Full text version of the latest papers by Vitalik et al: Decentralized society finds the soul of Web3

去中心化社会找到了Web3的灵魂

 

“去中心化社会:寻找Web3的灵魂”是Vitalik等人的最新论文。本文描述了如何通过灵魂束缚的代币实现更丰富,更多样化的生态系统,即“去中心化社会中的去中心化社会(DeSoc)和关键可分解产权以及增强的治理机制”。因此,DAOrayaki社区翻译了这篇文章,并组织了多个播客进行深入分析。

 

总结

今天,Web3更多的是表达可转移的金融化资产,而不是社会信任关系的编码。然而,许多核心经济活动,如无担保贷款和建立个人品牌,都是建立在持久的、不可转让的关系之上的。在本文中,我们说明了代表“灵魂”承诺,证书和关系的不可转让的“灵魂束缚”令牌(SBT)如何编码实体经济的信任网络,以建立来源和声誉。更重要的是,SBT可以实现其他和更多的应用场景,例如社区钱包恢复,防病毒治理,分散机制以及具有可分解共享权利的新市场。我们将这个更丰富,更多样化的生态系统称为“分散社会”(DeSoc) - 一种共同决定的社会性,其中“灵魂”和社区自下而上地聚集在一起,作为彼此的新兴属性,共同创造不同层次的复杂网络商品和知识。这种社会性的关键是可分解的财产权和增强的治理机制(例如按相关性分数打折的二次资金),这些机制奖励信任和合作,同时保护网络免受捕获,提取和控制。通过这种增强的社交性,跨越社交距离的Web3可以抛弃当今的超金融化,转而支持一个更具变革性,多样化的未来,一个不断发展的未来。

§ 第一章 导言

在不到十年的时间里,Web3通过创建一个前所未有的独特而灵活的并行金融系统震惊了世界。密码学和经济学的基本要素,如公钥密码学、智能合约、工作量证明和权益证明,为金融交易带来了一个复杂而开放的生态系统。

然而,金融交易的经济价值是由人类及其关系产生的。由于Web3缺乏代表这种社会身份的基本元素,它从根本上依赖于它试图超越的中心化Web2结构,从而复制了它的局限性。

此依赖关系反映在:

  1. 大多数NFT艺术家依靠OpenSea和Twitter等集中式平台来承诺稀缺性和初始来源。
  2. 试图超越简单硬币投票的DAO通常依靠Web2基础设施(如社交媒体帐户)来抵抗Sybil攻击。
  3. 许多Web3参与者依赖于由Coinbase或Binance等集中式实体管理的托管钱包。分散的密钥管理系统对除了少数极客以外的任何人都不够友好。

此外,由于缺乏原生Web3身份,今天的DeFi生态系统无法支持实体经济中无处不在的活动,例如抵押不足的贷款,或公寓租赁等简单合同。在本文中,我们证明了,即使是朝着用“灵魂束缚”的代币代表社会身份迈出的一小步,也可以克服这些限制,并使整个生态系统重新建立一个反映原生人际关系市场的Web3世界,这已经向前迈出了一大步。

更进一步,我们指出,原生Web3社交身份,由于其丰富的社交可组合性,可以在Web3中围绕财富集中和治理易受金融攻击的更广泛的长期问题上取得巨大进展,同时刺激创新。寒武纪爆炸的政治,经济和社会应用。我们将这些用例及其支持的更丰富的多样化生态系统称为“去中心化社会”(DeSoc)。

§ 第二章 概要

我们首先解释DeSoc的基本要素,它围绕着持有不可转让(最初是公开的)“灵魂束缚”代币(SBT)的账户(或钱包),代表承诺,凭证和关系。这个令牌就像一个扩展的简历,由其他钱包发布,可以证明这些社会关系。

然后,我们描述了由DeSoc的这些基本元素在社交堆栈中实现的日益强大的应用程序的“阶梯”,包括:

  1. 建立出处
  2. 通过信誉解锁抵押不足的贷款市场
  3. 实施分散的密钥管理
  4. 挫败和抵消协调的战略行为
  5. 衡量权力下放
  6. 创建具有可分解、共享权利和权限的新型市场

这种描述的高潮是DeSoc的愿景 - 一种共同确定的社会性,其中“灵魂”和社区自下而上地聚集在一起,作为彼此的新兴属性,在不同层面上共同创造复合网络产品,包括复合智能。

最后,我们回答了几个可能的担忧和反对意见,并与Web3空间中熟悉的其他身份范式进行了比较,承认我们的愿景只是第一步,但仍然是可编程隐私和通信的进步。然后,我们考虑技术途径来指导我们想象的愿景。在此基础上,我们从一个更哲学的角度来看,DeSoc有可能将Web3重定向到一个更深刻,合法和变革性的道路。

§ 第三章 “灵魂”

我们正在谈论的关键基本要素是一个账户或钱包,它持有公开可见的,不可转让的(但可能被发行人撤销)的代币[5]。我们将帐户称为“灵魂”,并将其持有的令牌称为“灵魂令牌”(SBT)。尽管我们对隐私有浓厚的兴趣,但我们最初假设宣传,因为作为一个概念,它在技术上更容易验证,即使受到人们愿意公开分享的代币类型的限制。在本文的后面,我们将介绍“可编程隐私”的概念,用于更丰富的用例。

想象一下,在这样一个世界中,大多数参与者都有存储SBT的“灵魂”,对应于一系列关系,成员资格和凭据。例如,一个人可能有一个存储SBT的“灵魂”,代表教育证书,就业历史,或代表他们的著作或艺术作品的一串哈希。在最简单的形式中,这些SBT是“自我记录”的,类似于我们在简历中分享有关自己的信息的方式。但是,当一个“灵魂”持有的SBT可以由其他“灵魂”作为这些关系的对手来发行或证明时,这种机制的真正力量就出现了。这些交易对手“灵魂”可以是个人、公司或机构。例如,以太坊基金会可能是一个“灵魂”,向参加开发者会议的“灵魂”发放SBT。大学可以是向毕业生发放SBT的“灵魂”。体育场可以是一个“灵魂”,向道奇队的长期球迷分发SBT。

请注意,没有要求“灵魂”必须与合法名称相关联,也没有任何协议级别的尝试来确保“每人一个灵魂”。“灵魂”可以是一个长期使用的假名,带有一系列不容易与真人联系在一起的SBT[6]。我们也不假设“灵魂”在人与人之间是不可转移的。相反,我们试图说明这些属性如何在需要时从设计本身自然地出现。

§ 第4章 通往去中心化社会的阶梯

4.1 艺术与“灵魂”

“灵魂”是艺术家在作品中占有声望的自然方式。在发行可交易的NFT时,艺术家可以从他们的“灵魂”中发行NFT。艺术家的“灵魂”携带的SBT越多,买家就越容易识别“灵魂”属于艺术家,从而确定NFT的合法性。艺术家可以更进一步,在他们的“灵魂”中发布一个链接的SBT,证明NFT是该“收藏”的成员,并保证艺术家希望设置的任何稀缺性限制。因此,Soul将创建一种可靠的链上方式,以对对象的来源和稀缺性进行押注和建立声誉。

适用范围从艺术扩展到服务,租赁和任何建立在稀缺性,声誉或真实性之上的市场。后者的一个例子是验证所谓的事实记录(如照片和视频)的真实性。随着Deepfake技术的进步,人类和算法的直接检查将越来越难以检测真实性。虽然区块链的添加使我们能够跟踪特定作品的制作时间,但SBT将使我们能够跟踪社会出处,为我们提供丰富的社会背景,使我们能够了解已发表作品的“灵魂” - 他们的成员资格,关系,证书的组合 - 以及他们与作品的社会距离。“高仿制品”可以很容易地识别,因为这些艺术品不是在相应的时间和社会背景下产生的,而可信的艺术品(如照片)则由知名摄影师证明。虽然目前的技术将文化产品(如图片)去语境化,并在没有社会背景的情况下使它们暴露于不受控制的病毒攻击中,但SBT可以将这些对象重新语境化,并使“灵魂”“能够利用社区中已经存在的信任关系作为保护声誉的有意义的后盾。

4.2 “灵魂”借用

也许直接建立在声誉上的最大财务价值是信贷和无抵押贷款。目前,Web3生态系统甚至无法复制一种简单的无担保借贷形式,因为所有资产都是可转让和可销售的,因此只能是一种简单的抵押品形式。“传统”金融生态系统支持多种形式的无担保贷款,但依靠集中的信用评分来衡量借款人的信誉,几乎没有激励借款人分享其信用记录信息的动力。这个分数有很多缺陷。充其量,他们以不透明的方式权衡和减重与信誉相关的因素,并对那些没有积累足够数据的人产生偏见[8] - 主要是少数民族和穷人 。在最坏的情况下,他们可以操纵类似黑镜的“社会信用”体系,并加强歧视。

SBT生态系统可以创造一种抗审查的、自下而上的替代方案,而不是自上而下的商业化“社会”信用体系。代表教育证书,就业历史和租赁合同的SBT可以持久地记录为与信用相关的历史,允许“灵魂”承诺良好的声誉,以避免抵押要求并获得贷款。贷款和信贷额度可以表示为不可转让但可撤销的SBT,因此它们嵌套在“灵魂”的其他SBT中 - 声誉的不可分割的抵押品 - 直到它们被偿还并随后被摧毁;或者更好的是,用还款证明代替它。SBT提供了有用的担保属性:不可转让性可以防止转让或隐藏未偿贷款,而丰富的SBT生态系统确保试图逃避贷款的借款人(也许通过创造一个新的“灵魂”)将缺乏SBT来有意义地押注他们的声誉。

SBT可以很容易地用于计算公共债务,这将使贷款市场更加开放。SBT和还款风险之间将出现新的相关性,从而产生更好的贷款算法来预测信誉,减少对集中、不透明的信用评分基础设施的依赖。此外,借贷可能发生在社会关系中。特别是,SBT将成为社区贷款实践的基础,类似于穆罕默德·尤努斯(Muhammad Yunus)和格莱珉银行(Grameen Bank)开创的社区贷款实践,其中社交网络的成员同意相互支持对方的债务。由于“灵魂”的所有SBT都代表了不同社会群体的成员资格,因此参与者可以很容易地发现其他“灵魂”,他们将成为团体借贷计划的重要共同参与者。商业贷款是一种“借贷即忘记”的还款模式,而社区贷款可能采取“借贷和帮助”的方法,将营运资本与人力资本相结合,以获得更高的回报率。

无担保社区贷款如何实现?一开始,我们希望“灵魂”只携带SBT,其中包含他们愿意公开分享的信息,例如简历上的信息。虽然范围有限,但对于社区内部的贷款实验来说,这可能就足够了,特别是如果SBT是由信誉良好的机构颁发的。例如,显示某些编程证书的SBT的组合,参加过几次会议和工作经验,可能是“灵魂”为他们获得风险投资(或筹集种子资金)的优势。这种资历和社会关系在风险资本等资本的分配中非正式地发挥了重要但不透明的作用。

4.3 不要失去你的“灵魂”

一些重要的SBT的不可转让性 - 例如一次性教育证书 - 提出了一个重要的问题:你如何避免失去你的“灵魂”?今天的恢复方法,如多符号恢复或助记符,在精神负荷、交易便利性和安全性方面有不同的权衡。社会恢复[9]是一种新兴的替代方法,依赖于一个人的信任关系。SBT允许类似但更广泛的范式:社区恢复,其中“灵魂”是其社交网络的交叉投票。

社交恢复是安全的一个很好的起点,但在安全性和可用性方面有几个缺点。用户管理一组“监护人”,并授权他们通过大多数人更改钱包的密钥。监护人可以是个人,机构或其他钱包的组合。问题在于,用户必须在拥有相对较多的监护人和确保监护人来自不相关的社交圈子之间找到平衡,以避免串通。此外,监护人可能会死亡,人际关系恶化,或者只是失去联系,从而导致频繁,消耗注意力的更新。虽然社交恢复避免了单点故障,但成功的恢复取决于计划和维护与大多数监护人的信任关系。

一个更强大的解决方案是将Soul恢复与社区中的Soul成员资格联系起来,而不是策划,而是最大限度地建立广泛的实时安全关系。回顾一下,SBT代表了不同社区的成员。其中一些社区 - 例如雇主,俱乐部,大学或教堂 - 可能在本质上更加脱链,而其他社区 - 例如参与协议治理或DAO - 可能在本质上更具链上。在社区恢复模型中,恢复灵魂的私钥需要来自“灵魂”社区(随机子集)的大多数成员的同意。

Vitalik等人最新论文的全文版本:去中心化社会找到了Web3的灵魂

与社交恢复一样,我们假设“灵魂”可以访问安全的链下通信渠道,通过对话,面对面或共享秘密进行“身份验证”。这种通信通道需要比链上机器人或SBT本身的计算更大的带宽(理论上能够携带更丰富的“信息熵”)。事实上,我们可以将SBT视为从根本上代表参与或访问这个真正的(即高带宽)通信通道。

可操作的细节需要试验。例如,如何选择监护人以及需要多少监护人的同意是需要进一步研究的关键安全参数。然而,有了如此丰富的信息库,社区恢复应该在计算上是可能的,随着“灵魂”加入更多样化的社区并形成更有意义的关系,安全性也会提高。

社区恢复作为一种安全机制体现了20世纪初社会学家和社交网络理论创始人Georg Simmel提出的身份理论,即个人身份来自社会群体的交叉点,而社会群体也从个人的交叉点中出现。维护和恢复灵魂的加密资产需要灵魂网络的同意。通过在社会性中嵌入安全,灵魂总可以通过社区恢复来再生他们的钥匙,从而防止“灵魂”的盗窃(或出售):由于卖方需要证明销售是一种恢复关系,因此任何出售“灵魂”的尝试都缺乏可信度。

4.4 “灵魂滴落”

到目前为止,我们已经解释了“灵魂”如何代表个人,并在他们获得SBT时重新出现他们独特的特征和群体身份,从而改变他们的关系,成员资格和证书。这种个性化有助于灵魂建立声誉,建立出处,进入无担保贷款市场,保护声誉和身份。但反之亦然。SBT还使社区能够在“灵魂”的独特交叉点被召集在一起。到目前为止,Web3严重依赖代币销售或空投来团结新的社区,而准确性或精确度很低。空投,其中令牌通过算法免费分发到一组钱包地址,大多属于现有令牌持有者和钱包的某种组合,容易受到女巫攻击,并鼓励战略行为和马修效应[9]。SBT在这方面有一个根本性的改进,我们称之为“灵魂”空投。

“灵魂”空投是基于SBT和“灵魂”中的其他令牌计算的空投。例如,想要在特定第1层协议中召集社区的DAO可以空投到持有SBT的开发人员,其中有3个出席者在过去5次会议中,或者其他代表出席的令牌,如POAP。该协议还可以以编程方式对令牌在各种 SBT 组合中的放置进行加权。我们可以想象一个非营利组织,其使命是种植树木,将治理代币扔进“灵魂”中,这些“灵魂”持有环境行动SBT,园艺SBT和碳封存代币的组合 - 也许是碳封存代币持有者更多的代币。

“灵魂”空投还可以引入新的激励措施来鼓励社区参与。空投SBT可以设计为在一段时间内被“灵魂”束缚,但最终“既得”为可转移的代币。反之亦然。持有一段时间的可转让代币解锁了对SBT的权利,为协议提供了进一步的治理权利。SBT开辟了大量的可能性,可以尝试不同的机制,以最大限度地提高社区参与度和其他目标,如权力下放。我们将在下面进一步讨论。

4.5 由“灵魂”组成的DAO

分布式自治组织(DAO)是围绕一个共同目标聚集在一起的虚拟社区,通过公共区块链上的智能合约投票进行协调。虽然DAO在协调全球社区方面具有巨大的潜力,但它们容易受到sybil攻击,用户可以拥有多个钱包来积累投票权,或者在不太复杂的一币一票治理中,简单地囤积代币以积累51%的投票权并剥夺其他49%的持有者。

DAO可以通过多种方式缓解SBT对SYbil的攻击,即:

  1. 计算SBT的“灵魂”集合,以区分独特的灵魂和可能的机器人,并否认可疑女巫的“灵魂”的任何投票权。
  2. 给予那些拥有更负盛名的SBT的“灵魂”更多的投票权 - 例如工作或教育证书,执照或认证。
  3. 发行专门的“人格证明”SBT,这可以帮助其他DAO更容易地部署对女巫的抵抗。
  4. 检查支持特定投票的“灵魂”所持有的SBT之间的相关性,并对高度相关的选民应用较低的投票权重。

相关性检查的最后一个想法特别有前途和创新性。由许多拥有相同SBT的“灵魂”支持的投票更有可能是女巫攻击,即使不是女巫攻击,这样的投票也更有可能由一群在判断中犯了相同错误或有相同偏见的“灵魂”进行, 因此,与支持人数相同但来自更多样化的参与者群体的投票相比,它应该得到合理的权重[7]。

我们在附录中以数学方式更详细地探讨了这个想法,其中我们引入了一个新的基本元素,称为“相关性分数”。这种相关性折扣的概念可以扩展到结构化的审慎谈判。例如,容易被多数人捕获的DAO可以计算SBT,以最大限度地将不同成员分组到谈判中,从而确保听到少数人的声音。

DAO还可以依靠SBT来防止一些战略行为,如“吸血鬼攻击”。在这种类型的攻击中,DAO(通常是具有经济价值的相关DeFi协议)使用令牌通过复制另一个DAO的开源代码来吸引用户的流动性,从而剽窃其他人的研发成果。DAO可以通过以下方式做到这一点:首先围绕“灵魂”空投(可能持有特定的SBT)创建一个规范,只空投可能抵抗西比尔攻击的“灵魂”并提供流动性,然后扣留那些在吸血鬼攻击中转移流动性的人空投“灵魂”。同样的机制不适用于钱包空投,因为持有者可以将流动性分散到许多钱包中,以混淆其流动性痕迹。

DAO还可以使用SBT使领导和治理能够以编程方式响应其社区。随着社区构成的变化,领导角色可以动态变化 - 这反映在成员“灵魂”中SBT分布的变化上。成员的子集可以根据其交叉性和在DAO内多个社区的覆盖范围提升到潜在的管理角色。重视社区凝聚力的协议可以使用SBT将“灵魂”保持在整个圆圈中层的中心。此外,DAO可以选择使某些特征组合比其他特征组合具有更高的进入治理层的概率,例如邮政编码的多样性或跨越更多样化利益的DAO。

4.6 从多元化的角度衡量权力下放

在分析现实世界的生态系统时,最好衡量生态系统的去中心化程度。生态系统在多大程度上是真正去中心化的,在多大程度上是“假的”,实际上由一个人或一小群共同行为者主导?

