Your reliable DID infrastructure layer for all social dApps to build upon. We connect your Web2 & Web3 identities.

DID 是钱包吗?聊聊 Web3 身份迷思
最近 DID(decentralized identity,去中心化身份)话题特别火,融资新闻也一个接一个。关于 DID 这个概念要如何理清却颇有争议,尽管处于这样的发展早期,很多理念并未完全明晰,不过对于一些已经出现的比较明显的困惑,我们有必要罗列出来,一起尝试看看,拨开 Web3 身份的技术迷雾。Next.ID 社区希望通过系列文章邀请大家讨论:用户到底需要什么样的 DID,或者说什么样的 DID 体系;Web2 的用户迁往 Web3 面临着什么样的迁移成本;Web3 DID 能给用户带来什么在 Web2 中无法获得的东西。MetaMask 钱包是 DID?据不完全披露,钱包领头羊 MetaMask 目前的月活用户数,起码是 3 千万以上的级别。这导致了大部分的 dApp,很自然的希望通过 MetaMask 来做身份层。而这个想法显然有非常多的挑战,毕竟 MetaMask 只是想做一个钱包而已。 先不论 MetaMask 有没有动机和动力,愿意维护这样海量级别的公共 API 来给 dApp 调用。一个始终绕不过去的,横亘在用户面前的大难题是:作为 EOA 类(external...

回顾|DID 是钱包吗?探讨 SBT 接入场景、开发者和用户为啥买账 — Next.ID Twitter Space 02
Next.ID 于 2022 年 9 月 8 日晚 8 点开展了项目的第二次 Twitter Space,本次活动由 Next.ID 主办,Web3Go Labs 协办,邀请了来自 HashKey Capital 的 JZ,王建硕,SBT 研究员夏禾,LXDAO 核心成员 Bruce 作为嘉宾。 节目中,嘉宾们共同探讨、分享了:对于 DID(去中心化身份,decentralized identity)以及 SBT(灵魂绑定通证,soul-bound token)的理解、它们之间的关系,已经看到哪些在赛道上构建比较实际的案例或者认可的方向,DID 与 SBT 落地过程中碰到的难题等。 在哔哩哔哩上收听回放:https://www.bilibili.com/video/BV1WW4y1B7U4目前你对 DID 是怎么理解的?DID 已有应用场景有哪些?是否已有成熟 App 可以使用、体验?LXDAO Bruce:DID 首先是 ID,ID 在现实世界可以类比:身份证、学生证等,虚拟世界有推特、微博账号等。DID 则是去中心化的 ID,没有签发、管理的机构,不会有被删除、封号的风险。现...

DID 是钱包吗?聊聊 Web3 身份迷思
最近 DID(decentralized identity,去中心化身份)话题特别火,融资新闻也一个接一个。关于 DID 这个概念要如何理清却颇有争议,尽管处于这样的发展早期,很多理念并未完全明晰,不过对于一些已经出现的比较明显的困惑,我们有必要罗列出来,一起尝试看看,拨开 Web3 身份的技术迷雾。Next.ID 社区希望通过系列文章邀请大家讨论:用户到底需要什么样的 DID,或者说什么样的 DID 体系;Web2 的用户迁往 Web3 面临着什么样的迁移成本;Web3 DID 能给用户带来什么在 Web2 中无法获得的东西。MetaMask 钱包是 DID?据不完全披露,钱包领头羊 MetaMask 目前的月活用户数,起码是 3 千万以上的级别。这导致了大部分的 dApp,很自然的希望通过 MetaMask 来做身份层。而这个想法显然有非常多的挑战,毕竟 MetaMask 只是想做一个钱包而已。 先不论 MetaMask 有没有动机和动力,愿意维护这样海量级别的公共 API 来给 dApp 调用。一个始终绕不过去的,横亘在用户面前的大难题是:作为 EOA 类(external...

回顾|DID 是钱包吗?探讨 SBT 接入场景、开发者和用户为啥买账 — Next.ID Twitter Space 02
Next.ID 于 2022 年 9 月 8 日晚 8 点开展了项目的第二次 Twitter Space,本次活动由 Next.ID 主办,Web3Go Labs 协办,邀请了来自 HashKey Capital 的 JZ,王建硕,SBT 研究员夏禾,LXDAO 核心成员 Bruce 作为嘉宾。 节目中,嘉宾们共同探讨、分享了:对于 DID(去中心化身份,decentralized identity)以及 SBT(灵魂绑定通证,soul-bound token)的理解、它们之间的关系,已经看到哪些在赛道上构建比较实际的案例或者认可的方向,DID 与 SBT 落地过程中碰到的难题等。 在哔哩哔哩上收听回放:https://www.bilibili.com/video/BV1WW4y1B7U4目前你对 DID 是怎么理解的?DID 已有应用场景有哪些?是否已有成熟 App 可以使用、体验?LXDAO Bruce:DID 首先是 ID,ID 在现实世界可以类比:身份证、学生证等,虚拟世界有推特、微博账号等。DID 则是去中心化的 ID,没有签发、管理的机构,不会有被删除、封号的风险。现...
Your reliable DID infrastructure layer for all social dApps to build upon. We connect your Web2 & Web3 identities.

