Bitcoin News and Finance Blockchain-Based Re-Usable KYC ‘Particularly Valuable in Web3’ — Cheqd CEO Fraser Edward Skip to main content

Blockchain-Based Re-Usable KYC ‘Particularly Valuable in Web3’ — Cheqd CEO Fraser Edward

Blockchain-Based Re-Usable KYC 'Particularly Valuable in Web3' — Cheqd CEO Fraser Edward

According to Fraser Edward, the CEO and co-founder of the public permissionless network, Cheqd, one of the main hurdles faced when attempting to move data stored on Web2 servers to Web3 is “establishing a clear and scalable revenue model.” Edward however suggested overcoming this hurdle will unlock new use cases which facilitate economic activities within the Web3 ecosystem will be unlocked.

The Trusted Data Market

The Cheqd co-founder also told Bitcoin.com News that in today’s data-driven world, greater emphasis is now being placed on obtaining accurate and verified data. This shift in value from what Edward labeled generic data to trusted data is evidenced by users’ demand for data that is portable and cryptographically verifiable. According to Edward, it is this demand for assured data that has given rise to what is now known as the “trusted data market.”

Meanwhile, in the rest of his responses to questions from Bitcoin.com News, the Cheqd CEO touched on the so-called “bot paranoia” and how a decentralized reputation system can be used to combat bots and impersonators. The CEO also offered his thoughts on blockchain-based re-usable KYCs as well as how these can be used in the real world.

Below are Edward’s answers to questions sent to him via Telegram.

Bitcoin.com News (BCN): What is a Trusted Data Market and what problem does it solve for businesses and individuals?

Fraser Edward (FE): In today’s data-driven world, trust and assurance in data are critical, especially considering the increasing volume of data, the emergence of advanced language models like ChatGPT, and the rising volume of fraud. This shift in value from generic data to “trusted data” is characterized by data which is portable, cryptographically verifiable, assured provenance and traceability. Since trusted data has value, recipients will pay the issuers of the data for that value, incentivising them to provide more trusted data wherever possible.

Let’s consider the example of a Web3 lender looking to attract new users from Web2, and retain existing users in Web3 by lowering collateral ratios on crypto loans: Suppose a borrower approaches a lender, either in the cefi or defi space, seeking a loan. Traditionally, lenders require significant over-collateralization (>140-200%) due to the unknown risk associated with an individual borrower.

In a new scenario, lenders and protocols can offer appropriately collateralized loans if the borrower provides signals that support a perceived reduction of risk. These ‘signals’ are trusted data which may include on-chain transaction history, social signals and proofs like DAO contribution history, ownership of real-world assets, and even the borrower’s Web2 credit score and KYC data. The lender utilizes these signals to assess the risk of the loan. The more signals the borrower provides, the lower the perceived risk.

This enables lenders to offer competitive loan terms while maintaining their risk profile. Moreover, it enhances the efficiency of capital markets, stimulates growth through new money creation, and establishes cryptocurrencies as a viable alternative to fiat currencies. As the loan is repaid, the lender can provide prompt payment credentials to the borrower, which the borrower can share with other lenders to demonstrate good behaviour. The new lender then compensates the old lender and the borrower for these credentials.

Cheqd supports this data market by ensuring the lender (the verifier of the trusted data) can utilise Cheqd’s payment infrastructure to pay the Issuer of the trusted data (let’s say a consumer credit agency) in a privacy-preserving mechanism. The transaction (the loan) remains trustless, however, the relationship between the borrower and the lender has signals that support trust, enabling a more efficient lending market in crypto whilst retaining what makes crypto lending unique.

Lastly, let’s explore the application of credentials in the context of DAOs: A DAO commissions an anonymous artist for a specific artwork. The artist successfully completes the work and receives payment from the DAO. The DAO provides the artist with a credential endorsement stating their professionalism, quality work, and timely delivery. The artist can then anonymously share this credential with future projects or DAOs when applying for a job. In this scenario, the new DAO or project may compensate the previous DAO for the recommendation, as it helps de-risk their hiring process. By leveraging trusted data credentials, businesses and organizations can enhance trust and streamline onboarding to speed up work.

