Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

At least there is the prospect of full control by the user.


What amount of personal hardware resources does a person need in order to have "full control?"

Is there a way to guarantee that a user maintains "full control" over their identity as opposed to having it be stored on a 3rd party site?

What would a 3rd party site that is operating less than trustworthy (a not uncommon situation in the web3 world) way be able to do with an identity that they hold in trust for someone who doesn't possess the consistent access to the previously mentioned hardware resources?

If your only computing device is your phone and someone steals it, do you lose your identity?

In the event that your house burnt down and all of your computing resources have been destroyed, is there a way to attest to be able to recover your identity?

In the event that your evil twin decides to burn down your house, what mechanisms exist to prevent them from claiming your identity?


"Full control" by being forced to engage with a protocol they never designed in order to authenticate their own existence? That sounds more like full submission to me.


Only as long as enough others are in on the idea.

I.e MyAwesomeBlockchain can be totally awesome but since no one uses kt it is useless.

This will be the fate of well over 90% of the block chains that exist today I think. In fact I guess more than 90% of them.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: