Cointime

Download App
iOS & Android

The Verifiable Web: Fixing the Internet’s Truth Problem

Validated Project

From Chainlink

In early civilizations, truth was based on myth. Observations of worldly phenomena were wrapped in symbolic narratives, religious beliefs, and ancient wisdom. Over time, humanity began to value objective measurements and reasoning, birthing disciplines such as science, mathematics, and logic. 

After the invention of the written word and, later, the printing press, books and documents captured the world’s information in written form, from academic literature and legal contracts to statistics and opinionated analysis. Then, in the twentieth century, phones, computers, and the Internet started a digital revolution in how information was created, distributed, and verified, with supercomputers now performing large-scale computations on complex data sets and billions of users across the globe generating, sharing, and talking about content every day in real-time.

Now, with a simple Internet connection, anyone in the world can instantly access a seemingly infinite flow of information. But while individuals are now empowered to consume and share more information than ever before, high-velocity, high-volume information scattered across a variety of applications poses extraordinary challenges: How can an everyday user make sense of such a vast, complex, and sometimes contradictory information landscape? Information warfare and advancements in AI are only compounding this problem.

Information is the basis for sound decision-making by humans, institutions, and systems, and we need a better foundation for obtaining and evaluating it. This new foundation starts by increasing people’s ability to verify the source of information, the method used to calculate it and the integrity of the systems used to do so, and the historical reputation of these sources, methods, and systems. Doing so will require the creation of a more advanced informational and digital age powered by cryptographic truth. We call this the verifiable web.

The evolution of truth.

What Is the Verifiable Web?

The Web Is Flawed

In the established web model, the Internet is shared networking infrastructure that enables communication between computers via online applications. Each online application handles its own computing (executing code), storage (storing code and data used and produced), and management (updating code and maintaining a successful business) by either running it in-house or outsourcing it to a centralized company. Users of applications are then responsible for establishing a connection to the Internet in order to interact with the online application, generally by paying for a data or Internet plan.

The problem with this model is it directly or indirectly gives centralized entities— whether it’s the application or Internet Service Provider (ISP)—extensive control over online data, computing, and/or networking. This means how the application works can be arbitrarily changed at any time—a social media company quietly changing its algorithm, for example. It also means that user data and connectivity can be arbitrarily censored, omitted, or monetized for personal gain, oftentimes with little user oversight or awareness of how it’s being done. As a result, the user has to trust the application and Internet infrastructure to act in a reliable and honest manner because they have no actual guarantees—just paper promises that take time and money to fight against in court if broken (assuming the user even has access to a high-integrity legal system).

With the web extending far beyond information-sharing applications to span financial transactions, health management, election systems, supply chain tracking, and more, fixing it means fixing the nature of almost every digital interaction the modern user has. The stakes couldn’t be higher.

A Verification Layer for the Internet

The verifiable web is not a replacement for the established web but rather an extension of its capabilities. The verifiable web provides applications with a decentralized, cryptographically secure, and verifiably fair environment for running computations, storing data, governing operations, and facilitating networking across systems. 

With some or all of an application’s backend infrastructure run on the verifiable web, users are able to obtain proof and guarantees about the application and its data, such as that it’s manipulation-resistant (secure), always available (reliable), permissionlessly accessible (censorship-resistant), logically sound (accurate), authenticated (genuine), private (privacy), and traceable from inception (provenance). 

Instead of requiring users to trust that an online application will keep its commitments, the verifiable web provides technologically enforced guarantees that users can independently check. 

By knowing how an application works and that it cannot arbitrarily change, users can make more informed decisions about whether or not to engage with it and whether to disengage at any point in the future. This is because the user is able to know its state at all times with near-complete certainty, including how it makes decisions, how rules are enforced, how data is generated, and what updates will be made.

The verifiable web provides verifiable guarantees instead of trust-based promises.

The verifiable web is underpinned by game-theoretical design—using the science of strategy to produce desired outcomes. The verifiable web combines various technologies to create game-theoretical environments where rational participants are incentivized to produce fair outcomes (i.e., it’s deterministic), even in the presence of adversaries. Furthermore, users can inspect these environments to check if they meet their own standards of trust and fairness. In contrast, the established web relies on trust in probabilistic and unverifiable promises made by the centralized entity that owns the application or runs its backend infrastructure.