权力下放的两个流行指标是Balaji Srinivasan提出的中本聪系数,该系数衡量需要多少个不同的实体来收集51%的资源;和Herfindahl-Hirschman指数。– 赫希曼指数),衡量反垄断市场集中度的指标,通过对市场参与者市场份额的平方相加来计算。然而,这些方法都没有解决关键问题,即什么是正确的测量资源,如何处理部分协调,以及如何应对“可识别实体”灰色地带的形成。

例如,名义上独立的公司可能有许多共同的大股东,有彼此是朋友的董事,或者受到同一政府的监管。在令牌协议的背景下,通过查看链上钱包来衡量令牌持有的分散化是非常不准确的,因为许多人拥有多个钱包,而某些钱包(例如交易所)代表许多人。此外,即使地址可以追溯到独特的个体,这些个体也可能是容易发生意外协调(最佳情况)或故意串通(最坏情况)的社会相关群体。更好的权力下放措施应该能够捕捉到社会依赖性,弱联系和强大的身份。

Vitalik等人最新论文的全文版本:去中心化社会找到了Web3的灵魂

占所有比特币90%的矿工和矿池运营商坐在一起开会。

SBT支持以不同的方式衡量DAO,协议或网络中的去中心化(或多样化)水平。

  1. 作为第一步,该协议可以将令牌投票限制在对Sybil攻击(或具有更丰富的SBT)抵抗力更强的“灵魂”上。
  2. 在第二步中,协议可以检查不同“灵魂”持有的SBT之间的相关性,如果“灵魂”共享大量SBT,则打折他们的选票(将它们集中并单独区分)。(我们在附录A中更详细地探讨了后一个想法,其中我们引入了一个新的基础元素,称为“相关性分数”)。
  3. 作为第三步,为了放大和理解整个网络的去中心化,我们可以测量网络堆栈不同层次的“灵魂”所持有的SBT的相关性 - 测量投票,代币所有权,治理相关通信,甚至对计算资源的控制。

SBT使我们能够开始衡量可互操作和分层生态系统的去中心化程度,这在今天很难衡量。还有一个大问题是,哪些公式最能捕捉我们想要衡量的东西,并且最不可能纵。关于如何检查SBT之间的关系,我们将有很多问题 - 给予某些SBT比其他SBT更多的权重,打折嵌套的SBT,或考虑“灵魂”中可转移代币的组成。然而,有了丰富的“灵魂”和SBT生态系统,将有更多的数据来执行这些计算并走向有意义的去中心化。

4.7 复合资产

DAO通常拥有资产,或者围绕拥有资产进行组织,无论是在虚拟世界还是物理世界中。到目前为止,Web3的范围在很大程度上仅限于一小部分财产,其中所有权利都是完全可转让的:代币,NFT,艺术品,第一版或稀有手稿,如美国宪法等。但是对可转让性的强调不利于Web3,使其无法代表和支持当今一些最简单和最常见的财产合同,例如公寓租赁。在罗马法律传统中,财产权被认为是由使用权(“usus”),消费或破坏权(“abusus”)和获得权(“fructus”)组成。所有这些权利很少由同一所有者共同拥有。例如,公寓租赁授予出租人有限的使用权(“usus”),但未授予其销毁公寓(“abusus”),出售公寓(“fructus”)甚至转让使用权(转租)的不受限制的权利。.不动产(土地)的权利通常受到一系列对私人使用的限制,公共使用权的授予,对出售权的限制,甚至对通过征用权购买权的限制。它们通常还以抵押贷款为担保,该抵押贷款将一些财务价值转移给贷方。

未来的资产创新不太可能像迄今为止想象的那样建立在完全可转让的私有财产上。相反,创新将取决于分解产权的能力,以匹配现有产权制度的特征,并对更丰富的结构进行编码。公司和其他组织形式已经发展到以更具创造性的方式重组财产权 , 例如,允许员工使用专有设施(“usus”),但保留经理更改或损坏资产的权利(“abusus”),同时向股东支付最大的经济利益(“fructus”)。SBT可以灵活地将这种微妙的财产权表示并扩展到有形和虚拟资产,同时鼓励新的实验。以下是一些使用案例:

  1. 允许访问私人或公共控制的资源(例如,家庭,汽车,博物馆,公园和虚拟等价物)。可转让的NFT不能很好地捕获这个用例,因为访问通常是有条件的和不可转让的:如果我信任你进入我的后院并将其用作娱乐空间,这并不意味着我相信你将此许可证再许可给其他人。
  2. 数据合作社[10],其中SBT授予研究人员对数据的访问权限,同时实例化(可能通过二次投票)成员授予访问权限的权利,并为研究产生的发现和知识产权的经济权利讨价还价。我们将在第5章“复数意义构建”中进一步探讨这一点。
  3. 尝试当地货币,并制定规则,使居住在特定地区或属于特定价值较高的特定社区的“灵魂”持有和消费货币。
  4. 通过参与实验,SBT为背景较小的“灵魂”(例如移民,青少年)创造了一个可持续的基础,以便在新的和更广泛的网络中获得影响力。这些灵魂将从封闭的SBT开始,将他们与家人或当地社区联系起来。隨著他們的關係逐漸多樣化,他們將獲得更廣泛的SBT,從而獲得投票權來影響更廣泛的網絡 - 丹妮爾·阿倫(Danielle Allen)的多國主義思想的精神[12] - 一個目前由任意年齡和居住地支配的過程。
  5. 由市场设计的实验,如Harberger税收和SALSA(拍卖中的自我评估许可证),其中资产持有人发布自我评估价格,其他人可以从中购买资产,并且必须定期支付与该自我评估价格成比例的税款以保持控制。SBT可用于创建更细微的SALSA版本, 例如,参与权由社区批准,以减少社区内外的战略行为。
  6. 尝试设计民主机制,如二次投票。代表社区成员的SBT持有者可以对激励措施和税率等参数进行二次投票。归根结底,“市场”和“政治”不是独立的设计空间;SBT可以成为技术堆栈的主要部分,从而可以探索这两个类别交织在一起的整个空间。另一个这样的交叉点是,例如,通过二次筹款来提供公共产品。

当然,也可以考虑一些乌托邦场景。移民系统可以使用移民SBT进行许可。监管捕获可以通过嵌套社区代币来实现,其中房主拥有不成比例的投票权来阻碍住房建设。SBT 可以自动红线。正如我们在下面进一步讨论的那样,这些情况应该在目前不透明的自上而下的许可和歧视的背景下加以考虑。SBT将使歧视更加透明,因此可能受到质疑。

4.8 从私人和公共产品到复合网络产品

更广泛地说,SBT使我们能够有效地代表和管理任何介于完全私有和完全公开之间的资产或商品。实际上,即使是个人消费的商品也具有积极的溢出效应,就像它们使消费者能够更好地为家庭或社区做出贡献一样,即使是全球最可用的公共产品(例如气候)也是不可避免的土地对某些人比其他人更有用(例如塞舌尔到西伯利亚)。同样,人类的动机很少是完全自私或完全利他主义的,并且会有许多预先存在的合作模式,这些模式在某些社区中较少,而在另一些社区中则更多。

然而,今天的机制设计假设了原子的、自私的主体,没有预先存在的合作,这往往使机制容易受到无辜的过度协调的影响[13]。最坏的情况是已经合作的团体故意串通一气。因此,即使是最好的公共融资模式,包括二次融资(QF),也无法扩展。QF鼓励协调,为少数人的集中行动提供较少的奖励,同时为多数人的集体行动提供更多的奖励。10个人将1美元分成99美元的比赛,总共100美元,而一个人捐赠的10美元则不匹配。从数学上讲,这是用与个人贡献的平方根之和的平方和相匹配的资金完成的(我们在附录中进一步阐述)。然而,即使是像(例如中国大多数公民)这样的大型团体之间的弱伙伴关系(例如,向一项事业捐赠1美元)也会主导系统并吸收其所有匹配资金,因为QF具有唯一贡献者的数量,因此会带来溢价。就像现在一样,资历架构不打折相关特殊利益之间的协调,这不仅会导致资历架构机制失灵,相关特殊利益也会得到回报。

但是,我们不应该将先前存在的合作视为一个错误,而应该“重写”,关键是要承认它实际上反映了我们应该利用和补偿的合作的一部分。毕竟,我们从事的是一家鼓励合作的企业。诀窍是使二次机制与预先存在的合作网络一起工作,纠正它们的偏见和过度协调的倾向。SBT为我们提供了一种自然的方式,让我们可以打破平衡,支持跨越分歧的合作。正如诺贝尔奖获得者埃莉诺·奥斯特罗姆(Eleanor Ostrom)所强调的那样,问题不在于协调公共产品本身,而在于如何帮助不完全合作但与社会联系紧密的个人社区克服社会差异,并在更广泛的网络中扩大协调规模。

如果SBT代表反映Souls/Soul集群偏见的社区成员关系,那么支持跨差异的协作只是意味着对由其共享SBT度量驱动的相似或相关的Souls/Soul集群的协作奖励打折。假设不同盟友之间的共识更有利于创造适用于更广泛网络的复合商品,而类似盟友之间的共识更有可能只服务于狭隘利益的过度协调(或串通)。)的产品。

通过揭示不同灵魂/灵魂集合之间的成员资格,SBT允许我们打折预先存在的合作,并在新兴网络中二次扩展,使复合项目能够达到更广泛的利益群体,并且通过不同成员的同意,而不是通过无辜的过度协调(或故意共谋)的特殊利益集团,赋予项目狭义的含义。“最佳”相关性折扣的确切公式取决于模型细节,尚未研究,但我们在附录中提供了实验的第一手数据以供进一步研究。

§5 复合意义构造

在数字世界中越来越突出的各种在线商品的一个例子是基于用户数据的预测模型。人工智能(AI)和预测市场都试图根据主要从用户那里获得的数据来预测未来事件。但这两种范式都以不同且几乎相反的方式受到限制。人工智能的主导范式避开了激励,而是收集数据馈送(公共或私人监控),并通过专有的大规模非线性模型将它们综合成预测,这些模型始终如一地利用默认的web2对“usus”存在垄断,没有“果子”归因于数据工作者。

预测市场采取相反的方法,人们为了获得经济利益而对结果下注,完全依靠金融投机(“fructus”)的经济激励,而没有全面分析博彩玩家的信念以产生可组合的模型。同时,这两种范式得出的结论被描述为“客观”真理。人工智能模型被描述为“通用”或“通用智能”,而预测市场被描述为将市场参与者的所有信念总结为一个数字:均衡价格。

一个更有成效的范式是避开这些极端,并利用两者的优点,同时弥补它们的弱点,使它们在广度上更加丰富。我们建议将非线性AI模型的复杂性与预测市场的市场激励相结合,将被动数据工作者转变为主动数据创建者。凭借植根于数据创建者社会性的丰富信息,DeSoc能够释放出比任何一种方法都更强大的复合智能网络。

5.1 从预测市场到复合预测

预测市场旨在汇总那些愿意下注的人基于财富和风险偏好的信念。但这种“适者生存”并不是聚合信念的理想方式。在零和游戏中,一个交易者的收益是另一个交易者的损失,它假设一般的预测能力是与“聪明人”而不是“愚蠢的人”作斗争的。虽然财富可能是某些能力和专业知识的代表,但对其他形式的相关专业知识的预测可能更可靠。在一个领域输掉赌注的参与者可能对另一个领域有更准确的信念。但预测市场具有不幸的效果,即建立对那些有赌博倾向的人的信心,使那些赢得赌注的人变得富有,使其他人变得贫穷,并阻止风险厌恶者的广泛参与。

有更好的方法来激发信念。研究表明,虽然预测市场的表现往往优于简单的调查,但它们并不比复杂的团队预测调查更好,后者让人们有动力分享和讨论信息。在团队审议模型下,成员可以根据过去的绩效和同行评审等因素进行权衡,团队进行半结构化讨论,以汇集不能简单地封装在买卖合同中的信息。这种团队审议模型可以通过二次规则进一步改进,以便从所有参与者那里获得准确的概率估计(与预测市场相反,预测市场只能获得关于当前价格平衡的上下视图)[14]。已经表明,人们购买的合同数量反映了他们对概率的主观评估。[15]这样的市场也会更平等地分配参与收益,在不使其他人破产的情况下奖励合适的人,使每个人都成为未来回合的参与者。

SBT可以解锁一类新的丰富模型,并尝试预测能力和相对专业知识。预测市场只得出一个数字,即合约的价格,二次投票给出了每个参与者对事件概率的确切信念。SBT能够在参与者的教育资格,成员资格和一般社交能力的社会背景下进一步计算这些信念,以开发更好的加权(或非线性集成)预测模型,这些模型可能会在新的,不可预见的情况下出现新一代专家预测者在交叉点出现。因此,即使民意调查不能很好地收集信念,也可以回顾性地研究民意调查,以揭示“更正确”参与者的特征,并在未来的民意调查中召集更具针对性的“专家”,也许是在审议小组的背景下。这些机制与我们在本文中倡导的机制密切相关。通过相关性分数折射的二次机制可以将协调不良的自上而下的公共产品转化为强大的、自下而上的复合网络产品。同样,他们可以将基于零和预测市场的治理体系转变为正和意义上的更多决策,鼓励揭示和综合新的、更好的信息。

5.2 从人工智能到复合智能

BERT和GPT-3等大规模非线性“神经网络”模型也可以由SBT变换。此类模型利用大量公开或私人监视的数据来生成丰富的模型和预测,例如基于自然语言提示的代码。大多数被监视的数据创建者都没有意识到他们在创建这些模型中的作用,没有为自己保留任何剩余权利,并且被视为“偶然的”而不是关键参与者。此外,数据收集将模型从其社会背景中剔除,这掩盖了它们的偏见和局限性,并削弱了我们补偿它们的能力。随着对数据可用性的需求不断增长,这些矛盾已经凸显出来,新的举措,如记录数据来源的“数据收集表”,以及机器学习的隐私保护法律,需要让那些生成数据的人能够访问。具有有意义的经济和管理效益,并激励他们合作生产比他们单独构建的模型更强大的模型。

SBT提供了一种自然的方式来为来源丰富的数据制定经济激励计划,同时为数据创建者提供对其数据的剩余治理。特别是,SBT允许根据个人和社区的特征对其数据(和数据质量)进行仔细和有针对性的激励。同时,模型制作者可以跟踪所收集数据的特征及其社会背景,如SBT所反映的那样,帮助找到能够抵消偏见和补偿限制的贡献者。SBT还可以为数据创建者提供定制的管理,使他们能够组建合作社,汇集数据并协商其使用。数据创建者的这种自下而上的可编程性使未来的复合智能成为可能,模型制作者竞争如何使用相同的数据来构建不同的模型。因此,我们摆脱了与人类起源分离的独立,单一的“人工智能”范式,集中了没有出处的监视数据,并转向了根植于社会并由灵魂/灵魂集群统治的协作构建的综合智能的寒武纪。

随着时间的推移,就像SBT个性化灵魂/灵魂集群一样,它们也个性化了模型。将数据来源、治理和经济权利直接嵌入到模型代码中。因此,多元性,像人类一样,构建了一个嵌入人类社会性的灵魂,随着时间的推移,人类被嵌入到多主体中,每个人都有一个独特的灵魂,可以补充其他人和合作。而且,在这一点上,我们看到预测市场和人工智能范式的融合,朝着复合意义构建的方向一起发展。将广泛分布的激励措施和对社会背景的仔细跟踪相结合,可以创建不同的模型,将两种方法的优点结合到比任何一种方法都更强大的技术范式中。

5.3 可编程复合隐私

复合代理提出了有关数据隐私的重要问题。毕竟,构建如此强大的代理需要从大型数据集(如健康数据)中跨个人汇集数据,或者捕获不是人际数据而是共享的数据(如社交图谱)。“自我主权身份”的倡导者倾向于将数据视为私有财产:因为这种互动的数据是我的,所以我应该能够选择何时向谁披露。然而,就简单的私有财产而言,数据经济甚至比实体经济更不为人所知。在简单的双向关系中,例如婚外情,披露信息的权利通常是对称的,通常需要双方的许可和同意。正如学者Helen Nissenbaum所强调的那样,人们关注的不是“隐私”本身,而是对信息共享过程中共享信息的背景缺乏完整的理解。“Cambridge Analytica”丑闻主要是关于人们在未经朋友同意的情况下泄露他们的社交图谱属性和朋友信息。

与其将隐私视为可转让的财产权,不如将隐私视为可编程的、松散耦合的权利捆绑,允许访问、更改信息或从中获利。在这种范式下,每个SBT(例如表示凭据或访问数据存储的SBT)理想情况下还将具有隐式可编程财产权,并且能够控制构成SBT的一些基本信息,例如持有者,它们之间的协议,共享财产(例如数据)以及对第三方的义务。例如,一些发行人会选择将SBT完全公开,但一些SBT,如护照或健康记录,在自我主权的意义上将是私人的,携带SBT的灵魂/灵魂集群有权单方面披露。其他的,例如反映数据合作社成员资格的SBT涉及多重签名或更复杂的社区投票权,所有或大多数SBT持有者必须同意进行披露。

虽然目前存在技术问题,例如(SBT可以以这种方式编程吗?)和围绕激励兼容性的重要问题(在第7节中进一步探讨),但我们仍然认为可编程复合隐私值得进一步研究,并为现有范式的替代方案提供了关键优势。根据我们的方法,SBT有可能使隐私成为可编程的,可组合的权利,可以映射到我们今天拥有的一套复杂的期望和协议。此外,这种可编程性可以帮助我们重新构建新的配置,因为有无数种方式可以将隐私作为允许访问信息的权利与“usus”,“abusus”和“fructus”相结合,以创建一个微妙的访问权限集群。例如,SBT可以允许使用特定的隐私保护技术对数据存储(可能由多个Souls/Soul集群拥有和管理)进行计算。一些SBT甚至可能允许以执行某些计算的方式访问数据,但结果无法向第三方证明。一个简单的例子是投票:投票机制需要计算每个灵魂/灵魂集群的选票,但投票不应该向其他人证明以防止购买选票。

通信可能是共享数据的最典型形式。然而,今天的沟通渠道都缺乏用户控制和管理(“usus”和“abusus”),同时将用户的注意力(“fructus”)拍卖给出价最高的人,甚至是机器人。SBT有可能管理更健康的“注意力经济”,使Souls/soul集群能够过滤来自其社交图谱之外的垃圾邮件,甚至可能是机器人,同时增强来自真实社区和所需交叉点的沟通。听众可以更清楚地知道他们正在听谁,并且可以更好地将功劳分配给激发洞察力的作品。这种经济模型的优化不是为了最大化用户粘性,而是通过正和协作创建更有价值的共同目标。此通信通道对于安全性也很重要。如上所述,“高带宽”通信渠道对于帮助社区建立安全的基础至关重要。

§6 去中心化社会

Web3希望广泛地改变社会,而不仅仅是金融体系。然而,今天的社会结构,如家庭、教会、团队、公司、公民社会、名人、民主等关键词,如果在虚拟世界(通常被称为“元界”)中他们所支持的关系更加广泛,原住民就没有什么能代表人类的灵魂,所以这一切都毫无意义。如果Web3避开了持久身份、信任与合作模式、可组合的权益和权限,我们将看到所有这些过度金融化的趋势,分别是Sybil攻击、勾结和完全可转让的私有财产在有限的经济领域。

为了避免过度金融化,同时释放指数级增长,我们建议在虚拟和物理现实中增强和弥合我们的社会性,赋予灵魂/灵魂集群和社区/社区集群更丰富的编码社会和经济关系。然而,仅仅建立在信任与合作的基础上是不够的。纠正信任网络中的偏见和过度协调(或串通)倾向对于鼓励比以往任何时候都更复杂和多样化的社会关系至关重要。我们称之为“去中心化社会(DeSoc)”:一种共同确定的社会性,其中灵魂/灵魂集群和社区集群自下而上地聚集在一起,作为彼此的新兴属性,在不同规模下生成复合网络项目。

我们强调复合网络项目是DeSoc的一个特点,因为网络是经济增长最强大的引擎,也是最容易被私人行为者(如Web2)和强大的政府捕获的引擎。最显著的经济增长来自网络收入的增加,其中每增加一个单位的投入就会产生更多的产出。简单物理网络的例子包括道路,电网,城市和其他形式的基础设施,这些都是用劳动力和其他资本投入建造的。强大的数字网络的例子包括市场、预测模型和基于数据的综合智能。在这两种情况下,网络经济学都与新古典经济学明显不同,新古典经济学强调收益递减,也就是说,每增加一个单位的投入,产出就会减少,私有财产就会产生最有效的结果。在收益增加的情况下使用私有财产会产生相反的效果,导致通过提取租金来限制网络发展的现象。两个城市之间的道路可以释放贸易收益带来的更多回报。但是,如果房东选择在两个城市之间的贸易中收取租金,同样的私人道路所有权可能会扼杀增长。网络的公有制有其被监管机构抓住或资金不足的危险。

当网络既不被视为纯粹的公共商品,也不被视为纯粹的私人商品,而是将其视为部分和复合的公共商品时,增加回报是最有效的。DeSoc为分解和重新配置权利提供了社会基础 - 使用权(“usus”),消费或破坏权(“abusus”)和受益权(“fructus”) - 并使这些权利有效治理机制可以增强信任和合作,同时检查串通和捕获。我们在本文中探讨了几种机制,例如基于社区的SALSA和相关分数的折扣二次资助(和投票)。这种使复合所有权成为第三种方式的行为避免了Charybdis的私人租金和Scylla的公共监管。

在许多方面,DeFi今天是一个收益递减的私有财产模型,转变为一个收益递增的网络。在不信任的前提下,DeFi本质上仅限于完全可转让的私有财产(例如,可转让的代币)领域,这些领域在很大程度上与“usus”,“busus”和“fructus”有关。在最好的情况下,DeFi通过收取租金来扼杀网络增长,在最坏的情况下,它可能导致反乌托邦的监控垄断,由“鲸鱼”主导,他们在竞争中收获和吸收底层数据,就像Web2一样。

DeSoc将DeFi竞赛转变为自下而上的协调,以建立,参与和管理网络。至少,DeSoc的社会基础可以使DeFi反女巫(支持社区治理),反吸血鬼(内化正外部性以建立开源网络)和反勾结(保持网络分散)。通过DeSoc的结构性修订,DeFi可以支持和扩展多样化的网络,正如大多数不同成员所同意的那样,广泛地赋予利益,而不是进一步巩固由狭隘利益集团控制的网络。

然而,DeSoc最大的优势是其网络的可组合性。网络不断增加的回报和增长,不仅避免了提取租金的危险,也助长了嵌套网络的扩散和交集。一条道路可以在两个城市之间形成一个网络。但是,如果与更广泛的合作隔绝,这两个合作城市最终将面临收益递减的上限 - 要么是因为拥堵(道路和住房)还是耗尽(达到他们可以服务的人的极限)。只有通过技术创新和日益广泛的合作,即使这种合作是松散的。只有当相邻网络协作以获得新的回报来源时,价值才能继续呈指数级增长。一些合作将是有形的,逐步扩大跨空间的实物贸易。但更多的联系将是信息和数字化的。随着时间的推移,我们将看到物理网络和数字网络之间新的合作矩阵,依靠并扩展它们创造的社会互联互通。DeSoc正是这种交叉的、部分嵌套的、不断增长的协作结构网络,跨越了数字和物理世界。

通过形成网络和协调,DaSoc出现在政治和市场的交叉点,通过社会性增强了两者。DeSoc赋予JCR Licklider(创建互联网的ARPANET的创始人)在“星际计算机网络”中“人机共生”的愿景,并在信任的基础上显着提高社会活力。DeSoc不是建立在DeFi的无信任前提之上,而是对支撑当今实体经济的信任网络进行编码,并使我们能够利用它们来生成多个抵抗捕获,提取或支配的网络商品。通过这种增强的社交能力,web3可以避免短期的过度财务化,转而支持在社交距离方面无限增加未来的福利。

6.1 灵魂/灵魂簇可以去天堂或地狱

虽然我们有选择地强调了我们认为有希望被DeSoc解锁的东西,但更重要的是要记住,几乎任何具有这种变革潜力的技术都会有类似的颠覆性变革潜力:火焰燃烧,车轮翻转,电视洗脑,汽车污染,信用卡框架债务等。在这里,SBT可以用来补偿群体内部的动态并实现跨差异的合作,也可以用来自动为不受欢迎的社会群体划红线,甚至通过网络或物理攻击,限制性移民政策或掠夺性行为来针对他们。贷款。这种可能性在当前的web3生态系统中并不突出,因为它们在当前的基础上不是有意义的概念。启用 DeSoc 的好处也会带来这些危害。正如拥有一颗心的缺点是它可以破碎一样,拥有灵魂的缺点是它可以下地狱,所以拥有一个社会的缺点是社会往往是被仇恨、偏见、暴力和恐惧所驱使。人类是一个伟大的、往往是悲剧性的实验。

当我们思考DeSoc可能的乌托邦时,我们也应该将这些可能性放在其他技术支持的反乌托邦的背景下。Web2是一种不透明的威权监控和社会控制架构,通常依赖于自上而下的人工官僚机构来授予身份(“驾驶执照”),而DeSoc则依赖于水平(“点对点”)社会证明。DeSoc使Souls能够编码自己的关系并共同创建多个属性,而web2则通过不透明的算法来调解或货币化社会关系,这些算法可以产生两极分化,分裂和错误信息。DeSoc避免了自上而下、不透明的社会信用体系。Web2构成了他们的基础。DeSoc将灵魂/灵魂簇视为代理,而web2将灵魂/灵魂簇视为对象。

至少在短期内,使用DeFi进行社会控制(没有任何身份基础)的风险较小。但DeFi有自己的反乌托邦。虽然DeFi克服了显性形式的集中化——也就是说,特定参与者在系统中拥有超高水平的形式权力——但它没有内置的方法通过串通和市场力量来克服隐性集中化。垄断并不总是像标准石油公司过去那样出现。串通甚至可能发生在更高和更远的生态系统层面。今天,随着一系列机构资产管理公司的崛起,我们可以看到这一点。先锋、贝莱德、道富、富达等是各大银行、航空公司、汽车公司等主要行业的最大股东。由于这些资产管理公司持有一个行业(例如,每个主要航空公司)中所有竞争对手的股份,他们的动机是使他们拥有的公司看起来像一个有竞争力的行业,但它的行为就像垄断一样,最大化利润,并以牺牲消费者和公众为代价来保护整个行业。[16]

DeFi也是如此,同样的“鲸鱼”和风险投资在堆栈的每个级别和堆栈内的竞争对手之间积累了更大的股份,也许在代币治理中投票,或者将其委托给相同的班级代表,他们在整个网络中也有类似的相关性。如果没有任何反对女巫的社会基础以及强制功能分散的相关折扣,我们将看到更多的鲸鱼资助的垄断,因为垄断企业越来越多地成为最大的可用投资资本池。随着“货币阶层”和用户的分歧,我们应该看到(并且已经看到)越来越多的激励错位和租金提取。如果DeFi应用程序出现处理私人数据,我们可能会看到类似的动态,例如应用程序鼓励多个人之间的竞标战,这些人“拥有”实际上是关系的数据,例如他们的社交图谱,以构建一个与人类竞争的单一私有AI,避免将来竞争多个AI,从而增强人类的能力。

因此,DeSoc不需要完美能够通过可接受的非乌托邦的测试。要成为一种值得探索的范式,它只需要比现有的替代方案更好。虽然DeSoc有可能防范反乌托邦的情况,但web2和现有的DeFi正在陷入不可避免的反乌托邦模式,将权力集中在决定社会结果或持有大部分财富的精英手中。web2的方向是确定性威权主义,加速自上而下的监视和行为操纵能力。今天,DeFi的方向名义上是无政府资本主义的,但已经陷入了网络效应和垄断压力,有可能以同样的方式将其中期道路转变为威权主义。

相比之下,DeSoc是一种随机的社会多元化,一个由个人和社区组成的网络,作为彼此的新兴属性,共同决定自己的未来。从web2的角度来看,DeSoc的发展可以比作在几个世纪的君主制中盛行的参与式政府的崛起。参与式政府并不一定导致民主,它还导致了共产主义和法西斯主义的兴起。同样,SBT不会使数字基础设施本质上是民主的,而是基于灵魂/灵魂和社区/社区集体决定的民主兼容。与Web2的威权主义和DeFi的无政府资本主义相比,为这种可能性开辟空间是一个明显的进步。

§7 实施中的挑战

隐私问题是DeSoc面临的主要挑战。一方面,太多的公共SBT可能会透露太多关于灵魂的信息,这使它们变得被动和“社会控制”。另一方面,过多的纯私有SBT也会导致私人通信渠道与社会治理协调水平之间的关联折扣问题,这反映了激励兼容性问题的重要性。与隐私问题密切相关的还有欺骗问题:灵魂可能通过私人或其他辅助渠道进行交流,从而扭曲他们的社区团结。我们不可能知道一路上所有的可能性和答案,因此我们需要深入探索这些困难的本质,并为未来规划一条充满希望的道路。

7.1 私人灵魂

默认情况下,区块链的系统是公开的,链上记录的任何关系不仅对参与者而且对世界上任何人都是立即可见的。拥有多个别名可以保留一些隐私:家庭灵魂,健康灵魂,职业灵魂和政治灵魂,每个别名对应于不同的SBT。但如果这些假名是肤浅的,外人就可以很容易地将这些灵魂联系起来,这种行为的后果是严重的。因此,如果不采取措施保护隐私,简单地将所有SBT放在链上的“天真”行为可能会导致大量个人信息暴露在众多应用程序上。

为了解决过度披露的问题,有许多不同程度的技术复杂度和功能的解决方案。最简单的方法是通过SBT在链下存储数据,只留下链上数据的哈希值。

链上数据(完全公有) 链下数据 链上哈希(所有者可以选择何时显示)

如何存储链下数据取决于个人选择,可行的解决方案包括(i)自己的设备,(ii)可信的云服务,(iii)分散的网络,如星际文件系统(IPFS)。在链下存储数据允许我们有权在智能合约中写入SBT数据,同时拥有读取该数据的单独权利。Bob 可以选择显示其任何 SBT(或存储在那里的其他数据)的内容,但前提是他愿意。这是一个很大的改进,由于大多数数据只需要由少数人处理,因此它进一步提高了技术的可扩展性。但要充分实现保护多重隐私(注释:指各类隐私或(和)隐私集合)等功能,就需要对关系进行越深的挖掘。幸运的是,许多加密技术可以在这一点上帮助我们。

现在有一组强大的构建块,支持一种部分显示数据信息的新方法,称为“零知识证明”,这是密码学的一个分支。虽然零知识证明今天通常用于资产转移的隐私保护,但它们也允许人们证明任意陈述,而不会泄露声明本身以外的任何信息。例如,在一个政府文件和其他证明信息可以加密证明的世界里,有人可以证明这样的陈述:“我是加拿大公民,18岁以上,拥有经济学大学学位,拥有超过50,000名Twitter粉丝,并且某人尚未在此系统中注册帐户。

零知识证明可以在SBT上计算,以证明灵魂的特征(例如它具有某些成员)。这种技术可以通过引入多方计算技术(如乱码电路计算)来进一步扩展,这使得证明过程双向双私有:验证者不透露他们是谁,验证者不透露他们的验证机制。在这个过程中,双方一起计算,只输出信息。

另一种技术是指定验证器证明。一般来说,“数据”是不可靠的:如果我给你发一部电影,从技术上讲,我无法阻止你录制并发送给第三方。数字版权管理(DRM)等方法有限,并且对用户来说通常成本高昂。但“证据”在某种程度上是可靠的,如果阿玛想向鲍勃证明她的SBT的某些属性X,她可以对以下陈述进行零知识证明:“我持有满足属性X的SBT,或者我拥有Bob灵魂的访问密钥。鲍勃被这句话说服了:阿玛必须真正持有满足属性X的SBT,因为他知道他没有做证明,但如果鲍勃把证明传递给奎芬,奎芬也不会被说服:因为据他所知,鲍勃可以通过自己的灵魂访问密钥来证明这一点。此时,可以使用可验证的延迟函数(VDF)进一步加强证明:Amma可以显示现在只能使用所需的SBT进行证明,但其他人将不得不等待5分钟。这意味着可以访问数据的可信证明,尽管在不同类型的原始数据本身(可能复制和粘贴)上别无选择。正如区块链交易中的可追溯性可以防止某人复制和粘贴有价值的NFT(以及sybil攻击的原始发送者)一样,SBT可以提供传播的可追溯性,这至少可以减少来源的不确定性数据的价值(复制粘贴)。

这些链下数据和零知识技术与负面声誉(由SBT体现)兼容,即使持有者不希望它们被看到,它们仍然会被显示出来。负面声誉包括信用记录,未偿还的贷款数据,负面评论和来自业务合作伙伴的投诉,以及与SBT所证明的相关社会关系的和谐程度。区块链和相关密码学的结合可能会带来一个潜在的解决方案:智能合约可以迫使灵魂将负SBT合并到数据结构中,例如链下存储的Merkle树,任何零知识证明或所有乱码电路计算都需要引入这些信息,否则,在提供的数据中将存在可见的“差距”,验证者将被识别。Unirep协议就是一个例子。

这些示例的重点不是说明如何使用密码学来解决 SBT 的所有隐私和数据权限问题。相反,它概述了一些示例来演示这些技术的强大功能。未来一个重要的研究方向是确定不同类型的数据权限之间的界限,以及最适合实现所需权限级别的特定技术组合。另一个问题是数据治理需要哪种类型的复合财产制度,以及如何区分使用权(“usus”),构造权(“abusus”)和利益权(“fructus”)。

7.2 作弊的灵魂

如果SBT是协调复合财产,网络商品和智力的社会基础,那么人们担心灵魂可能会通过诡计或欺骗进入社区,以获得SBT许可的治理或财产权。例如,如果许多应用程序方向依赖于可以表示会议出席率的SBT,那么可能存在这些SBT用于交换贿赂的情况。如果有足够的人被贿赂,人类(和机器人)就会产生一个虚假的社会形象,被(虚假的)SBT分割。正如DAO可以被贿赂一样,灵魂和他们使用的链上投票机制也可以。相反,如果使用SBT来损害协作,则可以减轻SBT的影响。我们为什么要相信灵魂拥有的SBT实际上是在履行他们的社会承诺,而不是简单地告诉他们如何玩“游戏”?

一种观点认为,欺骗的不同动机之间存在着“平衡”。灵魂会自我评估和分类他们认为重要的网络,就像哈伯格税如何运作一样,通过平衡高估和低估资产的动机,得出近乎准确的市场估值。灵魂会希望拥有更多的SBT,以便在他们的社区中获得影响力,另一方面,他们将避免在他们不关心的社区中使用SBT,从而在相关指标上得分较低,这反过来又增强了他们更广泛的存在。对网络治理的影响。

但是,如果认为获得权力和获得影响力的两种动机总是相互抵消(或几乎相互抵消),那就太天真了。可能有许多社区使用SBT以外的系统来限制访问和治理。或者,社区可以发布私人SBT(与我们对宣传的假设相反)来支持治理权力,同时诱导社区成员在更广泛的决策中对这些私人SBT的存在保密。

“博弈”是一个重要问题,解决这个问题是未来研究的重点之一。事实上,这是很难开源提供优先级或排序的现有算法的主要原因之一。为了减少和阻止SBT“游戏”,我们提供了几项规范和方向:

  1. SBT的生态可以从“密集”的社交渠道开始,其中SBT通过强大的社会纽带和彼此之间的互动来验证链下社区成员身份。这使得社区更容易识别,过滤和撤销来自冒名顶替者(或机器人)的SBT。我们经常在公民社会的教堂、工作场所、学校、聚会团体和组织中发现这种“密集”的渠道,这些渠道将在更“稀疏”的社交渠道(例如通过机器人、贿赂等)中充当“警察游戏”,冒充),以提供更能抵抗西比尔攻击的社会基础。
  2. Nested communities require SBTs to impose “context” on their “downward” potential collusion vectors. For example, if a state is holding a fundraising or voting round, the state may require every participating citizen to also hold SBT for designated counties and cities.
  3. The openness and cryptographic provability of the SBT ecosystem can be used to actively detect collusive patterns and punish unreliable malicious behavior (perhaps lowering the voting weight of colluding souls, or forcing souls to accept SBT—in this case, negative reputation). For example, if one soul proves that another soul is a robot, the case can go deep and publicly verify the results, resulting in a large number of negative reputation proofs for that soul.Similar use cases have arisen in the GitCoin QF ecosystem, which uses a series of indicators or signals to detect “collusive groups”.
  4. Zero-knowledge proof techniques such as MACI can cryptographically prevent certain proofs made by the soul from being provable. This discourages the sale of proofs because the bribe-giver cannot tell whether the bribe-taker has fulfilled the deal. There has been a lot of research on this technology, and eventually any non-financialized social mechanism could benefit from similar ideas.
  5. We can encourage whistleblowing, which destabilizes large-scale “collaboration”. It is not the detection and punishment of incorrect or abusive behavior, the detection and punishment of abusive collusion patterns. Excessive use of this technique is risky because of the potential for false bribery, but it is still essentially a viable tool.
  6. We can use peer-prediction mechanisms to encourage truthful reporting in all cases (unless collusion is severe).Attendees can prove each other’s presence, rather than the meeting, which also means that the number of participants that need to be bribed is very large and costly. Rewards don’t have to be financial, they can also be SBTs, and rewards are more positive for real community members than attackers.
  7. If some souls have a common interest, we can use a correlation coefficient that measures the correlation. For example, use correlation techniques in quadratic financing to quantify the correlation between two participants to determine their degree of intersection. If two players have many common interests, their incentive to reveal this fact to the quadratic funding mechanism (there are many common interests) will certainly decrease with the correlation discount, but it will never become zero or negative .

§8 COMPARISONS AND LIMITATIONS

While the range of proposed identity frameworks is nearly limitless, there are four prominent and similar paradigms in web3 that are worth comparing: the dominant “legacy” authentication system, the pseudonym economy, proof of personality, and verifiable credentials. Each paradigm highlights the important contributions and challenges to future development of the social proof paradigms we advocate, and we use these limitations as a springboard for exploring future directions. In conclusion, we also explain why we believe that soul and soul-bound tokens representing social identity are a more promising direction for privacy regimes.

8.1 Legacy

Legacy authentication systems rely on documents or ID cards issued by third parties (governments, universities, employers, etc.), and the provenance is also determined through third parties. While there is something to be understood about legacy systems, these systems are very inefficient and lack composability for fast, efficient coordination. Furthermore, these systems lack a social relational context, making the soul dependent on a centralized third party to confirm membership in the community, rather than being embedded in the community. For example, most government-issued ID cards are ultimately traced back to birth certificates issued by doctors and family members, who are the ultimate source of truth, but this also ignores many of the equally meaningful social ties that bind together , which provides a strong verification. In fact, when centers of concentration of power need to seek strong identities (such as obtaining security clearances from the government), they rarely rely on these documents, turning instead to the “social relations” approach. As a result, such legacy identity systems tend to concentrate power on issuers and those who can perform “due diligence” to obtain stronger proofs, who in turn become rigid and unreliable bureaucracies. A key goal of DeSoc is to ensure that government ID security requirements can be met and exceeded, allowing horizontal networks to provide greater security to all users through a range of social bases.

8.2 Pseudonymous Economy

Balaji Srinivasan, who coined and popularized the term “pseudo-name economy,” broadly popularized a social vision based on combining reputation systems with zero-knowledge proof mechanisms to protect privacy. His early emphasis on using pseudonyms was to avoid social mobs from damaging and destroying a person’s reputation and social relations. It envisions people accumulating transferable zero-knowledge proofs in their own wallets and evading reputational attacks by splitting the proofs into new wallets or multiple wallets, which may not be traceable. When picking proofs to transfer, there is a trade-off between the degree of pseudonymity required for the new account, which requires a choice between being more anonymous (transferring less proofs) or being distributed across social networks (transferring more proofs).

The practical difference between the typical pseudonymous economy proposal and DeSoc is that we do not emphasize the division of identities as the primary way to be immune to a culture of “accusation”. Some degree of segmentation (e.g. different souls between family, work, politics, etc.) can be beneficial, but in general, relying on a new identity as the main way to defend against attack has a lot of drawbacks, it makes loans and provenance Reputation staking becomes difficult, and it is poorly composable with governance mechanisms that attempt to correct correlation or sybil attacks.

Instead of allowing the victim to re-emerge in the attack under a new (if diminished) identity, DeSoc allows other methods, such as socializing the attacker. “Allegations” often arise because when a person (or bot) has little social connection with the victim, statements and actions are disengaged, and slanderous messages spread through non-relational networks. In the same way that SBT provides attribution to prevent counterfeiting, SBT traces the attribution of “slanderous behavior” on social relations. “Defamatory conduct” is essentially the product of being outside the victim community (as reflected by shared SBT members), or the lack of SBT proof from the victim community (which casts doubt on the veracity of the conduct). SBT also enables victims to mount defensive responses to counteract strikes orchestrated and propagated from their web of trust (represented here by the model of co-holding SBT). By maintaining social relationships, people can maintain trust even when they face the threat of “accuses” and hold attackers accountable. Improving provenance can improve the social basis of truth.

8.3 Proof of Personality (PoP)

The Proof-of-Personality Protocol (PoP) aims to provide tokens of personal uniqueness to prevent Sybil attacks and allow non-financialized applications. To do this, they rely on methods such as global analysis of social graphs, biometrics, synchronized global key players, or some combination of these. However, since the PoP protocol seeks to represent individual identities (to achieve global uniqueness), rather than mapping relationships and solidarity social relations, the core of the PoP protocol is to treat everyone equally, and most of the application directions we are interested in (such as reputation staking) , are all about people and go beyond being a “different” person to be a “unique” person.

Furthermore, PoP protocols are not immune to Sybil attacks. PoP systems are susceptible to Sybil attacks in almost all near-term foreseeable applications, albeit at a slightly higher cost. Unless the majority of people on the planet have signed up for a PoP service and participated in a specific verification activity, attackers can always recruit people who haven’t participated (or are not interested) to act as “witches”. While not all bots are hired, there is little difference, except that there may be some added fees.

Many PoP protocols are designed to build the foundations of a universal basic income or global democracy, and while we do not have the same ambitions, these protocols prompt us to think about how to gradually build and coordinate multiple network products. Unlike the binary, individualistic and global nature of PoP, we aim to build a rich, layered and interconnected foundation for bottom-up reputation, property and governance, and allow participation in communities and networks of all sizes .

8.4 Verifiable credentials

Verifiable Credentials (VCs) are a W3C standard where credentials (or certifications) can be shared at the holder’s discretion with zero knowledge. VCs highlight the main limitations of our baseline privacy paradigm and motivate us to further explore the privacy aspects described above. VCs and SBTs can be seen as natural complementary elements until SBTs have the ability to narrow the scope of openness: in particular, SBTs are initially public, so they are not suitable for sensitive information such as government-issued identification, while the implementation of VCs has always been In grappling with a recovery paradigm, this may be addressed by community resilience. In the short term, the combination of the two methods works better than either method alone. But VCs have a key limitation: at least in general, VCs do not support most of the application directions we enumerate because of their unilateral privacy.

Unilateral zero-knowledge sharing is not compatible with our use case and does not meet our normative definition of privacy. Most of our application directions rely on some level of publicity, but with zero-knowledge sharing, there is no way for a soul to know that another soul has SBT unless it is shared with each other. This makes reputational pledges, credible promises, witch-resistant governance, and simple lease contracts (such as apartment rentals) impossible to obtain visible additional promises or proof of title. More deeply, we doubt that unilateral shareability is the correct privacy paradigm, as one party in a multiparty relationship rarely has the right to unilaterally disclose the relationship without the consent of the other, just as unilaterally negotiable private property is not. Like a perfect property system, simple unilateral shareability is not a perfect privacy system. If two parties jointly own an asset and choose to represent their relationship through VCs, this credential does not allow for mutual consent and mutual permission. This involves more complex compound properties and complex organizational forms and permissions issues, which are a feature of DeSoc.

§9 SOUL BIRTH

The path from the current web3 ecosystem to the enhanced sociality of SBTs faces a typical cold start challenge. On the one hand, SBTs are non-transferable, and on the other hand, the current form of wallets may not be the ultimate destination for SBTs because they lack community resilience mechanisms. But in order for community resilience wallets to work, they need to provide different SBTs in a decentralized community to be safe. SBTs First or Community Resilience First? Who are the early adoption communities? How do SBTs on different chains interoperate? Rather than aspire to know all the possibilities and answers, we outline possibilities for readers to explore further in the current web3 (or even web2) architecture.

9.1 Initial SBTs (Proto SBTs)

While SBTs are non-transferable, SBTs may have another property that will highlight their role in development: revocability.SBT can first become a revocable, transferable token before it grows to be non-transferable. Tokens are revocable if the issuer can burn them and reissue them to a new wallet. For example, when a key is lost or compromised and the issuer is interested in ensuring the token is not monetized and sold to a party. (In other words, burning and re-issuing tokens would make sense when tokens signify true community membership.) Employers, churches, meetup groups, off-chain interactive clubs with multiple contacts are all burning and re-issuing tokens. A great place for coins because they have a relationship with someone and can easily check for impostors via phone calls, video conferences, or simple face-to-face meetings. And a single interaction, such as the way to attend a concert or a conference, has a weaker community connection and is not suitable.

Revocable and transferable are the initial properties of the initial SBT before the soul is born. These tokens buy time for wallets to breed secure community resilience mechanisms and for individuals to accumulate initial SBT (which can eventually be burned and reissued as non-transferable SBT). In this approach, the question is no longer “SBTs first or community resilience first?” Instead, SBTs and community resilience mechanisms work together to give birth to a soul.

9.2 Community Recovery Wallets

While today’s wallets lack community resilience, they have their own pros and cons as SBT’s home or “breeding ground”.The beauty of Proof-of-Personality (PoP) protocols is that attempts are already being made to build social dispute resolution mechanisms that are the foundation of community resilience. Additionally, many DAOs use POPs to facilitate governance, making them the natural first issuers of SBTs. However, despite PoPs ahead, PoP protocols have yet to gain the widespread trust to store valuable token assets, which escrow wallets do.

Custody wallets (heavier centralization) have therefore become the dependencies of immature users. Such custodial wallets can build tools for the retail community to issue revocable tokens that can then be converted (or reissued) into SBTs, or even more “enterprise” issuers that lack the relevant expertise ( Many of them seek to build a base of loyal customers in web3). Once the community resilience mechanism is formalized and tested, these custodial wallets can be decentralized into community resilience, while the custodians continue to provide other valuable services (such as community management, SBTs issuance, etc.) in DeSoc.

For more in-depth web3 users, decentralized non-custodial wallets (or non-custodial community resilience wallets like Argent and Loopring) are a natural starting point to bootstrap the community recovery mechanism. The advantage of a non-custodial wallet is that it is native web3 open source, and the mechanism can be pre-announced and gradually experimented, allowing a subset of willing, mature users to participate in the experimentation of incentive mechanisms and hybrid mechanisms (such as multi-signature). All of these approaches: POP, custodial and non-custodial, play an important role in testing and onboarding users with different levels of maturity and risk tolerance.

9.3 Proto-Souls

Codes of conduct can also guide the existence of the soul. As we rethink tokens and wallets, we can also restructure certain classes of NFTs and tokens that highlight membership. In particular, we could introduce a norm not to transfer NFTs and POAPs issued by reputable institutions that respect conference attendance, work experience or educational credentials. The transfer of such membership tokens (if traded in value) may reduce the reputation of the wallet and may prevent the issuer from further issuing membership or POAP tokens to the wallet. In a non-custodial ecosystem, a large number of users gain considerable financial reputation and hold shares in their wallets, which can serve as indirect collateral against their expectation of non-transferability abuse.

While all of these pathways have their own challenges, we hope that, through a methodically diverse set of small steps, we increase our chances of converging to a quasi-equilibrium state in the medium term.

§10 Conclusion

While we have high hopes for what DeSoc can achieve, the above are just the first steps. There is more than one road to DeSoc, including many non-blockchain-based frameworks such as Spritely, ACDC, and Backchannel, which rely on data storage tied to a local machine rather than a distributed ledger. These frameworks may ultimately enable greater trust across social distancing, as they can leverage the transitivity of trust relationships (such as trusted introductions) rather than relying on SBTs issued by well-known, authoritative institutions (such as universities or DAOs). Furthermore, the applications we describe above are just the beginning of DeSoc’s reinforcement and do not involve virtual worlds: their “physics”, society, and their complex relationship to the real world. All of this suggests that the lofty ideals we’ve depicted above may just be the “rudiments” of DeSoc’s final form.

However, there are still many challenges and problems to be solved along this path. The above blueprint is still relatively abstract and theoretical, and needs to be constantly tried and improved. How do DAOs balance soul patterns and correlations in SBTs to prevent Sybil attacks and ensure decentralization while maintaining openness? How does Incentive Compatibility earn SBTs for Relevance Discount Schemes? How much conflict does privacy have with related discounts and other DeSoc mechanism designs? How do we measure inequality in a social (open), yet appropriately private, way? How should legacy systems work in community resilience mechanisms? Is it redlined, or even included in the protocol, to avoid a dystopian situation? Or should the best scenario be created? These issues are only part of a research and development process that may last for several years in the future, and they will evolve with the ecological development of DeSoc.

However, DeSoc’s potential is worth the price of these challenges, and it may be necessary to ensure our survival. Albert Einstein said at the Geneva conference in 1932 that “the organizational capacity of man” has not yet kept pace with “technical development”, which is the equivalent of having “a 3-year-old child with a razor.” His ideas are so prescient that learning how to program the future of society, rather than rhetoric based on “trust,” seems to be a required course for humans to survive on this planet.

11 References

  1. We thank Audrey Tang, Phil Daian, Danielle Allen, Leon Erichsen, Matthew Prewitt, Divya Siddarth, Jaron Lanier and Robert Miller for their thoughtful feedback and comments. All errors and opinions are our own responsibility.
  2. Microsoft Corporation & RadicalXChange Foundation, glen@radicalxchange.org. Glen vinicula este documento a su Alma.
  3. Flashbots Ltd., puja@ashbots.net. Puja gave this text to his grandmother Satya, whose love and light will continue to shine on countless souls
  4. Ethereum Foundation, vitalik.buterin@ethereum.org.
  5. We chose this set of properties not because they are clearly the most desirable set of features, but because they are easy to implement in the current environment and support a lot of functionality. We will discuss programmable private SBTs in Section 5.3.
  6. Note, however, that in principle de jure names can be represented as SBTs: a family name would be a member SBT of a family group, and a given name could be an SBT given to a child by parents. In fact, a richer name concept would be easily represented if other family members or related persons gifted a member SBT to a new child.
  7. https://twitter.com/VitalikButerin/status/1264948490834247681https://twitter.com/VitalikButerin/status/1265252184813420544 Evidence from informal twitter surveys suggests that the idea of ​​taking into account diversity in decision-making mechanisms is already perceived as intuitive of.
  8. Not enough data accumulated: https://www.technologyreview-com/2021/06/17/1026519/racial-bias-noisy-data-credit-scores-mortgage-loans-fairness-machine-learning/
  9. Social Recovery: https://vitalik.ca/general/2021/01/11/recovery.html
  10. 马修效应:https://en.wikipedia.org/wiki/Matthew_effect
  11. 数据协作:https://www.noemamag.com/a-view-of-the-future-of-our-data/
  12. 跨国企业:https://press.uchicago.edu/ucp/books/book/chicago/P/bo138501033.html
  13. 我们之所以说“无辜”,是因为高度合作的团体自然会寻求推进他们的利益,可能会影响他们的集体利益。
  14. 在二次规则下,团队成员可以购买在事件发生的情况下支付$X的合同,但成本为(X^2)/ $ 2。例如,如果发生事件,设置X = 0.5的个人将获得0.5美元,即选民支付的金额,并且在任何情况下至少为0.125美元。
  15. 如果一个人评估概率p,他们的预期奖励Λ是pX,他们的成本是X^2/2。关于X的导数,最优条件是p=X,假设风险中性,这对于小赌注是合理的(奖励Λ和成本都可以任意减少或增加,相同的论点仍然成立)。
  16. 参见Eric Posner,Glenn Weir,Radical Markets:Eradicat Capitalism and Democracy for a Just Society,普林斯顿大学出版社,2018年。

发布者:CoinYuppie,转载署名:https://coinyuppie.com/full-text-version-of-the-latest-papers-by-vitalik-et-al-decentralized-society-finds-the-soul-of-web3/
Coinyuppie是一个开放的信息发布平台,所提供的所有信息与coinyuppie的观点和立场无关,也不构成任何投资和财务建议。用户应仔细筛选并预防风险。

 

 

 

“Decentralized Society: Finding the Soul of Web3” is the latest paper by Vitalik et al. This paper describes how to achieve a richer and more diverse ecosystem through soul-bound tokens, namely “Decentralized Society (DeSoc) and Critical Decomposable Property Rights and Enhanced Governance Mechanisms in a Decentralized Society”. Therefore, the DAOrayaki community translated this article and organized multiple Podcasts for in-depth analysis.

Summary

Today, Web3 is more about expressing transferable, financialized assets than an encoding of social trust relationships.However, many core economic activities, such as unsecured lending and building personal brands, are built on lasting, non-transferable relationships. In this paper, we illustrate how non-transferable “soulbound” tokens (SBTs) representing “soul” commitments, certificates and relationships encode the real economy’s web of trust to establish provenance and reputation. More importantly, SBTs can enable other and more application scenarios, such as community wallet recovery, anti-virus governance, decentralized mechanisms, and new markets with decomposable, shared rights. We call this richer, more diverse ecosystem a “decentralized society” (DeSoc) – a co-determined sociality in which “souls” and communities come together bottom-up as Emerging attributes of each other, co-create complex network goods and knowledge at different levels. Key to this sociality are decomposable property rights and enhanced governance mechanisms—such as quadratic funding discounted by relevance scores—that reward trust and cooperation while protecting the network from capture, extraction, and control. With this enhanced sociality, Web3 across social distancing can ditch today’s hyper-financialization in favor of a more transformative, diverse future, one that is constantly evolving.

§ Chapter 1 Introduction

In less than a decade, Web3 shocked the world by creating a unique and flexible parallel financial system never seen before. Fundamental elements of cryptography and economics, such as public key cryptography, smart contracts, proof-of-work, and proof-of-stake, bring a complex and open ecosystem to financial transactions.

However, the economic value of financial transactions is generated by humans and their relationships. Since Web3 lacks the foundational elements that represent this social identity, it is fundamentally dependent on the centralized Web2 structure that it seeks to transcend, thus replicating its limitations.

This dependency is reflected in:

  1. Most NFT artists rely on centralized platforms like OpenSea and Twitter to promise scarcity and initial provenance.
  2. DAOs trying to go beyond simple coin voting often rely on Web2 infrastructure, such as social media accounts, to resist Sybil attacks.
  3. Many Web3 participants rely on custodial wallets managed by centralized entities such as Coinbase or Binance. A decentralized key management system is not friendly enough for anyone but a few geeks.

Furthermore, due to the lack of native Web3 identities, today’s DeFi ecosystem cannot support activities ubiquitous in the real economy, such as undercollateralized loans, or simple contracts like apartment rentals. In this article, we demonstrate that even a small step toward representing social identity with “soul-bound” tokens can overcome these limitations and move the entire ecosystem toward re-establishing a Web3 world that reflects native human relationships market has taken a big step forward.

Going a step further, we point out that native Web3 social identities, because of their rich social composability, can make great progress on broader long-term issues in Web3 around wealth concentration and governance vulnerability to financial attacks, while stimulating innovation. Cambrian explosion of political, economic and social applications. We refer to these use cases and the richer diverse ecosystems they enable as the “Decentralized Society” (DeSoc).

§ Chapter 2 Outline

We start by explaining the basic elements of DeSoc, which revolve around accounts (or wallets) holding non-transferable (initially public) “soul-bound” tokens (SBTs), representing commitments, credentials, and relationships. This token is like an extended resume, issued by other wallets that can attest to these social connections.

We then describe a “ladder” of increasingly powerful applications implemented in the social stack by these basic elements of DeSoc, including:

  1. establish provenance
  2. Unlocking the under-collateralized lending market through creditworthiness
  3. Implement decentralized key management
  4. Frustrating and counteracting coordinated strategic behavior
  5. Measuring decentralization
  6. Create new types of marketplaces with decomposable, shared rights and permissions

The culmination of this description is the vision of DeSoc – a co-determined sociality in which “souls” and communities come together bottom-up, as emerging attributes of each other, at different levels together to create composite network products, including composite intelligence.

Finally, we answer several possible concerns and objections and compare to other identity paradigms familiar in the Web3 space, acknowledging that our vision is only a first step, but still an advance in programmable privacy and communication.We then consider technical pathways to guide our imagined vision. On this basis, we look to a more philosophical point of view that DeSoc has the potential to redirect Web3 to a more profound, legitimate and transformative path.

§ Chapter 3 “Soul”

The key fundamental element we are talking about is an account, or wallet, that holds publicly visible, non-transferable (but possibly revoked by issuer) tokens [5]. We refer to accounts as “souls” and the tokens held by them as “soul tokens” (SBTs). Despite our strong interest in privacy, we initially assumed publicity because, as a concept, it was technically easier to verify, even if limited by the types of tokens people were willing to share publicly. Later in this paper, we introduce the concept of “programmable privacy” for richer use cases.

Imagine a world where most participants have “souls” that store SBTs, corresponding to a series of relationships, memberships, and credentials. For example, a person might have a “soul” that stores SBTs, representing educational credentials, employment history, or a string of hashes representing their writings or works of art. In their simplest form, these SBTs are “self-documenting,” similar to how we share information about ourselves in a resume. But the real power of this mechanism arises when SBTs held by one “soul” can be issued or attested by other “souls” who are counterparties to these relationships. These counterparty “souls” can be individuals, companies or institutions. For example, the Ethereum Foundation could be a “soul” that issues SBTs to “souls” attending developer conferences. A university can be a “soul” that issues SBTs to graduates. A stadium can be a “soul” that hands out SBTs to longtime Dodgers fans.

Note that there is no requirement that a “soul” must be associated with a legitimate name, nor is there any protocol-level attempt to ensure “one soul per person”. “Soul” can be a long-used pseudonym with a series of SBTs that is not easily linked to real people [6]. Nor do we assume that “souls” are not transferable between humans. Instead, we try to illustrate how these properties emerge naturally from the design itself when needed.

§ Chapter 4 The Ladder to a Decentralized Society

4.1 Art and “Soul”

“Soul” is a natural way for an artist to stake his prestige in his work. When issuing tradable NFTs, artists can issue NFTs from their “soul”. The more SBTs an artist’s “soul” carries, the easier it is for buyers to identify that the “soul” belongs to the artist, and thus determine the legitimacy of the NFT. Artists can go a step further and post a linked SBT in their “soul” certifying that an NFT is a member of that “collection” and vouching for any scarcity limits the artist wishes to set. As such, Soul will create a reliable, on-chain way to stake and build reputation on an object’s provenance and scarcity.

The scope of applicability extends beyond art to services, rentals and any market built on scarcity, reputation or authenticity. An example of the latter is verifying the authenticity of so-called factual records, such as photos and videos.As deepfake technology advances, direct inspection by humans and algorithms will become less and less able to detect authenticity. While the addition of blockchain allows us to track when a particular work was made, SBTs will allow us to track social provenance, providing us with a rich social context that allows us to understand the “soul” of the published work – their membership, A combination of relationships, credentials—and their social distance from the work. “High imitations” can be easily identified because these artworks are not produced in the corresponding temporal and social context, while credible artworks (such as photographs) are attested by well-known photographers. Whereas current technology decontextualizes cultural products (like pictures) and exposes them to uncontrolled viral attacks in the absence of social context, SBTs can recontextualize these objects and make the “soul” “Being able to leverage the trust relationships that already exist within the community as a meaningful backstop for protecting reputation.

4.2 The “soul” borrows

Perhaps the greatest financial value built directly on reputation is credit and unsecured loans. Currently, the Web3 ecosystem cannot replicate even a simple form of unsecured lending, as all assets are transferable and marketable, and thus can only be a simple form of collateral. The “traditional” financial ecosystem supports many forms of unsecured lending, but relies on centralized credit scores to measure borrowers’ creditworthiness, with little incentive for borrowers to share their credit history information. This score has many flaws. At best, they weight and de-weight factors related to creditworthiness in an opaque way and bias against those who have not accumulated enough data [8] – mainly minorities and the poor . At worst, they can manipulate Black Mirror-like “social credit” systems and reinforce discrimination.

An ecosystem of SBTs could create a censorship-resistant, bottom-up alternative to the top-down commercialized “social” credit system. SBTs representing educational credentials, employment histories, and lease contracts can be durably recorded as credit-related histories, allowing “souls” to pledge a good reputation to avoid collateral requirements and obtain loans. Loans and lines of credit can be represented as non-transferable but revocable SBTs, so they are nested within other SBTs of the “soul” – an indivisible collateral for reputation – until they are repaid and subsequently destroyed; or Better yet, replace it with proof of repayment. SBTs offer helpful security properties: non-transferability prevents transferring or hiding outstanding loans, while a rich SBTs ecosystem ensures that borrowers trying to evade a loan (perhaps by creating a new “soul”) will lack SBTs to meaningfully stake their reputation.

The ease with which SBTs can be used to calculate public debt will make lending markets more open. New correlations will emerge between SBTs and repayment risk, giving rise to better lending algorithms for predicting creditworthiness, reducing reliance on a centralized, opaque credit scoring infrastructure. Also, borrowing can happen in social connections.In particular, SBTs will be the basis for community lending practices similar to those pioneered by Muhammad Yunus and Grameen Bank, where members of a social network agree to support each other’s debts. Since all SBTs of a “soul” represent membership in different social groups, participants can easily discover other “souls” who will become important co-participants of the group lending program. Commercial lending is a “borrow and forget” repayment model, while community lending may take a “borrow and help” approach—combining working capital with human capital for a higher rate of return.

How does unsecured community lending come to fruition? In the beginning, we wanted “souls” to only carry SBTs with information they were willing to share publicly, such as information on a resume. Although limited in scope, this may be sufficient for intra-community lending experiments, especially if SBTs are issued by reputable institutions. For example, a combination of SBTs showing certain programming credentials, having attended several conferences and working experience may be an advantage for “souls” to get venture capital (or raise seed money) for them. Such credentials and social ties have informally played an important but opaque role in the allocation of capital such as venture capital.

4.3 Don’t lose your “soul”

The non-transferability of some important SBTs – such as one-time educational certificates – raises an important question: How do you avoid losing your “soul”? Today’s recovery methods, such as multi-sign recovery or mnemonics, have different tradeoffs in terms of mental load, ease of transaction, and security. Social recovery [9] is an emerging alternative method that relies on a person’s trusting relationship. SBTs allow for a similar, but broader paradigm: community recovery, where the “soul” is the cross-voting of its social network.

Social recovery is a good starting point for safety, but has several drawbacks in terms of safety and usability. A user curates a group of “guardians” and empowers them through the majority to change the keys to their wallets. Guardians can be a combination of individuals, institutions or other wallets. The problem is that users have to find a balance between having a relatively large number of guardians and ensuring that guardians are from unrelated social circles to avoid collusion.Additionally, guardians may die, relationships go sour, or simply lose touch, resulting in frequent, attention-consuming updates. While social recovery avoids a single point of failure, successful recovery depends on planning and maintaining a trusting relationship with the majority of guardians.

A stronger solution would be to tie Soul recovery to Soul membership in the community, without curating but maximizing broad real-time relationships for security. To recap, SBTs represent membership in different communities. Some of these communities – such as employers, clubs, colleges or churches – may be more off-chain in nature, while others – such as participating in protocol governance or DAOs – may be more on-chain in nature. In the community recovery model, restoring the soul’s private key requires the consent of a majority of members from the “soul” community (a random subset).

Full text version of the latest papers by Vitalik et al: Decentralized society finds the soul of Web3

Like social recovery, we assume that “souls” have access to secure off-chain communication channels where “authentication” can take place – through conversations, face-to-face or sharing secrets. Such communication channels require greater bandwidth (theoretically the ability to carry richer “information entropy”) than the computation of on-chain bots or SBTs themselves. In fact, we can think of SBTs as fundamentally representing participation or access to this real (i.e. high bandwidth) communication channel.

Actionable details require experimentation. For example, how guardians are selected and how many guardians’ consent is required are key safety parameters that require further research. However, with such a rich repository of information, community recovery should be computationally possible, with increased security as “souls” join more diverse communities and form more meaningful relationships.

Community recovery as a safety mechanism embodies the identity theory proposed by the early 20th century sociologist and founder of social network theory, Georg Simmel, that individual identities emerge from the intersection of social groups, as Social groups emerge from the intersection of individuals as well. Maintenance and restoration of cryptoassets to Soul requires the consent of the Soul network. By embedding security in sociality, souls can always regenerate their keys through community restoration, which prevents the theft (or sale) of “souls”: since the seller needs to prove that the sale is a restoration relationship, any sale of “souls” Attempts lack credibility.

4.4 “Souldrops”

So far, we’ve explained how “souls” represent individuals and re-emerge their unique traits and group identities when they acquire SBTs, and thus their relationships, memberships, and credentials. Such personalization helps souls build reputation, establish provenance, enter unsecured lending markets, and protect reputation and identity. But the reverse is also true; SBTs also enable communities to be called together at unique intersections of “souls”. So far, Web3 has relied heavily on token sales or airdrops to rally new communities with little accuracy or precision. Airdrops, where tokens are algorithmically distributed for free to a set of wallet addresses, mostly fall into some combination of existing token holders and wallets, are vulnerable to sybil attacks, and encourage strategic behavior and Matthew effect [9]. SBTs have a radical improvement on this, which we call the “Soul” airdrop.

“Soul” airdrops are airdrops calculated based on SBTs and other tokens within “Soul”. For example, a DAO that wants to convene a community within a particular Layer 1 protocol could airdrop to developers holding SBTs with 3 attendances from the past 5 conferences, or other tokens representing attendance such as POAPs. The protocol can also programmatically weight the placement of tokens in various combinations of SBTs. We could imagine a nonprofit with a mission to plant trees throwing governance tokens into “souls” holding a combination of environmental action SBTs, gardening SBTs, and carbon sequestration tokens—perhaps to carbon sequestration token holders more tokens.

“Soul” airdrops can also introduce new incentives to encourage community participation. Airdropped SBTs can be designed to be “soul” bound for a period of time, but ultimately “vested” as transferable tokens over time. vice versa. Transferable tokens held for a period of time unlock the rights to SBTs, giving the protocol further governance rights. SBTs open up a wealth of possibilities to experiment with different mechanisms to maximize community engagement and other goals such as decentralization. We discuss further below.

4.5 DAO composed of “souls”

Distributed Autonomous Organizations (DAOs) are virtual communities brought together around a common purpose, coordinated through smart contract voting on a public blockchain. While DAOs have great potential for coordinating global communities, they are vulnerable to sybil attacks, where a user can have multiple wallets to accrue voting power, or in less sophisticated one-coin-one-vote governance, simply hoarding Tokens to accrue 51% of voting rights and deprive the other 49% of their holders.

DAOs can mitigate Sybil attacks by SBTs in several ways, namely:

  1. Count a collection of “souls” of SBTs to distinguish unique souls from possible robots, and deny a suspected witch’s “soul” any voting rights.
  2. Give more voting rights to those “souls” with more prestigious SBTs – such as work or education certificates, licenses or certifications.
  3. Issue specialized “proof-of-personhood” SBTs, which could help other DAOs deploy resistance to witches more easily.
  4. Check the correlation between the SBTs held by “souls” who support a particular vote, and apply lower vote weights to voters who are highly correlated.

The last idea of ​​correlation checking is particularly promising and innovative. A vote that is supported by many “souls” who share the same SBTs is more likely to be a witch attack, even if it is not a witch attack, such a vote is more likely to be made by a group of “souls” who have made the same mistakes in judgment or have the same prejudices, Therefore, it should be reasonably weighted compared to votes with the same amount of support but from a more diverse group of participants [7].

We explore this idea mathematically in more detail in the appendix, where we introduce a new foundational element called the “Relevance Score”. This concept of correlation discounts can be extended to structured prudential talks. For example, DAOs that are easily captured by the majority can calculate SBTs to maximize the grouping of diverse members in talks, ensuring that the voices of the minority are heard.