Subscribe to Next.ID

Subscribe to Next.ID
Share Dialog
Share Dialog
<100 subscribers
<100 subscribers


We identify in many ways: our races, our nationalities, our genders, and our favorite sports teams. Being able to articulate our identities helps us create 1) a sense of self, complete with goals and hopes, and 2) a sense of community, where we co-exist with like-minded people.
As technology advances, we find new ways to self-identify.
Take for example the NFT boom in 2021. It allowed entire clusters of people to identify as all sorts of cartoon animals and even aliens online. While we’re not going to get into how NFTs work, suffice to say that groups of people who had NFTs from the same collections found commonality with each other, strengthening their bonds.
Over time, as our digital identities evolve to be more similar to our real-life ones, it is important to discuss — beyond NFTs — how identity may evolve on digital platforms.

Digital identity has evolved over the past two decades and it consists of 3 phases:
Current
If you’re above 25, there’s a chance you’ve had experience with the first 2 phases.
★ Siloed Identity — Users create an account for every platform used, managing multiple usernames and passwords for each site.
Eg Neopets, Hotmail
★ Federated Identity — Users create an account with centralized providers that give them access to multiple sites, trusting the providers with their data.
Eg Google, Apple ID
Future
We are now at the cusp of an identity revolution, with the introduction of a new form of digital identity: the DID.
★ Decentralized Identity (DID) — Users create and own an account that has access to multiple sites, maintaining full ownership of all data.
Eg Next.ID
Having a Digital Identity on the internet today means having to deal with a few recurring issues, some technical and some behavioral. We’ll delve into them in this section.
Censorship and sale of data without consent

Centralized organizations currently dominate the internet. Personal data is commercialized and placed into the hands of third parties who can do anything they want with it. This leads directly to the first problem: the censorship and sale of user data.
We use the internet to catch up with close ones, for work, and to stay up to date with current affairs. How we do this is by signing up with centralized services, clicking through their indecipherable terms and conditions, then “renting” their bandwidth to interact with others online.
It is “normal” at this stage to consent to giving our data away without a second thought, giving tech titans like Google and Facebook a final say over our digital footprints. As a result, our data is sold to third parties, any statements we make can be censored without cause, and our online profiles can disappear overnight.
Identity Ownership and Privacy
How would you feel if someone could walk into your home at any time of the day, peer over your shoulder as you do your daily activities, then broadcast this information to anyone they wanted to?
That’s effectively what centralized platforms can do today, given how intrusive their terms and conditions are. Your private messages with a lover? It belongs to them. That post you wrote that unexpectedly went viral? It belongs to them. How often do you log in and at what times? Even this data, which you may not be privy to, belongs to them.
The relationship is extremely one-directional — they see and hear all we do. And in extreme cases, they’ve reportedly even used this data to shape political opinions at the behest of politicians — even during election seasons.
Data security
Having user digital identities and data stored in centralized servers is a ticking time bomb. We’ve seen this in multiple hacks across the years, ranging from the probable to the improbable. Banks have been hacked. Tech giants have been hacked. Even government institutions have been hacked.
User data is quite possibly the single most valuable commodity in the world today. With the right amount of data, analysts can predict and possibly even initiate global and local trends. And yet, when centralized platforms succumb to hacks, there’s little they do other than apologize and — if we’re lucky — get a small slap on the wrists by relevant government regulators.
Not all hope is lost. In recent years, breakthroughs have been made in blockchain technology. The issues above are fixable using blockchain, cryptography, and decentralized networks. Here’s how:
Blockchains allow all users to own — not rent — their space
In Web3, Digital Identities are created and stored on blockchains. Blockchains are decentralized networks maintained by multiple validator nodes (i.e. computers) that run 24/7. While platforms in Web2 run and maintain their networks, blockchains operate on a different incentive structure.
When blockchain users interact with the chain or any decentralized apps (dApps) that are built on-chain, they’re not required to “sign up”. They simply generate a private wallet using cryptography*, allowing the user and only the user access to the account. Using this account, users have permissionless access and are able to interact with anyone or any dApp they want to. This means that there’s no centralized entity that can censor your data, just as no centralized entity that can sell your data.
It is a new paradigm of freedom online.
*It sounds difficult, but dApps like MetaMask and WalletConnect simplify it for beginners.
Identity ownership given back to users
Having our Digital Identities stored on blockchains means that all our activities cannot be tampered with. When an interaction is performed by a user, we know for a fact that the user was the one who did it.
The moment you have an on-chain wallet, your identity is sovereign. This means you control everything that you do — 100%. You cannot be compelled to perform a transaction you don’t want to and there are no mechanics in place that allows a third party to force you to do anything against your will. This means that even in the extreme case of having the world’s governments and tech giants wanting you to do something, you still hold the ability to say no.
There are downsides to this though. For one, you assume full responsibility for everything you do. This means you’ll have to keep your keyphrase (and password) secure because the moment a third party gets their hands on it, your identity is compromised.