For example, central banks manage monetary policy based on subjective assessments while banks manage payment ledgers with relative opaqueness. While there are various reasons for doing so, it is a less predictable process that can create systemic risk. Alternatively, Bitcoin uses a game-theoretical design to incentivize a decentralized network of nodes to manage monetary policy and maintain a payment ledger according to a publicly available set of rules enshrined in the software that nodes on the network run. This provides users with verifiable proof about how the ledger is managed and how difficult it is to tamper with the ledger and alter the monetary policy, ultimately creating more predictable risk management.

The verifiable web moves society away from probabilistic promises and toward guaranteed contracts.

Why Do We Need the Verifiable Web?

The verifiable web is what crypto is really about—it starts with fixing money and financial markets, before expanding into other industries to bring greater proof and transparency to the digital interactions that determine our lives. If trust in institutions continues to decrease, demand for technologies that provide verifiable proof about the world will only increase. Some of the areas of growing distrust that the verifiable web can help to improve include:

Cryptographic guarantees restore trust in systems.

Financial Markets and Services

Financial markets have historically been subject to boom and bust cycles as a result of mispriced asset valuations and resulting systemic risk due to their cross-dependencies. People want better guarantees that financial markets and assets are as healthy as the official reports state, and that financial services will be honored as agreed upon. The verifiable web can be an important tool in providing a golden record across market infrastructure or forcing timely and in-full financial payments, ultimately creating more stability and reducing systemic risk.

Images and Videos

With the acceleration of AI, it’s becoming harder to distinguish between real and fake images and videos. The spread of fake content is leading to the proliferation of false narratives in society, and, as a side effect, increased skepticism in legitimate sources. The verifiable web can play a key role in authenticating the source of images and videos, such as a camera cryptographically signing a photo/video with a unique private key from an HSM hardware module and then hashing a copy onchain as a tamperproof record of who took the photo/video and when it was taken.

Information and Analysis

The acceleration of AI and information warfare has also made it hard to filter misinformation and disinformation and decide who to turn to for unbiased analysis. The verifiable web can not only help create a single, globally accessible source of truth about the origin of information, but it can also help establish methods for verifying the track record of news sources and analysts over time and incentivize sound research and analysis. 

The public has lost trust in news and information sources.

Food and Goods

As society has become more educated, it has also become more interested in the source and quality of food and goods. However, it can be difficult to verify the true origin of a good or that it’s authentic, hasn’t been diluted, and is backed by a manufacturer with a reliable track record. The verifiable web can help users track and rate food and goods from inception to the storefront with more certainty.

Contracts and Legal Systems

Having verifiable proof that a contract will be honored is critical to running a reliable business or purchasing a product (e.g., warranties). Unfortunately, contracts are not always strictly enforced, especially when one side has a clear economic and political advantage over their counterparty. The verifiable web can level the playing field by replacing clauses in digital contracts with technologically enforced guarantees via smart contracts and oracle networks. This can help improve trust between people, businesses, and institutions globally, particularly by making the levers that can dictate the outcome of contracts impossible for any party to tamper with.

Social Participation and Consensus

Obtaining a realistic view of what the public thinks helps institutions and society at large make better decisions. AI, bot farms, and closed-source algorithms make it hard to know whether social consensus derived from online debates, surveys, elections, viewership, and more is real or manipulated. Thus, it’s important for the verifiable web to bring authentication and verifiability to how social consensus is created and gathered, such as by open-sourcing algorithms used in information collection and leveraging manipulation-resistant and privacy-preserving verification systems to prove someone is a unique human without revealing their identity.

Technologies That Define How the Verifiable Web Works

Below is a list of technologies/technological movements that combine to create the verifiable web. New technologies are also likely to emerge as consumers demand more and more verifiable proof and guarantees about their everyday lives.

Open-Source Software

Open-source software is software for which the code that defines how it runs is verifiable by anyone. This allows stakeholders using or affected by the software to inspect it before deciding to adopt or update it. As more people independently verify it, the software becomes more secure and trusted to consistently operate in a specific way. 

Examples: Linux Operating System, Mozilla Firefox, and Apache Web Server

Cryptography

Cryptography involves the use of verifiable mathematical techniques to secure communication in the presence of adversarial behavior. In a general sense, cryptography is used to conceal and authenticate information by scrambling it with a cipher, which cannot be cracked in any practical sense (e.g., it would require a prohibitive amount of time and investment), even with the most advanced computing technologies. Cryptography is already widely used across the modern Internet to ensure that users are able to interact with each other without worrying about imposters or middlemen intercepting their communications.

