Go directly to jail
Can you solve spam at the protocol-level?
Assumption: a credibly neutral decentralized social networking protocol is desirable.In order to achieve "credibly neutral decentralization" for the protocol data it must be 1) replicated across many servers / nodes 2) user-controlled, i.e. the user does not have to rely on any other party to add / remove messages to the protocol 3) sign ups are permissionless.This means that anyone (or AI) can sign up for an account and post whatever they want at the protocol level. Any compromise on this ne...
What does sufficient decentralization mean?
I often see people say Farcaster isn't "sufficiently decentralized". You're free to define what "sufficiently decentralized" means to you, of course, but how we think about it is laid out in Varun's blog post:A social network achieves sufficient decentralization if two users can find each other and communicate, even if the rest of the network wants to prevent it. This implies that users can always reach their audience, which can only be true if developers can build many clients on the network...
Go directly to jail
Can you solve spam at the protocol-level?
Assumption: a credibly neutral decentralized social networking protocol is desirable.In order to achieve "credibly neutral decentralization" for the protocol data it must be 1) replicated across many servers / nodes 2) user-controlled, i.e. the user does not have to rely on any other party to add / remove messages to the protocol 3) sign ups are permissionless.This means that anyone (or AI) can sign up for an account and post whatever they want at the protocol level. Any compromise on this ne...
What does sufficient decentralization mean?
I often see people say Farcaster isn't "sufficiently decentralized". You're free to define what "sufficiently decentralized" means to you, of course, but how we think about it is laid out in Varun's blog post:A social network achieves sufficient decentralization if two users can find each other and communicate, even if the rest of the network wants to prevent it. This implies that users can always reach their audience, which can only be true if developers can build many clients on the network...
Share Dialog
Share Dialog
The value of an FID is in the social graph—both stated (following) and revealed (activity). Profile is secondary. There is minimal (no?) value in the onchain primitive absent the above.
This is why digital identity is always emergent from apps with utility. If you spend a lot of time using an app / platform / OS, it starts to become your identity. Building an identity layer is the wrong order of operations. You earn the right to be an identity layer by time spent, usage, people building on it, etc.
At-scale digital identities in 2024:
Email address — the original "killer app" of the internet; so naturally websites asked for you email address as your identity
Phone number — as smartphones became more popular, many apps shifted from asking for an email address to a phone number. Even more people had a phone number than an email address, esp. in developing countries.
OS-level identities — Sign in with Apple and Sign in with Google
The value of an FID is in the social graph—both stated (following) and revealed (activity). Profile is secondary. There is minimal (no?) value in the onchain primitive absent the above.
This is why digital identity is always emergent from apps with utility. If you spend a lot of time using an app / platform / OS, it starts to become your identity. Building an identity layer is the wrong order of operations. You earn the right to be an identity layer by time spent, usage, people building on it, etc.
At-scale digital identities in 2024:
Email address — the original "killer app" of the internet; so naturally websites asked for you email address as your identity
Phone number — as smartphones became more popular, many apps shifted from asking for an email address to a phone number. Even more people had a phone number than an email address, esp. in developing countries.
OS-level identities — Sign in with Apple and Sign in with Google
7 comments
FIDs and identity
I'm supporting you through /microsub! 530 $DEGEN (Please mute the keyword "ms!t" if you prefer not to see these casts.)
I'm supporting you through /microsub! 265 $DEGEN (Please mute the keyword "ms!t" if you prefer not to see these casts.)
I'm supporting you through /microsub! 527 $DEGEN (Please mute the keyword "ms!t" if you prefer not to see these casts.)
I'm supporting you through /microsub! 27 $DEGEN (Please mute the keyword "ms!t" if you prefer not to see these casts.)
I'm supporting you through /microsub! 42 $DEGEN (Please mute the keyword "ms!t" if you prefer not to see these casts.)
I'm supporting you through /microsub! 217 $DEGEN (Please mute the keyword "ms!t" if you prefer not to see these casts.)