Pages:
Author

Topic: [ANN] Usechain - MIRROR IDENTITY TO USE| INNOVATIVE RPOW - page 11. (Read 20779 times)

jr. member
Activity: 238
Merit: 3
#USECHAIN
Private sale or crowdsale?
Thought private sale is over?

Right now is private sale period.  Public sale will be in August.

Will there be a significant in price difference between private sale and public sale, if so, how much? when in August is the public crowdsale?
newbie
Activity: 137
Merit: 0
#USECHAIN
You should have retured in immedetely... Why takeing tume

Sorry, what do you mean?
newbie
Activity: 137
Merit: 0
#USECHAIN
Private sale or crowdsale?
Thought private sale is over?

Right now is private sale period.  Public sale will be in August.
newbie
Activity: 118
Merit: 0
#USECHAIN
Private sale or crowdsale?
Thought private sale is over?
newbie
Activity: 118
Merit: 0
#USECHAIN
no worries end it now already used my son's college fund to invest in this project
newbie
Activity: 118
Merit: 0
#USECHAIN
You should have retured in immedetely... Why takeing tume
newbie
Activity: 118
Merit: 0
#USECHAIN
There is nothing mentioned about ico in your main page why?
newbie
Activity: 118
Merit: 0
#USECHAIN
Welcome,sir,check the pinned message to get more information about usechain~
newbie
Activity: 137
Merit: 0
What are problems that will be eliminated through #Usechain? 🤔What make #Usechain different from any other blockchain?🧐Check it out to find the answer!!! Btw, thanks for the high-quality reviews from our supporters!

Hello! Are you trying to share a link?
full member
Activity: 420
Merit: 117
What are problems that will be eliminated through #Usechain? 🤔What make #Usechain different from any other blockchain?🧐Check it out to find the answer!!! Btw, thanks for the high-quality reviews from our supporters!
newbie
Activity: 137
Merit: 0
It's also a dangerous system if someone successfully steals or fakes identity. Unless it can be made impossible to fool the system.

In our system, no identity information is stored on the blockchain. Identities are verified through a third-party certification agency, and then a zero-knowledge proof is used to communicate to the blockchain that the identity is verified without disclosing any identity information. You would need the agreement of multiple actors in order to trace someone's identity from their address, but these actors are bound by contract to only cooperate in situations such as government compliance and to not act maliciously.

I see, so what is the main purpose of your network? Is it mostly about the innovative proof of work?

Besides the use of innovations like RPOW and sharding, Usechain is special because it will be the first public blockchain built on a mirror identity protocol. Through technological innovations and adding the dimension of identity, Usechain will solve the Impossible Trinity and achieve a balance between scale, security, and decentralization. In addition, Usechain's mirror identity protocol supports KYC and government compliance, so the blockchain can provide infrastructure for decentralized apps in various industries that require identity information. Hence, we see Usechain as a leader of the Blockchain 3.0 era, where blockchain can truly be integrated into financial services, sharing economy applications, and more.

At lot of stuff in that one paragraph Smiley As for the mirror identity protocol, does it mean that every user of the network has to disclose ID information to the network while keeping control over it and once ID info is required from an APP or something else, the user can provide that info? Will it be with zk-proofs?

Network users will disclose identity information to a reliable third-party certification agency, but not directly to the blockchain. Communicating identity authentication to the blockchain will indeed be done through a zero-knowledge proof. While there will be no identity information stored directly on the main chain, the interface will contain relevant calls for identity information that support a variety of different requirements for applications that involve identity.

Ok but doesn't that also create a lot of risk if a third party certification agency holds all the ID info of people? Are there ways to abuse that ID info or how will it be tied to the original owner? Just trying to understand the full scope of your protocol.

A secret sharing scheme is used to convert the identity certificate to a public address, so in order to tie a public address to identity information you would need multiple signatures from committee members legally bound not to act maliciously.

That's what I meant, I was sure there needs to be some kind of centralized entity involved. How is the committee formed? Who will be on there and is the committee publicly known?

The committee will be voted in by the community and will be publicly known.
hero member
Activity: 1106
Merit: 508
Bisq Market Day - March 20th 2023
It's also a dangerous system if someone successfully steals or fakes identity. Unless it can be made impossible to fool the system.

In our system, no identity information is stored on the blockchain. Identities are verified through a third-party certification agency, and then a zero-knowledge proof is used to communicate to the blockchain that the identity is verified without disclosing any identity information. You would need the agreement of multiple actors in order to trace someone's identity from their address, but these actors are bound by contract to only cooperate in situations such as government compliance and to not act maliciously.

I see, so what is the main purpose of your network? Is it mostly about the innovative proof of work?

Besides the use of innovations like RPOW and sharding, Usechain is special because it will be the first public blockchain built on a mirror identity protocol. Through technological innovations and adding the dimension of identity, Usechain will solve the Impossible Trinity and achieve a balance between scale, security, and decentralization. In addition, Usechain's mirror identity protocol supports KYC and government compliance, so the blockchain can provide infrastructure for decentralized apps in various industries that require identity information. Hence, we see Usechain as a leader of the Blockchain 3.0 era, where blockchain can truly be integrated into financial services, sharing economy applications, and more.