Examples: One-Way Hash Functions, Public/Private Key Encryption, and Zero-Knowledge Proofs

Blockchains and Smart Contracts

Blockchains are distributed ledgers that provide verifiable proof that the tracking of asset ownership is accurate and tamperproof, and that the ability to move assets between users is permissionless and always available. Furthermore, the smart contract applications running on blockchains provide verifiable proof that their code will execute exactly as it is stored onchain. This enables businesses to transact and governance processes to be managed in a distributed manner that is transparent and resistant to manipulation by a single entity.

Blockchains make use of a multitude of technological primitives, most notably cryptography, consensus protocols, and financial incentives. As an overview, blockchains use financial rewards and penalties to incentivize a decentralized network of independent nodes to come to an honest consensus about the validity of submitted transactions and to keep the ledger updated and available. Blockchains also use cryptography to authenticate transactions, ensuring they are unique to a specific user. The combination of cryptography and decentralized consensus makes it very difficult to tamper with the network, resulting in a form of cryptographic truth.

Examples: Bitcoin, Aave, and ENS

Cryptographic truth enables deterministic computing—applications that execute exactly as their code dictates—and golden records—a single source of reliable truth outside of the direct control of any one stakeholder.

Oracles

Oracles leverage similar primitives of cryptography, consensus protocols, and financial incentives, but for the purpose of creating cryptographic truth around any type of data, computation, or connection between systems. Whereas blockchains are only concerned with verifying the ownership and transfer of tokens or updating smart contracts, oracles can be applied to creating truth and guarantees about anything, such as calculating the fair price of an asset, generating a tamperproof and unbiased random number, or ensuring that an automated task will be completed at a specific time or that value will be securely transferred between systems when a specific event occurs. Oracles can expand cryptographic truth to the verification of almost anything.

Examples: Chainlink Data StreamsFunctions, and Cross-Chain Interoperability Protocol (CCIP)

Trusted Hardware

Trusted hardware is hardware where the software running inside cannot be tampered with or even observed by either a third party or the hardware operator. Trusted execution environments (TEEs) often generate cryptographic attestations, which give users verifiable proof that the software running inside executed exactly as expected. Although the area still requires more research and development, trusted hardware is an extension of other types of hardware like secure enclaves and hardware security modules (HSMs), which provide a protected environment for storing information or executing code.

Examples: Intel SGX, ARM TrustZone, and Keystone

Biometrics

Authenticating that information came from a specific person or company is critical proof for facilitating certain processes. Biometrics provide a way of authenticating that an action was taken by a specific person by verifying a physical feature unique to them. For example, phones use a person’s fingerprint as verifiable proof that they belong to the owner.

Examples: Fingerprint, Iris Recognition, Facial Recognition

Reputation Systems

While truths or proofs may not always be obtainable in real-time, they can be demonstrated over time through the use of reputation systems. Reputation systems are methods of tracking the historical performance of an entity or process, such as a system’s uptime, the accuracy of a data provider, the correctness of an analyst’s predictions, or the reliability of a user in a help forum. The integrity of reputation systems is further verifiable when they cryptographically sign data that they’re tracking onchain, where it cannot be deleted or altered in the future.

Examples: eBay, Stack Exchange, and Ethereum Beacon Chain Validator Rankings

Artificial Intelligence

As machine learning algorithms and data collection techniques become more advanced, so too does the ability to analyze complex datasets and come to conclusions with a statistically high degree of confidence. 

One example of this is a project in development by Green World called AIRS, which aims to use satellite remote sensing data with smart contracts to successfully reward stewards of targeted regenerative agriculture. Chainlink oracles are tasked with gathering ground-truthing and satellite data, analyzing it within trusted execution environments for high-trust quantitative metrics, and relaying it to a blockchain to trigger automated payments to stewards. AIRS rewards to stakeholders can take the form of cryptocurrency—readily convertible into local currency—or digital financial instruments tailored to meet the needs of local communities.

A Trust Anchor for Society

The verifiable web is a much-needed trust anchor for society, whereby vulnerable human decision-making is replaced by unbiased software that enforces honest outcomes and provides verifiable proof of how it arrived at such outcomes. This new superpower enables builders to create applications that are undeniably fair, provably accessible to anyone in the world, and verifiably secure against manipulation. The possibilities are endless, and this paradigm shift couldn’t come at a more pressing time, with society needing verifiable truth about how the world works more than ever.