DAOs can also rely on SBTs to prevent some strategic behaviors such as “vampire attacks”. In this type of attack, a DAO—usually a related DeFi protocol with economic value—uses tokens to lure users’ liquidity into it by copying another DAO’s open-source code, plagiarizing others’ R&D results. The DAO could do this by first creating a norm around “soul” airdrops (perhaps holding specific SBTs), only airdropping “souls” that might resist Sybil attacks and providing liquidity, and then withholding those who divert their liquidity in a vampire attack Airdrop of “Soul”. The same mechanism does not work for wallet airdrops, as holders can spread liquidity across many wallets to obfuscate their liquidity traces.

DAOs can also use SBTs to enable leadership and governance to respond programmatically to their communities.Leadership roles can change dynamically as the composition of the community changes – this is reflected in the changing distribution of SBTs among members’ “souls”. A subset of members can be promoted to potential management roles based on their intersectionality and reach across multiple communities within the DAO. Protocols that value community cohesion can use SBTs to keep the “soul” at the center of the layer across the circle. In addition, DAOs can choose to make certain combinations of characteristics have a higher probability of entering the governance layer than others, such as diversity in zip codes or DAOs that span more diverse interests.

4.6 Measure decentralization from the perspective of Pluralism

When analyzing real-world ecosystems, it is best to measure how decentralized the ecosystem is. To what extent is the ecosystem truly decentralized, and to what extent is it “fake” and in fact dominated by a single person or a small group of common actors?

Two popular indicators of decentralization are the Nakamoto coefficient proposed by Balaji Srinivasan, which measures how many different entities need to combine to collect 51% of resources; and the Herfindahl-Hirschman index. – Hirschman index), a measure of market concentration in antitrust, calculated by summing the squares of market participants’ market shares. However, none of these approaches address the key questions of what is the right measurement resource, how to deal with partial coordination, and how to deal with the formation of a “discernable entity” grey area.

For example, nominally independent companies may have many common major shareholders, have directors who are friends with each other, or be regulated by the same government. In the context of token protocols, measuring the decentralization of token holdings by looking at on-chain wallets is highly inaccurate, as many people have multiple wallets, and some wallets (such as exchanges) represent many people . Furthermore, even if addresses can be traced back to unique individuals, these individuals may be socially related groups prone to accidental coordination (best case) or deliberate collusion (worst case). A better measure of decentralization should be able to capture social dependencies, weak ties, and strong identities.

Full text version of the latest papers by Vitalik et al: Decentralized society finds the soul of Web3

Miners and mining pool operators, who make up 90% of all Bitcoin, sit together for meetings.

SBTs support a different way of measuring the level of decentralization (or diversification) in a DAO, protocol or network.

  1. As a first step, the protocol could limit token voting to “souls” that are better resistant to Sybil attacks (or have more abundant SBTs).
  2. In the second step, the protocol can check the correlation between the SBTs held by different “souls”, and if the “souls” share a large number of SBTs, discount their votes (to pool them and distinguish them individually). (We explore the latter idea in more detail mathematically in Appendix A, where we introduce a new underlying element called the “Relevance Score”).
  3. As a third step, to amplify and understand the decentralization of the entire network, we can measure the correlation of SBTs held by “souls” at different levels of the network stack – measuring voting, token ownership, governance related communication, and even control over computing resources.

SBTs allow us to begin to measure the degree of decentralization of an interoperable and layered ecosystem, which is very difficult to measure today. There’s also the big question of what formulas best capture what we want to measure and are the least likely to be manipulated. We will have many questions about how to check the relationship between SBTs – giving some SBTs more weight than others, discounting nested SBTs, or taking into account the composition of transferable tokens within a “soul” . However, with a rich ecosystem of “souls” and SBTs, there will be more data to perform these calculations and move towards meaningful decentralization.

4.7 Compound Assets

DAOs typically own assets, or are organized around owning an asset, both in the virtual and physical worlds. So far, the scope of Web3 has been largely limited to a small class of property where all rights are fully transferable: tokens, NFTs, artwork, first editions or rare manuscripts like the U.S. Constitution, etc. But the emphasis on transferability works against Web3, making it unable to represent and support some of the simplest and most common property contracts today, such as apartment rentals. In the Roman legal tradition, property rights were considered to consist of rights to use (“usus”), consume or destroy (“abusus”), and gain (“fructus”). All of these rights are rarely jointly owned by the same owner. For example, an apartment lease grants the lessor a limited right of use (“usus”), but not the unfettered right to destroy the apartment (“abusus”), sell the apartment (“fructus”), or even assign the right of use (sublease). . Rights to immovable property (land) are usually subject to a series of restrictions on private use, the grant of public use rights, restrictions on the right to sell, or even the right to purchase through eminent domain. They are also often secured by a mortgage that transfers some financial value to the lender.

Future asset innovations are unlikely to be built on fully transferable private property as imagined so far. Instead, innovation will depend on the ability to decompose property rights to match the characteristics of existing property systems and to encode richer constructions. Corporations and other organizational forms have evolved precisely to restructure property rights in more creative ways—for example, allowing employees to use proprietary facilities (“usus”), but reserving managers the right to alter or damage assets (“abusus” ) while paying shareholders the most financial benefit (“fructus”). SBTs have the flexibility to represent and extend this nuanced property rights to physical and virtual assets, while encouraging new experimentation. Here are a few use cases:

  1. Allow access to privately or publicly controlled resources (eg, homes, cars, museums, parks, and virtual equivalents).Transferable NFTs don’t capture this use case well, as access is often conditional and non-transferable: if I trust you to come into my backyard and use it as an entertainment space, it doesn’t mean I trust you to Sublicense this license to others.
  2. Data Cooperatives [10], where SBTs grant access to data to researchers, while instantiating (perhaps through quadratic voting) the rights of members to grant access, and bargain for economic rights to discoveries and intellectual property arising from research . We’ll explore this further in Chapter 5, “Plural Sensemaking.”
  3. Experiment with local currencies and make rules that make the currency held and spent by “souls” residing in a particular region or belonging to a particular community of higher value.
  4. Experiments in engagement, SBTs create a sustainable base for lesser background “souls” (eg immigrants, adolescents) to gain influence in new and wider networks. Such souls will start with confined SBTs, connecting them with their families or local communities. As their relationships gradually diversify, they will acquire wider SBTs, thereby gaining voting power to influence a wider network – the spirit of Danielle Allen’s idea of ​​multinationalism [12] – a process currently governed by arbitrary age and place of residence.
  5. Experiments designed by markets, such as Harberger taxation and SALSA (Self-Assessment License in Auction), in which asset holders publish a self-assessed price from which anyone else can buy the asset, And a tax proportional to that self-assessed price must be paid periodically to maintain control. SBTs can be used to create more nuanced versions of SALSA—for example, participation rights are approved by the community to reduce strategic behavior from within or outside the community.
  6. Experiment with the design of democratic mechanisms, such as quadratic voting. Holders of SBTs, which represent community membership, can vote quadratically on parameters such as incentives and tax rates. At the end of the day, ‘market’ and ‘politics’ are not separate design spaces; SBTs can become a major part of a tech stack, allowing the entire space where these two categories intertwine to be explored. Another such intersection is the provision of public goods through quadratic fundraising, for example.

Of course, some utopian scenarios can also be considered. The immigration system can use immigrant SBTs for licensing.Regulatory capture can be achieved by nesting community tokens, where homeowners have a disproportionate number of votes the right to obstruct housing construction. SBTs can automatically redline. As we discuss further below, these situations should be considered in the context of currently opaque top-down licensing and discrimination. SBTs will make discrimination more transparent and therefore potentially questionable.

4.8 From private and public goods to composite network goods

More broadly, SBTs allow us to effectively represent and manage any asset or commodity that is somewhere between completely private and completely public. In reality, even goods consumed by individuals have positive spillover effects, just as they enable consumers to better contribute to households or communities, and even the most globally available public goods (e.g. climate) are unavoidable Land is more useful to some people than others (eg Seychelles to Siberia). Likewise, human motivations are rarely completely selfish or completely altruistic, and there will be many pre-existing modes of cooperation that are less in some communities and more in others.

However, today’s mechanism designs assume atomic, selfish agents with no pre-existing cooperation, which often leaves the mechanism vulnerable to innocent over-coordination [13]. Worst-case scenario is the deliberate collusion of already cooperating groups. Consequently, even the best public financing models, including quadratic financing (QF), cannot scale.QF encourages coordination by providing a reduced reward for the concentrated action of the minority, while providing an increased reward for the collective action of the majority. 10 people split the $1 for a $99 match, resulting in a total of $100, while the $10 donated by one person is not matched. Mathematically, this is done with funds that match the square of the sum of the square roots of individual contributions (which we elaborate further on in the appendix). However, even a weak partnership between large groups like (e.g. most citizens of China) (eg donating $1 to a cause) dominates the system and absorbs all its matching funds because QF has The number of unique contributors gives a premium. Just like now, QF does not discount the coordination between related special interests, which will not only cause the QF mechanism to malfunction, but also the relevant special interests will be rewarded.

But rather than viewing pre-existing cooperation as a mistake we should “rewrite”, the key is to acknowledge that it actually reflects a part of cooperation that we should capitalize on and compensate for. After all, we are in a business that encourages collaboration. The trick is to make quadratic mechanisms work with pre-existing cooperative networks, correcting their biases and tendency to over-coordinate. SBTs provide a natural way for us to tip the balance in favor of cooperation across differences. As Nobel laureate Eleanor Ostrom has emphasized, the question is not about coordinating public goods per se, but how to help communities of imperfectly cooperative but socially connected individuals overcome them social differences and scale coordination across wider networks.

If SBTs represent community membership relationships that reflect Souls/Soul cluster bias, then favoring collaboration across differences simply means discounting collaboration rewards for similar or related Souls/Soul clusters that are driven by their shared SBTs measure. The assumption is that consensus among different allies is better at creating composite goods that apply to a wider network, while consensus among similar allies is more likely to serve only over-coordination (or collusion) of narrower interests. )s product.

By revealing membership between different Souls/Soul Sets, SBTs allow us to discount pre-existing collaborations and expand quadratically in emerging networks, empowering composite items to a wider group of interests, And by the consent of diverse members, not by innocent over-coordinated (or deliberately complicit) special interest groups that give items narrow meanings. The exact formula for the “best” correlation discount depends on the model details and has not been studied, but we provide first-hand data from experiments in the appendix for further study.

§5 Compound meaning construction

An example of a variety of online goods that are increasingly prominent in the digital world are predictive models built on user data. Both artificial intelligence (AI) and prediction markets attempt to predict future events based on data obtained primarily from users. But both paradigms are limited in different and almost opposite ways. The dominant paradigm in AI eschews incentives and instead collects data feeds (public or privately surveilled) and synthesizes them into predictions through proprietary large-scale nonlinear models, which consistently leverage the default web2 pair “usus” There is a monopoly and no “fructus” is attributed to the data workers.

Prediction markets take the opposite approach, with people placing bets on outcomes in the hope of financial gain, relying entirely on the economic incentives of financial speculation (“fructus”), without comprehensively analyzing bettors’ beliefs to produce composable models. At the same time, the conclusions produced by both paradigms are described as “objective” truths. AI models are described as “universal” or “universal intelligence,” while prediction markets are described as summarizing all the beliefs of market participants into one number: the equilibrium price.

A more productive paradigm is to eschew these extremes and draw on the strengths of both, while making up for their weaknesses to make them richer in breadth. We propose to combine the complexity of nonlinear AI models with the market incentives of prediction markets to transform passive data workers into active data creators. With this rich information rooted in the sociality of the data creators, DeSoc is able to unleash a composite intelligence network that is more powerful than either method.

5.1 From prediction markets to compound predictions

Prediction markets are designed to aggregate beliefs based on wealth and risk appetite from those willing to bet. But this “survival of the fittest” is not an ideal way to aggregate beliefs. In a zero-sum game, where one trader’s gain is another’s loss, it assumes that a general predictive power is fought against “smart people” rather than “dumb people.” While wealth may be a proxy for certain abilities and expertise, predictions of other forms of related expertise may be more reliable.Participants who lost bets in one area may have more accurate beliefs in another area. But prediction markets have the unfortunate effect of creating belief in those with a propensity to gamble, making those who win bets rich, making others poor, and preventing widespread participation by the risk-averse.

There are better ways to inspire belief. Research has shown that while prediction markets often outperform simple surveys, they are not better than complex team prediction surveys, which give people an incentive to share and discuss information. Under the team deliberation model, where members can weigh based on factors such as past performance and peer reviews, the team engages in semi-structured discussions to bring together information that cannot simply be encapsulated in a buy-sell contract. Such team deliberation models can be further improved by the quadratic rule in order to obtain accurate probability estimates from all participants (in contrast to prediction markets, which can only obtain up and down views about the current price balance) [14]. It has been shown that the number of contracts people are motivated to buy reflects their subjective assessment of probability. [15] Such a market would also distribute the gains from participation more equally, rewarding the right people without bankrupting others, making everyone a participant in future rounds.

SBTs can unlock a new class of rich models and experiment with predictive power and relative expertise. Prediction markets come up with just one number, the price of the contract, and quadratic voting gives each participant’s exact belief in the probability of an event. SBTs are able to further compute these beliefs in the social context of participants’ educational credentials, membership, and general sociability to develop better weighted (or non-linear integrated) predictive models, which are likely to emerge in new, unforeseen circumstances A new generation of expert forecasters emerges at the intersection. So even if polls don’t do a good job of gathering beliefs, polls can be studied retrospectively to reveal the characteristics of “more correct” participants, and to call in more targeted “experts” in future polls , perhaps in the context of a deliberative team. These mechanisms are closely related to those we advocate in this paper. A quadratic mechanism discounted by correlation scores can transform poorly coordinated top-down public goods into powerful, bottom-up composite network goods. Likewise, they can transform governance systems based on zero-sum prediction markets into more decision-making in a positive-sum sense, encouraging the revealing and synthesis of new, better information.

5.2 From artificial intelligence to compound intelligence

Large-scale nonlinear “neural network” models such as BERT and GPT-3 can also be transformed by SBTs. Such models leverage large amounts of publicly or privately monitored data to generate rich models and predictions, such as codes based on natural language cues. Most surveilled data creators are unaware of their role in creating these models, retain no residual rights for themselves, and are seen as “incidental” rather than key players. Furthermore, data collection takes models out of their social context, which masks their biases and limitations and diminishes our ability to compensate for them. These contradictions have come to the fore as demands for data availability have grown, and new initiatives, such as “data collection tables” that document the provenance of data, and privacy-preserving laws for machine learning, need to be accessible to those who generate the data. With meaningful economic and managerial benefits, and incentivize them to collaborate to produce models that are more powerful than the models they built alone.

SBTs provide a natural way to develop economic incentive programs for richly sourced data, while giving data creators residual governance over their data. In particular, SBTs allow for careful and targeted incentivization of their data (and data quality) according to the characteristics of individuals and communities. At the same time, model makers can track the characteristics of the collected data and its social context, as reflected in SBT, helping to find contributors who can counteract bias and compensation limitations. SBTs can also provide data creators with bespoke stewardship, allowing them to form cooperatives, pool data and negotiate its use. This bottom-up programmability of data creators enables future compound intelligence, where model makers compete to negotiate how to use the same data to build different models. So we move away from a stand-alone, monolithic “artificial intelligence” paradigm that is decoupled from human origins, centralizing surveillance data without provenance, and moving to a Cambrian of collaboratively constructed composite intelligences rooted in society And ruled by Souls/Soul Clusters.

Over time, just as SBTs individualize Soul/Soul clusters, they also individualize models. Embed data provenance, governance and economic rights directly into the code of the model. So multiagents, like humans, build a soul embedded in human sociality, and over time humans are embedded in multiagents, each with a unique soul that complements the others and cooperation. And, at this point, we see a fusion of prediction markets and AI paradigms, moving together in the direction of compound meaning construction. Combining widely distributed incentives and careful tracking of social context creates diverse models that combine the best of both approaches into a technological paradigm that is more powerful than either.

5.3 Programmable Composite Privacy

Composite agents raise important questions about data privacy. After all, building such powerful agents requires pooling data across individuals from large datasets (such as health data), or capturing data that is not interpersonal but shared (such as social graphs). Advocates of “self-sovereign identity” tend to treat data as private property: because the data for this interaction is mine, I should be able to choose when to disclose it to whom. In terms of simple private property, however, the data economy is even less understood than the real economy. In a simple two-way relationship, such as an extramarital affair, the right to disclose information is usually symmetric and usually requires the permission and consent of both parties. As the scholar Helen Nissenbaum has emphasized, the concern is not “privacy” per se, but rather the lack of a complete understanding of the context in which the information is shared during information sharing. The “Cambridge Analytica” scandal is mainly about people leaking their social graph attributes and friend information without their friends’ consent.

Rather than thinking of privacy as a transferable property right, a more promising approach is to think of privacy as a programmable, loosely coupled bundle of rights that allows information to be accessed, changed, or profited from. Under such a paradigm, each SBT (such as an SBT representing a credential or accessing a data store) would ideally also have implicit programmable property rights and be able to control some of the basic information that constitutes the SBT, such as the holder, their agreements between them, shared property (such as data), and obligations to third parties. For example, some issuers will choose to make SBTs fully public, but some SBTs, such as passports or health records, will be private in the sense of self-sovereignty, and Souls/soul clusters carrying SBTs have the right to unilateral disclosure. Others, such as SBTs that reflect membership in data cooperatives, involve multi-signature or more complex community voting rights, and all or most SBT holders must agree to make disclosures.