BCN: The so-called “bot paranoia” often makes users question whether the person they’re talking to in the digital world is really who they claim to be. Can a decentralized reputation system solve that problem for users? If so, how?

FE: A decentralized reputation is built on various signals that contribute to its credibility. These signals encompass a wide range, including KYC and liveness credentials, social media history (such as account age and posting frequency), and endorsements from other individuals or organizations. Users have the flexibility to combine and selectively share these signals to prove their reputation. While each signal could be manipulated individually, attempting to do so for all signals would be highly challenging and time-consuming.

Moreover, since each recipient of the reputation (i.e., the observer) can prioritize different factors, impersonating someone would require covering all bases, adding significant time and effort to the process. While impersonation remains theoretically possible, the time-consuming nature of such attempts makes it economically unviable. For instance, it would involve maintaining consistent social accounts over the years, demonstrating a regular history, and acquiring endorsements from reputable organizations and people.

BCN: Your company is said to be building a marketplace where holders, issuers, and verifiers can exchange and monetize verifiable data. Can you tell our readers who these holders, issuers, and verifiers are as well as how the exchange and monetization of data works?

FE: Absolutely. One nuance here is that “holders, issuers, and verifiers/receivers” are roles and therefore often overlap, especially for organizations. Let’s consider an example: An investment DAO employs someone to analyze companies and projects for potential funding. The DAO gives the person or people credentials so they can prove who they work for to the companies and projects so they can be trusted and prevent scamming.

In this scenario:

  • Issuer: DAO
  • Holder: Person
  • Verifier/receiver: Bank

Then, once the DAO has invested, it issues credentials to the company or project so that it can prove they are trustworthy and reputable to other investors or potential business partners without needing to involve the DAO all the time.

In this scenario:

  • Issuer: DAO
  • Holder: Company or project
  • Verifier/receiver: Other investors or potential partners

BCN: Much of the world’s data is still stored on Web2 servers. Bringing them to Web3 in a verifiable and privacy-preserving manner could help unlock new use cases or at least improve the existing ones. What are the challenges of bringing verifiable Web2 data such as credit scores to the Web3 ecosystem to facilitate economic activities?

FE: One of the primary historical hurdles of releasing data to the control of individuals has been the commercial aspect. Traditionally, companies collect, aggregate, and analyze data, generating revenue by selling either aggregate data or insights derived from their analysis. Transitioning to the new data paradigm, where individuals have control over their own data, requires new technologies, which entail costs for businesses. Without a viable revenue stream associated with these changes, commercial feasibility is limited unless mandated by regulations.

Therefore, the key challenge lies in establishing a clear and scalable revenue/commercial model, which is precisely what we at Cheqd are directly addressing. Our focus is on incentivizing the release of data from existing servers and silos back to the control of the individuals to whom it pertains. By solving this challenge, we can unlock new use cases or improve existing ones, facilitating economic activities within the Web3 ecosystem.

BCN: The KYC process is sometimes seen as a major stumbling block in the financial services sector. It can be time and resource-consuming and the data can be fraudulent. Do you think a so-called blockchain-based re-usable KYC can solve this problem and potentially improve the user experience?

Absolutely, re-usable KYC is particularly valuable in Web3, where users are highly mobile and prone to switching between multiple exchanges or marketplaces. For example, the European Commission found 21% of survey respondents had switched providers, i.e. exchanges or marketplaces within the last 5 years, higher than for any other product or service, e.g. current accounts or fiat investment products. It did not ask about switching multiple times within this period or using multiple providers which anecdotally we know most people do.

Currently, many financial service providers outsource their KYC requirements to third-party providers like Onfido, Jumio, or Trulioo, who perform the checks and provide the results. As a result, users often find themselves repeatedly providing their information to the same third-party provider when registering with different financial service providers.