Comments

All Comments

Recommended for you

  • Bank of Japan to Maintain Interest Rates in April

    On April 21, according to Nikkei News: The Bank of Japan will maintain interest rates unchanged in April.

  • Iranian Military: Ready to Respond Decisively to 'Enemy's Breach of Promises'

    On April 21, local time, Abdollahi, commander of the Khatam al-Anbiya Central Command of the Iranian Armed Forces, stated that Iran is prepared to respond decisively to the 'enemy's breach of promises.' Abdollahi emphasized that the current Iranian military possesses 'authority, readiness, and comprehensive strategic capabilities.' He noted that the Islamic Revolutionary Guard Corps and other defense forces have demonstrated combat capabilities in relevant operations, putting 'Israel and the United States in a difficult and fatigued position,' forcing them to 'seek a ceasefire.' Abdollahi also stressed that the Iranian armed forces maintain a high level of unity with the government and the people under the supreme leader's unified command, and will respond 'decisively, resolutely, and promptly' to any threats and actions. (CCTV News)

  • Another Iranian Oil Tanker Returns to Iran After Breaking US Blockade

    On April 21, according to CCTV News, maritime intelligence company 'TankerTrackers' reported that a tanker belonging to the National Iranian Tanker Company returned to Iran after unloading approximately 2 million barrels of crude oil in Indonesia, crossing the relevant maritime blockade line. The tanker is currently en route to Iran's main oil export hub, Khark Island, and is expected to arrive on April 22 local time. It is reported that the tanker set sail from Iran in late March, heading towards the Riau Islands of Indonesia.

  • White House: US and Iran on the Verge of Reaching an Agreement

    On April 21, White House Press Secretary Kayleigh McEnany stated in an interview with Fox News on the evening of the 20th that the United States and Iran are on the "verge of reaching an agreement." McEnany remarked, "The US has never been closer to achieving a truly good deal." However, she did not disclose any information regarding the current status of the negotiations. McEnany noted that even if an agreement is not reached, President Trump has multiple options and is not afraid to utilize these measures. Previous actions have demonstrated that Trump is not just "bluffing."

  • Kelp DAO Attacker Transfers 30,800 ETH to Special Address

    On April 21, news emerged that, according to monitoring by PeckShield, the Kelp DAO attacker transferred 30,800 ETH to a special address starting with 0x00000, possibly indicating a destruction action.

  • Trump: 'Midnight Hammer' Completely Dismantled Iran's Nuclear Dust Base

    On April 21, U.S. President Trump stated that the 'Midnight Hammer' operation has completely destroyed the 'nuclear dust' base within Iran. As a result, the cleanup will be a long and arduous process. The fake news media, including CNN and other corrupt media networks and platforms, have failed to give our great pilots the credit they deserve, instead always attempting to belittle and undermine them. They are losers!!! (Dongxin News Agency)

  • BTC Drops Below $76,000

    Market data shows that BTC has dropped below $76,000, currently priced at $75,999.63, with a 24-hour increase of 1.68%. The market is experiencing significant volatility, so please ensure proper risk management.

  • Japan Officially Allows Export of Lethal Weapons Through Cabinet Resolution

    On April 21, according to Kyodo News, the Japanese government officially revised the 'Three Principles on Transfer of Defense Equipment' and its operational guidelines during a cabinet meeting, which will, in principle, allow the export of lethal weapons. (Xinhua News Agency)

  • Trump Claims Iran Will Negotiate

    On April 21, during a phone interview with CNN, U.S. President Trump stated that Iran "will negotiate" and expressed confidence in potential talks set to take place in Pakistan. Trump remarked, "They will negotiate; if they don't, they will face unprecedented problems." He also expressed hope that both sides could reach a "fair agreement" and emphasized that Iran "will not have nuclear weapons." Additionally, he defended military actions against Iran by stating there was "no choice" and claimed that they would ultimately "wrap things up."

  • Amazon to Invest Additional $5 Billion in Anthropic

    On April 21, Amazon announced on Monday that it will invest an additional $5 billion in the artificial intelligence company Anthropic, bringing the total investment to as much as $20 billion. Anthropic develops the Claude chatbot and programming tools, and plans to invest over $100 billion in Amazon's cloud technology and chips over the next decade.