While there are currently technical questions such as (Can SBTs be programmed in this way?), and important questions around incentive compatibility (explored further in Section 7), we still believe that programmable composite privacy is worthwhile Further research, and provides key advantages of an alternative to the existing paradigm. According to our approach, SBTs have the potential to make privacy a programmable, composable right that can be mapped to the complex set of expectations and protocols we have today. Furthermore, this programmability can help us re-architect new configurations, as there are countless ways in which privacy as a right to allow access to information can be combined with “usus”, “abusus” and “fructus” to create a subtle access rights cluster. For example, SBTs can allow computations on data stores (possibly owned and managed by multiple Souls/Soul clusters) using specific privacy-preserving techniques. Some SBTs may even allow access to data in a way that does certain calculations, but the results cannot be proven to a third party. A simple example is voting: the voting mechanism needs to count the votes for each Souls/Souls cluster, but the votes should not be proven to anyone else to prevent the purchase of votes.

Communication is perhaps the most typical form of sharing data. However, today’s communication channels both lack user control and management (“usus” and “abusus”) while auctioning off the user’s attention (“fructus”) to the highest bidder, even a bot. SBTs have the potential to manage a healthier “attention economy”, giving Souls/soul clusters the ability to filter spam from outside their social graph, possibly even bots, while enhancing communication from real communities and desired intersections. Listeners can more clearly know who they are listening to and can better assign credit to works that inspire insight. This economic model is not optimized for maximizing user stickiness, but for creating more valuable common goals through positive-sum collaboration. This communication channel is also important for security. As mentioned above, “high-bandwidth” communication channels are critical to helping communities build a secure foundation.

§6 Decentralized Society

Web3 hopes to transform society broadly, not just the financial system. However, today’s social structures, such as family, church, team, corporation, civil society, celebrity, democracy, etc. keywords, if in the virtual world (often referred to as the “Metaverse”) of the wider relationships they support, Aboriginal people have nothing to represent the human soul, so all this is meaningless. If Web3 eschews persistent identity, trust and cooperation models, and composable rights and permissions, we will see all of these over-financialization trends, respectively, Sybil attacks, collusion, and fully transferable private property in limited economic domains .

To avoid over-financialization while unleashing exponential growth, we propose to enhance and bridge our sociality in both virtual and physical reality, endow Souls/soul clusters and Communities/community clusters with richer coded social and economic relationships. However, it is not enough to build on trust and cooperation. Correcting biases and over-coordination (or collusion) tendencies in trust networks is critical to encouraging more complex and diverse social relationships than ever before. We call this a “Decentralized Society (DeSoc)”: a co-determined sociality in which Souls/Soul Clusters and Communities Clusters are brought together bottom-up as emerging properties of each other, spawned at different scales Composite web items.

We emphasize that composite network items are a feature of DeSoc, because the network is the most powerful engine of economic growth, but also the most easily captured by private actors (such as Web2) and powerful governments. Most significant economic growth comes from increased network revenue, where each additional unit of input produces more output. Examples of simple physical networks include roads, power grids, cities, and other forms of infrastructure, which are built with labor and other capital inputs. Examples of powerful digital networks include markets, predictive models, and composite intelligence built on data. In both cases, network economics differs markedly from neoclassical economics, which emphasizes diminishing returns, that is, with every additional unit of input, output diminishes, and private property yields the most efficient outcomes. The use of private property in the case of increasing returns will have the opposite effect, resulting in the phenomenon of restricting the development of the network by extracting rents. A road between two cities could unlock increasing returns from trade gains. But the same private ownership of roads can stifle growth if landlords choose to extract rents in trade between the two cities. Public ownership of the network has its own perils of being caught by regulators or underfunded.

Having increasing returns is most effective when the network is viewed neither as a purely public nor purely private good, but as a partial and composite public good. DeSoc provides a social basis for disaggregating and reconfiguring rights – the right to use (“usus”), the right to consume or destroy (“abusus”), and the right to benefit (“fructus”) – and to make these rights effective Governance mechanisms can enhance trust and cooperation while checking for collusion and capture. We explore several mechanisms in this paper, such as community-based SALSA and discounted quadratic funding (and voting) for related scores. This act of making compound ownership a third way avoids Charybdis for private rent and Scylla for public regulation.

In many ways, DeFi today is a private property model of diminishing returns transformed into a network of increasing returns. Built on a premise of distrust, DeFi is inherently limited to the realm of fully transferable private property (e.g., transferable tokens), which are largely tied to “usus,” “busus,” and “fructus.” At best, DeFi risks stifling network growth by charging rents, and at worst, it could lead to a dystopian surveillance monopoly, dominated by “whales” who harvest and absorb in a race to the bottom data, just like Web2.

DeSoc turns the DeFi race to control and speculate on network value into bottom-up coordination to build, participate, and govern the network. At the very least, the social foundation of DeSoc can make DeFi anti-witch (supporting community governance), anti-vampire (internalizing positive externalities to build open-source networks), and anti-collusion (keeping the network decentralized). With the structural revisions of DeSoc, DeFi can support and expand diverse networks, broadly conferring benefits, as most different members agree, rather than further consolidating networks controlled by narrow interests.

However, DeSoc’s greatest strength is the composability of its network. The ever-increasing returns and growth of the network do not simply avoid the danger of extracting rents, but also encourage the proliferation and intersection of nested networks. A road may form a network between two cities. But if cut off from broader cooperation, the two cooperating cities would end up with a ceiling of diminishing returns — either because of congestion (roads and housing) or depletion (reaching the limits of the people they could serve). Only through technological innovation and increasingly extensive cooperation, even if this cooperation is loose. The value can only continue to grow exponentially when adjacent networks collaborate to gain new sources of return. Some cooperation will be tangible, gradually expanding physical trade across space. But more connections will be informational and digital. Over time, we will see new matrices of cooperation between physical and digital networks, relying on and extending the social interconnection they create. It is this intersecting, partially nested, growing network of collaborative structures that spans the digital and physical worlds that DeSoc enables.

By forming networks and coordinating, DaSoc emerges at the intersection of politics and markets, enhancing both with sociality. DeSoc gave JCR Licklider (founder of ARPANET, which created the Internet) a vision of “human-machine symbiosis” in the “interplanetary computer network” and significantly increased social vitality on the basis of trust. Rather than building on the trustless premise of DeFi, DeSoc encodes the networks of trust that underpin today’s real economy and enables us to leverage them to generate multiple network goods that are resistant to capture, extraction, or domination. Through this enhanced sociability, web3 can eschew short-term over-financialization in favor of unlimited future benefit increases across social distancing.

6.1 Souls/soul clusters can go to heaven or hell

While we’ve selectively highlighted what we believe has potential to be hopefully unlocked by DeSoc, it’s more important to remember that almost any technology with this transformative potential will have a similar potential for disruptive change: flames burn, wheels Rollover, TV brainwashing, car pollution, credit card framing debt, etc. Here, SBT, which can be used to compensate for in-group dynamics and enable cooperation across differences, can also be used to automatically redline unwelcome social groups, and even target them with cyber or physical attacks, restrictive immigration policies, or predatory behavior. loan. Such possibilities are not prominent in the current web3 ecosystem, as they are not meaningful concepts on their current basis. The benefits of enabling DeSoc also enable these harms. Just as the disadvantage of having a heart is that it can be broken, the disadvantage of having a soul is that it can go to hell, so the disadvantage of having a society is that society is often driven by hatred, prejudice, violence, and fear. Humanity is a great and often tragic experiment.

As we ponder the possible utopias of DeSoc, we should also place these possibilities in the context of other tech-enabled dystopias. Web2 is an opaque architecture of authoritarian surveillance and social control that typically relies on top-down artificial bureaucracies to grant identities (“driver’s licenses”), whereas DeSoc relies on horizontal (“peer-to-peer”) social proof. DeSoc empowers Souls to encode their own relationships and co-create multiple properties, while web2 mediates or monetizes social relationships through opaque algorithms that can create polarization, division, and misinformation. DeSoc eschews a top-down, opaque social credit system. Web2 forms their foundation. DeSoc sees Souls/soul clusters as proxies, while web2 sees Souls/soul clusters as objects.

Using DeFi for social control (without any identity basis) is less risky, at least in the short term. But DeFi has its own dystopia. While DeFi overcomes explicit forms of centralization—that is, specific actors have a super-level of formal power in a system—it has no built-in way to overcome implicit centralization through collusion and market power. Monopolies didn’t always emerge as Standard Oil did in the past. Collusion can even occur at higher and farther levels of an ecosystem. We can see this today with the rise of a slew of institutional asset managers. Pioneer, BlackRock, State Street, Fidelity, etc. are the largest shareholders of all major banks, airlines, auto companies and other major industries. Since these asset managers hold stakes in all competitors in an industry (for example, in every major airline), their motivation is to make the companies they own look like a competitive industry, but its Acts like a monopoly, maximizing profits and securing the entire industry at the expense of consumers and the public. [16]

The same is true in DeFi, where the same “whales” and VCs accumulate larger stakes at each level of the stack and among competitors within the stack, perhaps voting in token governance, or delegating it to the same Class representatives, they also have similar correlations across the network. Without any social foundation against witches and the associated discounts of forcing functional decentralization, we would see more whale-funded monopolies as monopolies increasingly become the largest pool of available investment capital. As the “money class” and users diverge, we should see (and have seen) increasing incentive misalignment and rent extraction. If DeFi apps emerge that deal with private data, we’re likely to see similar dynamics, such as apps encouraging bidding wars between multiple people who “own” data that are actually relationships, such as their social graphs, to build A single private AI, competing with humans, avoids competing multiple AIs in the future, thereby augmenting human capabilities.

So DeSoc doesn’t need to be perfect to pass the test of acceptable non-utopia. To be a paradigm worth exploring, it just needs to be better than existing alternatives. While DeSoc has the potential to guard against dystopian scenarios, web2 and existing DeFi are falling into an inevitable dystopian mode, concentrating power in the hands of elites who determine social outcomes or hold most of the wealth. The direction of web2 is deterministic authoritarianism, accelerating top-down surveillance and behavioral manipulation capabilities. The direction of DeFi today is nominally anarcho-capitalist, but has fallen into network effects and monopoly pressures that threaten to turn its mid-term path into authoritarianism in the same way.

In contrast, DeSoc is a random social pluralism, a network of individuals and communities, as emerging attributes of each other, that together determine their own futures. From a web2 perspective, the development of DeSoc can be likened to the rise of participatory government that has prevailed in centuries of monarchy. Participatory government did not necessarily lead to democracy, it also led to the rise of communism and fascism. Similarly, likewise, SBTs do not make digital infrastructure inherently democratic, but are compatible with democracy based on what Souls/Souls and Communities/Communities collectively decide. Opening up the space for this possibility is a clear improvement compared to the authoritarianism of Web2 and the anarcho-capitalism of DeFi.

§7 Challenges in implementation

Privacy concerns are a key challenge for DeSoc. On the one hand, too many public SBTs may reveal too much about the soul, which makes them passive and “socially controlled”. On the other hand, too many purely private SBTs will also lead to the issue of correlation discount between private communication channels and the level of social governance and coordination, which reflects the importance of incentive compatibility issues. Also closely related to the issue of privacy is the issue of deception: souls may communicate through private or other auxiliary channels, thereby distorting their communal solidarity. It is impossible for us to know all the possibilities and answers along the way, so we need to deeply explore the nature of these difficulties and chart a promising path for the future.

7.1 Private Souls

The system of the blockchain is public by default, and any relationship recorded on the chain is immediately visible not only to the participants, but also to anyone in the world. Having multiple aliases preserves some privacy: a family soul, a health soul, a professional soul, and a political soul, each corresponding to different SBTs. But if these pseudonyms are superficial, outsiders can easily connect these souls, and the consequences of this behavior are serious. So, the “naive” act of simply putting all SBTs on-chain could result in a lot of personal information being exposed on a multitude of applications if steps are not taken to protect privacy.

To address the problem of over-disclosure, there are many solutions of varying degrees of technical sophistication and functionality. The easiest way is to store data off-chain through SBT, leaving only the hash value of the on-chain data.

On-chain data (fully public) Off-chain data On-chain hash (owner can choose when to show it)

How to store off-chain data is up to individuals to choose, and viable solutions include (i) their own devices, (ii) trusted cloud services, (iii) decentralized networks such as the InterPlanetary File System (IPFS). Storing data off-chain allows us to have the right to write SBT data in the smart contract, while having the separate right to read that data. Bob can choose to display the contents of any of his SBTs (or other data stored there) only if he wants to. This is a big improvement, and since most data only needs to be processed by a small number of people, it further increases the scalability of the technology.But to fully realize features such as protecting multiple privacy (annotation: refers to various types of privacy or (and) a collection of privacy), it is necessary to dig deeper and deeper into the relationship. Fortunately, many encryption techniques can help us at this point.

There is now a powerful set of building blocks that support a new way of partially displaying data information, which is called “Zero Knowledge Proofs”, a branch of cryptography. While zero-knowledge proofs are commonly used today for privacy protection of asset transfers, they also allow people to prove arbitrary statements without revealing any information other than the statement itself. For example, in a world where government documents and other proof information can be cryptographically proven, someone could prove a statement like “I’m a Canadian citizen, 18+, have a college degree in economics, have over 50,000 Twitter followers, and someone No account has been registered in this system yet.”

Zero-knowledge proofs can be computed on SBTs to prove characteristics about a soul (such as it has certain members).This technique can be further extended by introducing multi-party computation techniques (such as garbled circuit computation), which make the proof process two-way double private: the verifiers do not reveal who they are, and the verifiers do not reveal their verification mechanisms. In this process, both parties calculate together, and only the information is output.

Another technique is to designate validator proofs. In general, “data” is unreliable: if I send you a movie, I can’t technically prevent you from recording it and sending it to a third party. Methods like digital rights management (DRM) are limited and often costly to users. But the “evidence” is reliable in some way, if Amma wants to prove to Bob some property X of her SBTs, she can make a zero-knowledge proof of the following statement: “I hold SBTs that satisfy property X, or I Possesses the access key to Bob’s soul.” Bob is persuaded by this statement: Amma must actually hold SBTs satisfying property X because he knows he has not made a proof, but if bob passes the proof to Cuifen, Cuifen does not Will be persuaded: Because as far as he knows, bob can prove it through his own soul access key. At this point the proof can be further strengthened using verifiable delay functions (VDFs): Amma can show a proof that can only be made now with the required SBTs, but someone else will have to wait 5 minutes later. This means that access to trusted proofs of the data is possible, although there is no choice over the different types of raw data itself (possibly copied and pasted). Just as traceability in blockchain transactions can prevent someone from copying and pasting valuable NFTs (and the original sender of a sybil attack), SBTs can provide traceability in propagation, which can at least reduce uncertainty of provenance The value of the data (copy-paste).

These off-chain data and zero-knowledge technologies are compatible with negative reputation (embodied by SBTs), and they will still be shown even if the holder does not want them to be seen. Negative reputation includes credit history, outstanding loan data, negative reviews and complaints from business partners, as well as the degree of harmony with relevant social relationships as evidenced by SBTs. The combination of blockchain and related cryptography could lead to a potential solution: smart contracts could force souls to incorporate negative SBTs into a data structure such as a Merkle tree stored off-chain, any zero-knowledge proofs or All garbled circuit calculations need to introduce this information, otherwise, there will be a visible “gap” in the data provided and the verifier will be identified. The Unirep protocol is an example.

The point of these examples is not to illustrate how cryptography can be used to solve all the privacy and data permissions issues of SBTs. Rather, it outlines a few examples to demonstrate the power of these technologies. An important future research direction is to determine the boundaries between different types of data permissions, and the specific combination of technologies best suited to achieve the desired permission level. Another question is what type of compound property regime is required for data governance, and how to separate rights to use (“usus”), rights to construct (“abusus”), and rights to benefit (“fructus”).

7.2 Cheating Souls

If SBTs are the social basis for coordinating composite property, networked goods, and intellect, there is concern that souls may enter communities through subterfuge or deception to gain governance or property rights licensed by SBTs. For example, if many application directions rely on SBTs that can represent conference attendance, then there may be situations where these SBTs are used in exchange for bribes. If enough people are bribed, humans (and bots) generate a false social picture divided by (false) SBTs. Just as DAOs can be bribed, so can souls and the on-chain voting mechanism they use. Conversely, if SBTs are used to impair collaboration, the impact of SBTs can be mitigated. Why should we believe that the SBTs that souls have are actually living up to their social commitments, rather than simply telling them how to play the “game”?

One view is that there is a “balance” between the different motivations for deception. Souls self-assess and categorize the networks they find important, much like how Harberger taxes work by balancing the incentives to overvalue and undervalue assets to arrive at near-accurate market valuations. Souls will want to have more SBTs in order to gain influence in their communities, on the other hand they will avoid SBTs in communities they don’t care about and thus score lower on relevant metrics, which in turn enhances their wider presence. influence in network governance.

But it would be naive to think that the two motives of gaining power and gaining influence always cancel each other out (or nearly cancel each other out). There may be many communities using systems other than SBTs to restrict access and governance. Alternatively, the community may issue private SBTs (contrary to our assumption of publicity) to shore up governance power, while inducing community members to keep the existence of these private SBTs secret in broader decision-making.