By undergoing the KYC process once and obtaining re-usable credentials, users can utilize those credentials with different service providers multiple times. Implementing such a system would significantly expedite onboarding processes and enhance user satisfaction, particularly when compared to the current approach. It also allows people to use parts of those digital credentials for other purposes, like proving they are over a certain age to buy alcohol, tobacco or lottery tickets for example, without exposing everything in the credential.

What are your thoughts on this interview? Let us know what you think in the comments section below.

Comments

Popular posts from this blog

Custodial Lightning Network Service Attack Discovered by LN ‘Newbie’ — Hacker Strikes 6 LN Custodians

On September 18, a Redditor posted to the r/bitcoin forum and explained how he discovered a way to “attack [the] lightning Network’s custodial services.” The Reddit account dubbed “Reckless Satoshi” wanted to figure out if a “discrepancy between real routing fees and service’s transaction fee can be exploited for a profit.” The researcher disclosed that he wanted to see how large the damage could be and said “it is bad.” 6 Lightning Network Custodial Services Attacked, Researcher Discloses Findings to Offenders Prior to Public Disclosure A Redditor called Reckless Satoshi published a disclosure post on r/bitcoin this past Saturday and disclosed how he had found a vulnerability with routing fees and some of the Lightning Network’s custodial services. The research attack was done in good faith and after it was complete he disclosed the bugs to the offending services before publishing his findings. Reckless Satoshi used the Lightning Network (LN) attack on six different services incl...

Axie Infinity Down 40% Since Last Week’s Price High, Protocol Revenue Outshines Competitors

Last week, the game token leveraged within the Axie Infinity gaming universe skyrocketed to all-time highs, while other crypto markets remained extremely lackluster. During the last seven days, Axie Infinity’s platform token has dropped significantly in value shedding more than 12%. Meanwhile, the game platform’s smooth love potion token has slid over 8% over the last 24 hours. Axie Infinity Down More Than 40% Since All-Time High Not too long ago, the axie infinity (AXS) token was a topical conversation because it reached an all-time high on July 15. At the time, AXS managed to capture $28.93 per unit and since then it has shed 12.8% during the last seven days. The axie infinity (AXS) token is used within the blockchain-based game that involves battles between token-based creatures called “Axies.” AXS is used for the game’s governance system as well as other actions within the game. At the time of writing axie infinity (AXS) is exchanging hands for $16.70 per coin. AXS/USD on Ju...

Play-to-Earn Game From Polker (PKR) Exchange Listing – Endorsed by Akon

The Play-to-Earn NFT based Polker.Game ‘s native token $PKR has been officially listed on the popular centralized exchange BitMart. Polker.game has been in the spotlight recently as Akon, the American R&B superstar and record producer gave his official endorsement of polker stating that the “game is revolutionary” and that Polker is “hands down.. the best play to earn, NFT game in the space.”. With the BitMart listing and celebrity endorsement from Akon, Polker is perfectly positioned to become a major player in the Play-to-Earn league. Watch Akon’s Video Here What is Play-to-Earn? Although not a new concept, play-to-earn has become a trending term due to the popularity of the NFT game AXIE infinity. In the past, previous play-to-earn games have also achieved success – however, thanks to the huge amount of development in the blockchain space in recent years the gaming experience is now massively improved. Play-to-Earn games are essentially free to play and open to anyone and...

China to Crack Down on Copyright Infringement Through NFTs

Authorities in China are going after creators of digital collectibles based on other people’s works of art, the use of which was not authorized. The government offensive is part of a campaign to combat online copyright infringement and piracy with the participation of several departments. Regulators in China Move to Strengthen Copyright Supervision of Online Platforms The National Copyright Administration of China (NCAC) has recently launched a campaign against copyright infringement and piracy on the internet, together with the Ministry of Industry and Information Technology, the Ministry of Public Security, and the State Internet Information Office of the People’s Republic. A major objective of the initiative is to improve copyright supervision of online businesses by investigating cases involving the sale and distribution of infringing products on short video, live broadcast and e-commerce platforms, and promptly dealing with infringing content, the agency announced in a press r...
Blogarama - Blog Directory