewership, and more is real or manipulated. Thus, it’s important for the verifiable web to bring authentication and verifiability to how social consensus is created and gathered, such as by open-sourcing algorithms used in information collection and leveraging manipulation-resistant and privacy-preserving verification systems to prove someone is a unique human without revealing their identity.

Technologies That Define How the Verifiable Web Works

Below is a list of technologies/technological movements that combine to create the verifiable web. New technologies are also likely to emerge as consumers demand more and more verifiable proof and guarantees about their everyday lives.

Open-Source Software

Open-source software is software for which the code that defines how it runs is verifiable by anyone. This allows stakeholders using or affected by the software to inspect it before deciding to adopt or update it. As more people independently verify it, the software becomes more secure and trusted to consistently operate in a specific way. 

Examples: Linux Operating System, Mozilla Firefox, and Apache Web Server

Cryptography

Cryptography involves the use of verifiable mathematical techniques to secure communication in the presence of adversarial behavior. In a general sense, cryptography is used to conceal and authenticate information by scrambling it with a cipher, which cannot be cracked in any practical sense (e.g., it would require a prohibitive amount of time and investment), even with the most advanced computing technologies. Cryptography is already widely used across the modern Internet to ensure that users are able to interact with each other without worrying about imposters or middlemen intercepting their communications.

Examples: One-Way Hash Functions, Public/Private Key Encryption, and Zero-Knowledge Proofs

Blockchains and Smart Contracts

Blockchains are distributed ledgers that provide verifiable proof that the tracking of asset ownership is accurate and tamperproof, and that the ability to move assets between users is permissionless and always available. Furthermore, the smart contract applications running on blockchains provide verifiable proof that their code will execute exactly as it is stored onchain. This enables businesses to transact and governance processes to be managed in a distributed manner that is transparent and resistant to manipulation by a single entity.

Blockchains make use of a multitude of technological primitives, most notably cryptography, consensus protocols, and financial incentives. As an overview, blockchains use financial rewards and penalties to incentivize a decentralized network of independent nodes to come to an honest consensus about the validity of submitted transactions and to keep the ledger updated and available. Blockchains also use cryptography to authenticate transactions, ensuring they are unique to a specific user. The combination of cryptography and decentralized consensus makes it very difficult to tamper with the network, resulting in a form of cryptographic truth.

Examples: Bitcoin, Aave, and ENS

Cryptographic truth enables deterministic computing—applications that execute exactly as their code dictates—and golden records—a single source of reliable truth outside of the direct control of any one stakeholder.

Oracles

Oracles leverage similar primitives of cryptography, consensus protocols, and financial incentives, but for the purpose of creating cryptographic truth around any type of data, computation, or connection between systems. Whereas blockchains are only concerned with verifying the ownership and transfer of tokens or updating smart contracts, oracles can be applied to creating truth and guarantees about anything, such as calculating the fair price of an asset, generating a tamperproof and unbiased random number, or ensuring that an automated task will be completed at a specific time or that value will be securely transferred between systems when a specific event occurs. Oracles can expand cryptographic truth to the verification of almost anything.

Examples: Chainlink Data StreamsFunctions, and Cross-Chain Interoperability Protocol (CCIP)

Trusted Hardware

Trusted hardware is hardware where the software running inside cannot be tampered with or even observed by either a third party or the hardware operator. Trusted execution environments (TEEs) often generate cryptographic attestations, which give users verifiable proof that the software running inside executed exactly as expected. Although the area still requires more research and development, trusted hardware is an extension of other types of hardware like secure enclaves and hardware security modules (HSMs), which provide a protected environment for storing information or executing code.

Examples: Intel SGX, ARM TrustZone, and Keystone

Biometrics

Authenticating that information came from a specific person or company is critical proof for facilitating certain processes. Biometrics provide a way of authenticating that an action was taken by a specific person by verifying a physical feature unique to them. For example, phones use a person’s fingerprint as verifiable proof that they belong to the owner.

Examples: Fingerprint, Iris Recognition, Facial Recognition

Reputation Systems

While truths or proofs may not always be obtainable in real-time, they can be demonstrated over time through the use of reputation systems. Reputation systems are methods of tracking the historical performance of an entity or process, such as a system’s uptime, the accuracy of a data provider, the correctness of an analyst’s predictions, or the reliability of a user in a help forum. The integrity of reputation systems is further verifiable when they cryptographically sign data that they’re tracking onchain, where it cannot be deleted or altered in the future.

Examples: eBay, Stack Exchange, and Ethereum Beacon Chain Validator Rankings

Artificial Intelligence

As machine learning algorithms and data collection techniques become more advanced, so too does the ability to analyze complex datasets and come to conclusions with a statistically high degree of confidence. 

One example of this is a project in development by Green World called AIRS, which aims to use satellite remote sensing data with smart contracts to successfully reward stewards of targeted regenerative agriculture. Chainlink oracles are tasked with gathering ground-truthing and satellite data, analyzing it within trusted execution environments for high-trust quantitative metrics, and relaying it to a blockchain to trigger automated payments to stewards. AIRS rewards to stakeholders can take the form of cryptocurrency—readily convertible into local currency—or digital financial instruments tailored to meet the needs of local communities.

A Trust Anchor for Society

The verifiable web is a much-needed trust anchor for society, whereby vulnerable human decision-making is replaced by unbiased software that enforces honest outcomes and provides verifiable proof of how it arrived at such outcomes. This new superpower enables builders to create applications that are undeniably fair, provably accessible to anyone in the world, and verifiably secure against manipulation. The possibilities are endless, and this paradigm shift couldn’t come at a more pressing time, with society needing verifiable truth about how the world works more than ever.

Comments

All Comments

Recommended for you

  • Bitcoin native application platform Arch developer completes $7 million seed round of financing, led by Multicoin Capital

    Bitcoin native application platform Arch developer Arch Labs announced the completion of a $7 million seed round of financing, led by Multicoin Capital, with participation from Portal Ventures, OKX Ventures, Big Brain Holdings, CMS Holdings and Tangent.

  • Tokenization platform AgriDex completes $5 million Pre-Seed round of financing

    AgriDex, a tokenization platform on the Solana blockchain, announced the completion of a $5 million Pre-Seed round of financing, led by Endeavor Ventures, with participation from African Crops Limited, Oldenburg Vineyards, and former Goldman Sachs and Citadel executive, Hank Oberoi. It is reported that AgriDex is expected to launch its platform and token, AGRI, in the third quarter of this year. According to its white paper, AgriDex has reserved 5% of the total token supply, or 50 million tokens out of 1 billion tokens, for airdrops.

  • UXUY Completes $7 Million Pre-A Round of Financing, with Investments from Binance Labs, Bitcoin Magazine, and Other Institutions

    UXUY, the next-generation decentralized multi-chain trading platform incubated by Binance Labs, announced the completion of a $7 million Pre-A round of financing. Since its establishment, its total financing amount has exceeded $10 million. UXUY is an important builder of the Bitcoin ecosystem, and more than 100,000 traders use Bitcoin Lightning Network services through UXUY. UXUY's current round of financing has received investment from well-known institutions in Asia, North America, and Europe, such as Binance Labs, UTXO Management (Bitcoin Magazine), JDI Ventures, Bixin Ventures, SWC Global, Matrix Partners, CMS Holdings, Dewhales Capital, Comma3 Ventures, Satoshi Labs, YBB Capital, GBV Capital, Web3Vision, Pentos Ventures, NGC Ventures, Alti5, Metalpha, and GSR. The funds raised by UXUY in this round will be used for the construction of the Bitcoin ecosystem infrastructure, and will be committed to promoting the efficient and low-cost trading of Lightning Network Taproot Assets, Ordinals BRC-20, Runes, and other assets. Jordan, co-founder of UXUY, said: "We are pleased to be strategic partners with all investors! This year, we have successfully built a bridge between the Bitcoin Lightning Network and the multi-chain ecosystem. UXUY will continue to promote the use cases and popularization of the Lightning Network in trading scenarios, and make more contributions to the Bitcoin ecosystem." According to RootData, a Web3 asset data platform, UXUY is a next-generation decentralized multi-chain trading platform based on MPC wallets. UXUY actively participates in the construction of the Bitcoin Layer2 ecosystem, fully integrates into the Bitcoin Lightning Network and Taproot ecosystem, provides Lightning Address DID services to users, and becomes an important bridge connecting the Bitcoin and Ethereum ecosystems. As a decentralized multi-chain trading platform, UXUY provides immediate cross-chain trading services for Coin, Token, and Inscription among public chains through the establishment of uPool.