“Game” is an important problem, and solving this problem is one of the future research priorities. In fact, this is one of the main reasons why it is very difficult to open-source existing algorithms that provide prioritization or sorting. To reduce and deter SBT “game”, we provide several norms and directions:

  1. The ecology of SBTs can start from “dense” social channels, where SBTs validate off-chain community membership through strong social bonds and interactions with each other. This makes it easier for the community to identify, filter and revoke SBTs from impostors (or bots). We often find such “dense” channels in churches, workplaces, schools, gathering groups, and organizations in civil society, which will serve as “police games” in more “sparse” social channels (e.g. through bots, bribery, etc.) , impersonation) to provide a social basis that is more resistant to Sybil attacks.
  2. Nested communities require SBTs to impose “context” on their “downward” potential collusion vectors. For example, if a state is holding a fundraising or voting round, the state may require every participating citizen to also hold SBT for designated counties and cities.
  3. The openness and cryptographic provability of the SBT ecosystem can be used to actively detect collusive patterns and punish unreliable malicious behavior (perhaps lowering the voting weight of colluding souls, or forcing souls to accept SBT—in this case, negative reputation). For example, if one soul proves that another soul is a robot, the case can go deep and publicly verify the results, resulting in a large number of negative reputation proofs for that soul.Similar use cases have arisen in the GitCoin QF ecosystem, which uses a series of indicators or signals to detect “collusive groups”.
  4. Zero-knowledge proof techniques such as MACI can cryptographically prevent certain proofs made by the soul from being provable. This discourages the sale of proofs because the bribe-giver cannot tell whether the bribe-taker has fulfilled the deal. There has been a lot of research on this technology, and eventually any non-financialized social mechanism could benefit from similar ideas.
  5. We can encourage whistleblowing, which destabilizes large-scale “collaboration”. It is not the detection and punishment of incorrect or abusive behavior, the detection and punishment of abusive collusion patterns. Excessive use of this technique is risky because of the potential for false bribery, but it is still essentially a viable tool.
  6. We can use peer-prediction mechanisms to encourage truthful reporting in all cases (unless collusion is severe).Attendees can prove each other’s presence, rather than the meeting, which also means that the number of participants that need to be bribed is very large and costly. Rewards don’t have to be financial, they can also be SBTs, and rewards are more positive for real community members than attackers.
  7. If some souls have a common interest, we can use a correlation coefficient that measures the correlation. For example, use correlation techniques in quadratic financing to quantify the correlation between two participants to determine their degree of intersection. If two players have many common interests, their incentive to reveal this fact to the quadratic funding mechanism (there are many common interests) will certainly decrease with the correlation discount, but it will never become zero or negative .

§8 COMPARISONS AND LIMITATIONS

While the range of proposed identity frameworks is nearly limitless, there are four prominent and similar paradigms in web3 that are worth comparing: the dominant “legacy” authentication system, the pseudonym economy, proof of personality, and verifiable credentials. Each paradigm highlights the important contributions and challenges to future development of the social proof paradigms we advocate, and we use these limitations as a springboard for exploring future directions. In conclusion, we also explain why we believe that soul and soul-bound tokens representing social identity are a more promising direction for privacy regimes.

8.1 Legacy

Legacy authentication systems rely on documents or ID cards issued by third parties (governments, universities, employers, etc.), and the provenance is also determined through third parties. While there is something to be understood about legacy systems, these systems are very inefficient and lack composability for fast, efficient coordination. Furthermore, these systems lack a social relational context, making the soul dependent on a centralized third party to confirm membership in the community, rather than being embedded in the community. For example, most government-issued ID cards are ultimately traced back to birth certificates issued by doctors and family members, who are the ultimate source of truth, but this also ignores many of the equally meaningful social ties that bind together , which provides a strong verification. In fact, when centers of concentration of power need to seek strong identities (such as obtaining security clearances from the government), they rarely rely on these documents, turning instead to the “social relations” approach. As a result, such legacy identity systems tend to concentrate power on issuers and those who can perform “due diligence” to obtain stronger proofs, who in turn become rigid and unreliable bureaucracies. A key goal of DeSoc is to ensure that government ID security requirements can be met and exceeded, allowing horizontal networks to provide greater security to all users through a range of social bases.

8.2 Pseudonymous Economy

Balaji Srinivasan, who coined and popularized the term “pseudo-name economy,” broadly popularized a social vision based on combining reputation systems with zero-knowledge proof mechanisms to protect privacy. His early emphasis on using pseudonyms was to avoid social mobs from damaging and destroying a person’s reputation and social relations. It envisions people accumulating transferable zero-knowledge proofs in their own wallets and evading reputational attacks by splitting the proofs into new wallets or multiple wallets, which may not be traceable. When picking proofs to transfer, there is a trade-off between the degree of pseudonymity required for the new account, which requires a choice between being more anonymous (transferring less proofs) or being distributed across social networks (transferring more proofs).

The practical difference between the typical pseudonymous economy proposal and DeSoc is that we do not emphasize the division of identities as the primary way to be immune to a culture of “accusation”. Some degree of segmentation (e.g. different souls between family, work, politics, etc.) can be beneficial, but in general, relying on a new identity as the main way to defend against attack has a lot of drawbacks, it makes loans and provenance Reputation staking becomes difficult, and it is poorly composable with governance mechanisms that attempt to correct correlation or sybil attacks.

Instead of allowing the victim to re-emerge in the attack under a new (if diminished) identity, DeSoc allows other methods, such as socializing the attacker. “Allegations” often arise because when a person (or bot) has little social connection with the victim, statements and actions are disengaged, and slanderous messages spread through non-relational networks. In the same way that SBT provides attribution to prevent counterfeiting, SBT traces the attribution of “slanderous behavior” on social relations. “Defamatory conduct” is essentially the product of being outside the victim community (as reflected by shared SBT members), or the lack of SBT proof from the victim community (which casts doubt on the veracity of the conduct). SBT also enables victims to mount defensive responses to counteract strikes orchestrated and propagated from their web of trust (represented here by the model of co-holding SBT). By maintaining social relationships, people can maintain trust even when they face the threat of “accuses” and hold attackers accountable. Improving provenance can improve the social basis of truth.

8.3 Proof of Personality (PoP)

The Proof-of-Personality Protocol (PoP) aims to provide tokens of personal uniqueness to prevent Sybil attacks and allow non-financialized applications. To do this, they rely on methods such as global analysis of social graphs, biometrics, synchronized global key players, or some combination of these. However, since the PoP protocol seeks to represent individual identities (to achieve global uniqueness), rather than mapping relationships and solidarity social relations, the core of the PoP protocol is to treat everyone equally, and most of the application directions we are interested in (such as reputation staking) , are all about people and go beyond being a “different” person to be a “unique” person.

Furthermore, PoP protocols are not immune to Sybil attacks. PoP systems are susceptible to Sybil attacks in almost all near-term foreseeable applications, albeit at a slightly higher cost. Unless the majority of people on the planet have signed up for a PoP service and participated in a specific verification activity, attackers can always recruit people who haven’t participated (or are not interested) to act as “witches”. While not all bots are hired, there is little difference, except that there may be some added fees.

Many PoP protocols are designed to build the foundations of a universal basic income or global democracy, and while we do not have the same ambitions, these protocols prompt us to think about how to gradually build and coordinate multiple network products. Unlike the binary, individualistic and global nature of PoP, we aim to build a rich, layered and interconnected foundation for bottom-up reputation, property and governance, and allow participation in communities and networks of all sizes .

8.4 Verifiable credentials

Verifiable Credentials (VCs) are a W3C standard where credentials (or certifications) can be shared at the holder’s discretion with zero knowledge. VCs highlight the main limitations of our baseline privacy paradigm and motivate us to further explore the privacy aspects described above. VCs and SBTs can be seen as natural complementary elements until SBTs have the ability to narrow the scope of openness: in particular, SBTs are initially public, so they are not suitable for sensitive information such as government-issued identification, while the implementation of VCs has always been In grappling with a recovery paradigm, this may be addressed by community resilience. In the short term, the combination of the two methods works better than either method alone. But VCs have a key limitation: at least in general, VCs do not support most of the application directions we enumerate because of their unilateral privacy.

Unilateral zero-knowledge sharing is not compatible with our use case and does not meet our normative definition of privacy. Most of our application directions rely on some level of publicity, but with zero-knowledge sharing, there is no way for a soul to know that another soul has SBT unless it is shared with each other. This makes reputational pledges, credible promises, witch-resistant governance, and simple lease contracts (such as apartment rentals) impossible to obtain visible additional promises or proof of title. More deeply, we doubt that unilateral shareability is the correct privacy paradigm, as one party in a multiparty relationship rarely has the right to unilaterally disclose the relationship without the consent of the other, just as unilaterally negotiable private property is not. Like a perfect property system, simple unilateral shareability is not a perfect privacy system. If two parties jointly own an asset and choose to represent their relationship through VCs, this credential does not allow for mutual consent and mutual permission. This involves more complex compound properties and complex organizational forms and permissions issues, which are a feature of DeSoc.

§9 SOUL BIRTH

The path from the current web3 ecosystem to the enhanced sociality of SBTs faces a typical cold start challenge. On the one hand, SBTs are non-transferable, and on the other hand, the current form of wallets may not be the ultimate destination for SBTs because they lack community resilience mechanisms. But in order for community resilience wallets to work, they need to provide different SBTs in a decentralized community to be safe. SBTs First or Community Resilience First? Who are the early adoption communities? How do SBTs on different chains interoperate? Rather than aspire to know all the possibilities and answers, we outline possibilities for readers to explore further in the current web3 (or even web2) architecture.

9.1 Initial SBTs (Proto SBTs)

While SBTs are non-transferable, SBTs may have another property that will highlight their role in development: revocability.SBT can first become a revocable, transferable token before it grows to be non-transferable. Tokens are revocable if the issuer can burn them and reissue them to a new wallet. For example, when a key is lost or compromised and the issuer is interested in ensuring the token is not monetized and sold to a party. (In other words, burning and re-issuing tokens would make sense when tokens signify true community membership.) Employers, churches, meetup groups, off-chain interactive clubs with multiple contacts are all burning and re-issuing tokens. A great place for coins because they have a relationship with someone and can easily check for impostors via phone calls, video conferences, or simple face-to-face meetings. And a single interaction, such as the way to attend a concert or a conference, has a weaker community connection and is not suitable.

Revocable and transferable are the initial properties of the initial SBT before the soul is born. These tokens buy time for wallets to breed secure community resilience mechanisms and for individuals to accumulate initial SBT (which can eventually be burned and reissued as non-transferable SBT). In this approach, the question is no longer “SBTs first or community resilience first?” Instead, SBTs and community resilience mechanisms work together to give birth to a soul.

9.2 Community Recovery Wallets

While today’s wallets lack community resilience, they have their own pros and cons as SBT’s home or “breeding ground”.The beauty of Proof-of-Personality (PoP) protocols is that attempts are already being made to build social dispute resolution mechanisms that are the foundation of community resilience. Additionally, many DAOs use POPs to facilitate governance, making them the natural first issuers of SBTs. However, despite PoPs ahead, PoP protocols have yet to gain the widespread trust to store valuable token assets, which escrow wallets do.

Custody wallets (heavier centralization) have therefore become the dependencies of immature users. Such custodial wallets can build tools for the retail community to issue revocable tokens that can then be converted (or reissued) into SBTs, or even more “enterprise” issuers that lack the relevant expertise ( Many of them seek to build a base of loyal customers in web3). Once the community resilience mechanism is formalized and tested, these custodial wallets can be decentralized into community resilience, while the custodians continue to provide other valuable services (such as community management, SBTs issuance, etc.) in DeSoc.

For more in-depth web3 users, decentralized non-custodial wallets (or non-custodial community resilience wallets like Argent and Loopring) are a natural starting point to bootstrap the community recovery mechanism. The advantage of a non-custodial wallet is that it is native web3 open source, and the mechanism can be pre-announced and gradually experimented, allowing a subset of willing, mature users to participate in the experimentation of incentive mechanisms and hybrid mechanisms (such as multi-signature). All of these approaches: POP, custodial and non-custodial, play an important role in testing and onboarding users with different levels of maturity and risk tolerance.

9.3 Proto-Souls

Codes of conduct can also guide the existence of the soul. As we rethink tokens and wallets, we can also restructure certain classes of NFTs and tokens that highlight membership. In particular, we could introduce a norm not to transfer NFTs and POAPs issued by reputable institutions that respect conference attendance, work experience or educational credentials. The transfer of such membership tokens (if traded in value) may reduce the reputation of the wallet and may prevent the issuer from further issuing membership or POAP tokens to the wallet. In a non-custodial ecosystem, a large number of users gain considerable financial reputation and hold shares in their wallets, which can serve as indirect collateral against their expectation of non-transferability abuse.

While all of these pathways have their own challenges, we hope that, through a methodically diverse set of small steps, we increase our chances of converging to a quasi-equilibrium state in the medium term.

§10 Conclusion

While we have high hopes for what DeSoc can achieve, the above are just the first steps. There is more than one road to DeSoc, including many non-blockchain-based frameworks such as Spritely, ACDC, and Backchannel, which rely on data storage tied to a local machine rather than a distributed ledger. These frameworks may ultimately enable greater trust across social distancing, as they can leverage the transitivity of trust relationships (such as trusted introductions) rather than relying on SBTs issued by well-known, authoritative institutions (such as universities or DAOs). Furthermore, the applications we describe above are just the beginning of DeSoc’s reinforcement and do not involve virtual worlds: their “physics”, society, and their complex relationship to the real world. All of this suggests that the lofty ideals we’ve depicted above may just be the “rudiments” of DeSoc’s final form.

However, there are still many challenges and problems to be solved along this path. The above blueprint is still relatively abstract and theoretical, and needs to be constantly tried and improved. How do DAOs balance soul patterns and correlations in SBTs to prevent Sybil attacks and ensure decentralization while maintaining openness? How does Incentive Compatibility earn SBTs for Relevance Discount Schemes? How much conflict does privacy have with related discounts and other DeSoc mechanism designs? How do we measure inequality in a social (open), yet appropriately private, way? How should legacy systems work in community resilience mechanisms? Is it redlined, or even included in the protocol, to avoid a dystopian situation? Or should the best scenario be created? These issues are only part of a research and development process that may last for several years in the future, and they will evolve with the ecological development of DeSoc.

However, DeSoc’s potential is worth the price of these challenges, and it may be necessary to ensure our survival. Albert Einstein said at the Geneva conference in 1932 that “the organizational capacity of man” has not yet kept pace with “technical development”, which is the equivalent of having “a 3-year-old child with a razor.” His ideas are so prescient that learning how to program the future of society, rather than rhetoric based on “trust,” seems to be a required course for humans to survive on this planet.

11 References

  1. We thank Audrey Tang, Phil Daian, Danielle Allen, Leon Erichsen, Matthew Prewitt, Divya Siddarth, Jaron Lanier and Robert Miller for their thoughtful feedback and comments. All errors and opinions are our own responsibility.
  2. Microsoft Corporation & RadicalXChange Foundation, glen@radicalxchange.org. Glen vinicula este documento a su Alma.
  3. Flashbots Ltd., puja@ashbots.net. Puja gave this text to his grandmother Satya, whose love and light will continue to shine on countless souls
  4. Ethereum Foundation, vitalik.buterin@ethereum.org.
  5. We chose this set of properties not because they are clearly the most desirable set of features, but because they are easy to implement in the current environment and support a lot of functionality. We will discuss programmable private SBTs in Section 5.3.
  6. Note, however, that in principle de jure names can be represented as SBTs: a family name would be a member SBT of a family group, and a given name could be an SBT given to a child by parents. In fact, a richer name concept would be easily represented if other family members or related persons gifted a member SBT to a new child.
  7. https://twitter.com/VitalikButerin/status/1264948490834247681https://twitter.com/VitalikButerin/status/1265252184813420544 Evidence from informal twitter surveys suggests that the idea of ​​taking into account diversity in decision-making mechanisms is already perceived as intuitive of.
  8. Not enough data accumulated: https://www.technologyreview-com/2021/06/17/1026519/racial-bias-noisy-data-credit-scores-mortgage-loans-fairness-machine-learning/
  9. Social Recovery: https://vitalik.ca/general/2021/01/11/recovery.html
  10. Matthew Effect: https://en.wikipedia.org/wiki/Matthew_effect
  11. Data Cooperative: https://www.noemamag.com/a-view-of-the-future-of-our-data/
  12. Multinationalism: https://press.uchicago.edu/ucp/books/book/chicago/P/bo138501033.html
  13. We say “innocent” because highly cooperative groups will naturally seek to advance their interests, likely to influence their collective interests.
  14. Under the quadratic rule, a team member can buy a contract that pays $X under the condition that the event occurs, but at a cost of (X^2)/$2. For example, if an event occurs, an individual who sets X = 0.5 will receive $0.5, the amount paid by the voter, and in any case at least $0.125.
  15. If a person evaluates probability p, their expected reward Λ is pX and their cost is X^2/2. Derivative with respect to X, the optimal condition is p=X, assuming risk neutrality, which is reasonable for small stakes (both reward Λ and cost can be reduced or increased arbitrarily, the same argument still holds).
  16. See Eric Posner, Glenn Weir, Radical Markets: Eradicating Capitalism and Democracy for a Just Society, Princeton University Press, 2018.

Posted by:CoinYuppie,Reprinted with attribution to:https://coinyuppie.com/full-text-version-of-the-latest-papers-by-vitalik-et-al-decentralized-society-finds-the-soul-of-web3/
Coinyuppie is an open information publishing platform, all information provided is not related to the views and positions of coinyuppie, and does not constitute any investment and financial advice. Users are expected to carefully screen and prevent risks.