Having our Digital Identities stored on blockchains means that all our activities cannot be tampered with. When an interaction is performed by a user, we know for a fact that the user was the one who did it.
The moment you have an on-chain wallet, your identity is sovereign. This means you control everything that you do — 100%. You cannot be compelled to perform a transaction you don’t want to and there are no mechanics in place that allows a third party to force you to do anything against your will. This means that even in the extreme case of having the world’s governments and tech giants wanting you to do something, you still hold the ability to say no.
There are downsides to this though. For one, you assume full responsibility for everything you do. This means you’ll have to keep your keyphrase (and password) secure because the moment a third party gets their hands on it, your identity is compromised.
Decentralized nodes are almost impossible to hack
With multiple nodes running the blockchains, any malicious actor who wants to “hack” the system needs to take over >50% of the nodes. The difficulty of this varies from chain to chain, as some blockchains have hundreds of nodes, while others have fewer. Still, this is much harder than simply looking for a vulnerability in one centralized system.
Because of this, there is a drastically less likelihood of external hacks that lead to data compromise. Plus, blockchains are secured by the highest possible level of security: cryptographic signatures.
Next.ID
Next.ID is the world’s 1st DIaaS (Decentralized Identity As A Service) that connects and aggregates Web2 and Web3 accounts and addresses, allowing users to connect their Facebook and Twitter accounts to their Ethereum and SwapChat accounts.
Lens Protocol
Lens Protocol is an infrastructure layer that uses social graphs to connect users — think of Twitter on Web3. Built by Aave, one of the OG DeFi teams, it builds out one possible way Web3 social can take shape, using NFTs as a base.
Proof of Humanity
Proof of Humanity is a social identity verification system for users on Ethereum. It aims to solve one of the biggest problems plaguing the internet ever: bots. It does this by creating a verified network of human beings, using referrals and video proof to establish their credibility.
We identify in many ways: our races, our nationalities, our genders, and our favorite sports teams. Being able to articulate our identities helps us create 1) a sense of self, complete with goals and hopes, and 2) a sense of community, where we co-exist with like-minded people.
As technology advances, we find new ways to self-identify.
Take for example the NFT boom in 2021. It allowed entire clusters of people to identify as all sorts of cartoon animals and even aliens online. While we’re not going to get into how NFTs work, suffice to say that groups of people who had NFTs from the same collections found commonality with each other, strengthening their bonds.
Over time, as our digital identities evolve to be more similar to our real-life ones, it is important to discuss — beyond NFTs — how identity may evolve on digital platforms.

Digital identity has evolved over the past two decades and it consists of 3 phases:
Current
If you’re above 25, there’s a chance you’ve had experience with the first 2 phases.
★ Siloed Identity — Users create an account for every platform used, managing multiple usernames and passwords for each site.
Eg Neopets, Hotmail
★ Federated Identity — Users create an account with centralized providers that give them access to multiple sites, trusting the providers with their data.
Eg Google, Apple ID
Future
We are now at the cusp of an identity revolution, with the introduction of a new form of digital identity: the DID.
★ Decentralized Identity (DID) — Users create and own an account that has access to multiple sites, maintaining full ownership of all data.
Eg Next.ID
Having a Digital Identity on the internet today means having to deal with a few recurring issues, some technical and some behavioral. We’ll delve into them in this section.
Censorship and sale of data without consent