  • Taiwan's administrative agency passed four new anti-fraud laws to bring cryptocurrency traders under control

    It was announced that Taiwan's administrative management agency has passed the "New Anti-Fraud Law" to regulate cryptocurrency traders. In the future, businesses or individuals providing virtual asset services or third-party payment services must complete anti-money laundering measures and register their services or log in. Failure to do so may result in a maximum of 2 years in prison or a fine of up to NT$5 million. Businesses or individuals outside of Taiwan providing virtual asset or third-party payment services must register their companies or branches according to company law and complete anti-money laundering measures and service registration or login. Otherwise, they are not allowed to provide virtual asset services or third-party payment services in Taiwan. Qiu Shuzhen, the deputy chairman of Taiwan's financial regulatory agency, stated that there are currently around 60 to 70 cryptocurrency traders in the market, of which 25 have passed the anti-money laundering review by the financial regulatory agency. In the future, all traders will be required to declare and undergo review, and a cryptocurrency traders' association will be established for legal, administrative, and association management. Accounting professionals will also be enlisted to assist with internal control.

  • EigenLayer TVL falls back to $14.794 billion

    According to DefiLlama data, the total value locked (TVL) in Ethereum's re-staking protocol EigenLayer has fallen below $15 billion, currently at $14.794 billion.

  • The EU is considering including cryptocurrencies in the 12 trillion euro investment market, and its impact may far exceed that of US ETFs

    The European Securities and Markets Authority (ESMA) is consulting with the investment product advisory industry and experts on whether cryptocurrency assets should be included. This move could open up a broader market for cryptocurrencies, far exceeding the market size of spot Bitcoin ETFs. The plan aims to expand the scope of UCITS (EU Transferable Securities Collective Investment Scheme), with the UCITS market reaching as high as €12 trillion. If successful, this would be a key step in mainstreaming cryptocurrency assets in Europe.

  • SlowMist: The hacker who stole 1,155 WBTC may be from Hong Kong

    According to SlowMist analysis , the IP address associated with the theft of 1155 WBTC has been traced to Hong Kong (VPN use cannot be ruled out). Earlier reports indicated that a certain address was suspected to be a victim of phishing attacks and lost 1155 WBTC, worth 71 million USD. Subsequently, the fraudsters sold all 1155 WBTC and exchanged them for 22960 ETH, and used a large number of wallet addresses to send and launder the funds.

  • Web3 game developer Seeds Labs completes $12 million seed round of financing, with participation from Solana Foundation and others

    According to Cointelegraph, Web3 game developer Seeds Labs has announced the completion of a $12 million seed round financing, with participation from Avalanche's Blizzard Fund, Solana Foundation, Krust, Hashkey Capital, UOB Ventures, Signum Capital, IVC, and Emoote.It is reported that Seeds Labs, a Solana ecosystem game infrastructure developer, was established in 2021, and its Web3 game Bladerite is scheduled to be released this month.

  • The total subscription volume of Hong Kong Bitcoin ETF yesterday was 101.6, and the Ethereum ETF showed net redemption for two consecutive days

    The Hong Kong Bitcoin spot ETF had a net purchase of 101.6 bitcoins and a total holding of 4350 bitcoins on May 8th. The daily trading volume was 2.67 million US dollars, and the total net assets were 270 million US dollars. The daily BTC purchase came from Bosera HashKey and Huaxia Bitcoin ETF.

  • Trump announces he will accept cryptocurrency donations for his presidential campaign

    Donald Trump announced that he is accepting cryptocurrency as a form of donation for his presidential campaign.