Decentralized Technologies
Last updated
Last updated
Technologies that leverage Web 3.0's decentralized computing, decentralized storage, and decentralized privacy protection enable:
Platform open, no need to migrate user data (island → open)
On-chain storage, users can get richer information (closed → shared)
Encryption algorithm to improve privacy security (leakage/loss/tampering → security)
In Makalink, users' identity attributes will become richer, personal influence is more valuable, and it is equally effective in various social platforms. Makalink highlights the social influence of individuals, promotes the development of personal interests, and liberates the enthusiasm of each participant in production. In addition, Makalink can verify the user's identity, and has more application scenarios in the DeFi field, such as decentralized credit. Makalink tries to build the three-tier underlying infrastructure for Web 3.0 SocialFi in the future
Decentralized computing
Traditional centralized data processing frameworks are vulnerable to single points of failure, security risks, and privacy intrusions. Blockchain is considered to be a new decentralized computing framework, there is no central entity, all nodes are equivalent participants, and jointly maintain the consistency of transactions through a consensus mechanism, essentially allowing unlimited computing nodes to join the blockchain system, so the blockchain can gather massive computing resources. In the underlying blockchain of Web 3.0 SocialFi, both Deso, a L1 public chain dedicated to SocialFi services, and Subsocial, a parallel chain designed for social networks (Layer 1 chain in the Kusama ecosystem), are the underlying facilities. They are able to handle the storage and indexing requirements of social applications at scale compared to general-purpose blockchains.
Decentralized storage
Given the high cost of on-chain storage, the storage solution for Web 3.0 SocialFi is usually off-chain distributed storage. Distributed storage technology distributes user data on distributed servers to ensure that the data will not be controlled by a centralized organization, which can effectively prevent user data from being tampered with, protect data originality, avoid large-scale data loss, and greatly reduce the hosting cost of centralized platforms. Based on the economic model, nodes can also generate other income; Common solutions are IPFS, Swarm and Arweave:
IPFS is a distributed peer-to-peer hypermedia protocol with an incentive layer called Filecoin, through which nodes around the world can store and retrieve this data. Swarm is also a similar decentralized storage network, with the difference from Filecoin that Swarm's incentive system is built in, executed through smart contracts on the Ethereum blockchain, for storing and retrieving data. Arweave takes a different path: it promises permanent storage, that is, pay once, access forever.
Decentralized Privacy protection
We can use zero-knowledge proof, such as the "non-disclosure of information" feature of the zk-SNARK protocol, to prove that the transaction on the chain is valid without disclosing the details of the transaction (receiver, sender, transaction balance), and realize the secure and private transfer between two anonymous users on the premise of keeping the social identity and transaction amount confidential.
DID (Decentralized Identifier) : allows users to control their data, protecting their privacy and ultimately ensuring their freedom through an open, censor-resistant network. Users own their personal data and can carry it across different decentralized applications.