Centralized organizations currently dominate the internet. Personal data is commercialized and placed into the hands of third parties who can do anything they want with it. This leads directly to the first problem: the censorship and sale of user data.
We use the internet to catch up with close ones, for work, and to stay up to date with current affairs. How we do this is by signing up with centralized services, clicking through their indecipherable terms and conditions, then “renting” their bandwidth to interact with others online.
It is “normal” at this stage to consent to giving our data away without a second thought, giving tech titans like Google and Facebook a final say over our digital footprints. As a result, our data is sold to third parties, any statements we make can be censored without cause, and our online profiles can disappear overnight.
Identity Ownership and Privacy
How would you feel if someone could walk into your home at any time of the day, peer over your shoulder as you do your daily activities, then broadcast this information to anyone they wanted to?
That’s effectively what centralized platforms can do today, given how intrusive their terms and conditions are. Your private messages with a lover? It belongs to them. That post you wrote that unexpectedly went viral? It belongs to them. How often do you log in and at what times? Even this data, which you may not be privy to, belongs to them.
The relationship is extremely one-directional — they see and hear all we do. And in extreme cases, they’ve reportedly even used this data to shape political opinions at the behest of politicians — even during election seasons.
Data security
Having user digital identities and data stored in centralized servers is a ticking time bomb. We’ve seen this in multiple hacks across the years, ranging from the probable to the improbable. Banks have been hacked. Tech giants have been hacked. Even government institutions have been hacked.
User data is quite possibly the single most valuable commodity in the world today. With the right amount of data, analysts can predict and possibly even initiate global and local trends. And yet, when centralized platforms succumb to hacks, there’s little they do other than apologize and — if we’re lucky — get a small slap on the wrists by relevant government regulators.
Not all hope is lost. In recent years, breakthroughs have been made in blockchain technology. The issues above are fixable using blockchain, cryptography, and decentralized networks. Here’s how:
Blockchains allow all users to own — not rent — their space
In Web3, Digital Identities are created and stored on blockchains. Blockchains are decentralized networks maintained by multiple validator nodes (i.e. computers) that run 24/7. While platforms in Web2 run and maintain their networks, blockchains operate on a different incentive structure.
When blockchain users interact with the chain or any decentralized apps (dApps) that are built on-chain, they’re not required to “sign up”. They simply generate a private wallet using cryptography*, allowing the user and only the user access to the account. Using this account, users have permissionless access and are able to interact with anyone or any dApp they want to. This means that there’s no centralized entity that can censor your data, just as no centralized entity that can sell your data.
It is a new paradigm of freedom online.
*It sounds difficult, but dApps like MetaMask and WalletConnect simplify it for beginners.
Identity ownership given back to users
Having our Digital Identities stored on blockchains means that all our activities cannot be tampered with. When an interaction is performed by a user, we know for a fact that the user was the one who did it.
The moment you have an on-chain wallet, your identity is sovereign. This means you control everything that you do — 100%. You cannot be compelled to perform a transaction you don’t want to and there are no mechanics in place that allows a third party to force you to do anything against your will. This means that even in the extreme case of having the world’s governments and tech giants wanting you to do something, you still hold the ability to say no.
There are downsides to this though. For one, you assume full responsibility for everything you do. This means you’ll have to keep your keyphrase (and password) secure because the moment a third party gets their hands on it, your identity is compromised.

Having our Digital Identities stored on blockchains means that all our activities cannot be tampered with. When an interaction is performed by a user, we know for a fact that the user was the one who did it.
The moment you have an on-chain wallet, your identity is sovereign. This means you control everything that you do — 100%. You cannot be compelled to perform a transaction you don’t want to and there are no mechanics in place that allows a third party to force you to do anything against your will. This means that even in the extreme case of having the world’s governments and tech giants wanting you to do something, you still hold the ability to say no.
There are downsides to this though. For one, you assume full responsibility for everything you do. This means you’ll have to keep your keyphrase (and password) secure because the moment a third party gets their hands on it, your identity is compromised.
Decentralized nodes are almost impossible to hack
With multiple nodes running the blockchains, any malicious actor who wants to “hack” the system needs to take over >50% of the nodes. The difficulty of this varies from chain to chain, as some blockchains have hundreds of nodes, while others have fewer. Still, this is much harder than simply looking for a vulnerability in one centralized system.
Because of this, there is a drastically less likelihood of external hacks that lead to data compromise. Plus, blockchains are secured by the highest possible level of security: cryptographic signatures.
Next.ID
Next.ID is the world’s 1st DIaaS (Decentralized Identity As A Service) that connects and aggregates Web2 and Web3 accounts and addresses, allowing users to connect their Facebook and Twitter accounts to their Ethereum and SwapChat accounts.
Lens Protocol
Lens Protocol is an infrastructure layer that uses social graphs to connect users — think of Twitter on Web3. Built by Aave, one of the OG DeFi teams, it builds out one possible way Web3 social can take shape, using NFTs as a base.
Proof of Humanity
Proof of Humanity is a social identity verification system for users on Ethereum. It aims to solve one of the biggest problems plaguing the internet ever: bots. It does this by creating a verified network of human beings, using referrals and video proof to establish their credibility.
No activity yet