At lot of stuff in that one paragraph Smiley As for the mirror identity protocol, does it mean that every user of the network has to disclose ID information to the network while keeping control over it and once ID info is required from an APP or something else, the user can provide that info? Will it be with zk-proofs?

Network users will disclose identity information to a reliable third-party certification agency, but not directly to the blockchain. Communicating identity authentication to the blockchain will indeed be done through a zero-knowledge proof. While there will be no identity information stored directly on the main chain, the interface will contain relevant calls for identity information that support a variety of different requirements for applications that involve identity.

Ok but doesn't that also create a lot of risk if a third party certification agency holds all the ID info of people? Are there ways to abuse that ID info or how will it be tied to the original owner? Just trying to understand the full scope of your protocol.

A secret sharing scheme is used to convert the identity certificate to a public address, so in order to tie a public address to identity information you would need multiple signatures from committee members legally bound not to act maliciously.

That's what I meant, I was sure there needs to be some kind of centralized entity involved. How is the committee formed? Who will be on there and is the committee publicly known?
member
Activity: 308
Merit: 10
S O A R https://www.soar.earth/
Hi! Is there any information about when the team plans to unlock tokens and distribute tokens for the bounty participants?

Yes! Tokens are locked until UST is listed on exchanges (mid-August) and bounty tokens will be distributed this week.
Thank you! I liked your bounty campaign-generous awards and good work of managers. I hope that the price of the token will show a good dynamics in August.
jr. member
Activity: 224
Merit: 5
Cryptonity

Can you elaborate more on the community event? How to participate and join Usechain quiz? Do I need a smart phone to participate and time frame?
jr. member
Activity: 224
Merit: 5
Cryptonity
Hey guys, here is a selection of Usechain telegram online AMA on July 9th! Thank you for all your support and we hope all your questions were perfectly answered! Now check this link out to see more details~  Wink Wink Winkhttps://medium.com/@usechain/summary-of-usechain-telegram-online-ama-on-july-9th-52f36f12e802

Thank you for sharing the link, lots of great questions and answers from the founders and team, at the moment, Is there any particular app thats going to be built on top of Usechain?
newbie
Activity: 137
Merit: 0
Hey guys, here is a selection of Usechain telegram online AMA on July 9th! Thank you for all your support and we hope all your questions were perfectly answered! Now check this link out to see more details~  Wink Wink Winkhttps://medium.com/@usechain/summary-of-usechain-telegram-online-ama-on-july-9th-52f36f12e802
newbie
Activity: 29
Merit: 0
Thank you! It is not our first Telegram channel, but our first Telegram AMA will start at 10AM GMT+8.

Unfortunately, our bounty program has closed as of right now. However, we will announce a new bounty program format soon, so please check back later!
I wish Usechain team will open new BTT signature bounty next time.
newbie
Activity: 137
Merit: 0
It's also a dangerous system if someone successfully steals or fakes identity. Unless it can be made impossible to fool the system.

In our system, no identity information is stored on the blockchain. Identities are verified through a third-party certification agency, and then a zero-knowledge proof is used to communicate to the blockchain that the identity is verified without disclosing any identity information. You would need the agreement of multiple actors in order to trace someone's identity from their address, but these actors are bound by contract to only cooperate in situations such as government compliance and to not act maliciously.

I see, so what is the main purpose of your network? Is it mostly about the innovative proof of work?

Besides the use of innovations like RPOW and sharding, Usechain is special because it will be the first public blockchain built on a mirror identity protocol. Through technological innovations and adding the dimension of identity, Usechain will solve the Impossible Trinity and achieve a balance between scale, security, and decentralization. In addition, Usechain's mirror identity protocol supports KYC and government compliance, so the blockchain can provide infrastructure for decentralized apps in various industries that require identity information. Hence, we see Usechain as a leader of the Blockchain 3.0 era, where blockchain can truly be integrated into financial services, sharing economy applications, and more.

At lot of stuff in that one paragraph Smiley As for the mirror identity protocol, does it mean that every user of the network has to disclose ID information to the network while keeping control over it and once ID info is required from an APP or something else, the user can provide that info? Will it be with zk-proofs?

Network users will disclose identity information to a reliable third-party certification agency, but not directly to the blockchain. Communicating identity authentication to the blockchain will indeed be done through a zero-knowledge proof. While there will be no identity information stored directly on the main chain, the interface will contain relevant calls for identity information that support a variety of different requirements for applications that involve identity.

Ok but doesn't that also create a lot of risk if a third party certification agency holds all the ID info of people? Are there ways to abuse that ID info or how will it be tied to the original owner? Just trying to understand the full scope of your protocol.

A secret sharing scheme is used to convert the identity certificate to a public address, so in order to tie a public address to identity information you would need multiple signatures from committee members legally bound not to act maliciously.
member
Activity: 126
Merit: 10
Good news! Usechain first telegram AMA will start at 10AM GMT+8 on July 9th! Pls be free to ask everything you want to know about Usechain and Usechain COO Erik Xu will answer for you patiently!!! Wink

Congratulations for the first Telegram channel of Usechain project!
By the way, I would like to ask for information on Usechain bounties.
In the Bounty Topic, the application forms have been closed.
Do I have opportunity to join Usechain bounty, in particular Bitcointalk signature campaign?
Pages:
Jump to: