<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[BrightID - Medium]]></title>
        <description><![CDATA[Social identity network of unique humans. BrightID allows people to prove to applications that they’re only using one account. - Medium]]></description>
        <link>https://medium.com/brightid?source=rss----ae36d340be8a---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>BrightID - Medium</title>
            <link>https://medium.com/brightid?source=rss----ae36d340be8a---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Mon, 20 Apr 2026 10:46:13 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/brightid" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[BrightDAO Fairdrop 1 Retrospective]]></title>
            <link>https://medium.com/brightid/brightdao-fairdrop-1-retrospective-d31576fe2a2c?source=rss----ae36d340be8a---4</link>
            <guid isPermaLink="false">https://medium.com/p/d31576fe2a2c</guid>
            <category><![CDATA[dao]]></category>
            <category><![CDATA[airdrop]]></category>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[cryptocurrency]]></category>
            <category><![CDATA[brightid]]></category>
            <dc:creator><![CDATA[Bitsikka]]></dc:creator>
            <pubDate>Tue, 25 Jan 2022 16:46:49 GMT</pubDate>
            <atom:updated>2022-01-25T16:46:49.790Z</atom:updated>
            <content:encoded><![CDATA[<p>We have come to the conclusion of our first Fairdrop. We would like to thank all the partners, community, contributors and everyone for their participation.</p><p>Here we drill down into the details and the ending:</p><p>The Fairdrop was a portion of the quarter of 100 Million $BRIGHT that made up the initial minted supply (25 million). High level composition of the Initial minted supply consists of allocations for Bright DAO, Past actions, and Initial Incentives.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*LsSbvyByBS9T-EOX" /></figure><p>The Fairdrop consisted particularly of the <em>Past actions</em> allocation (6.85 million).</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*SxNoe4zRzuooUc5x" /></figure><p>Starting on September 16, 2021, Fairdrop took place in 8 rounds. Claims could be made on either of the two networks — Main-net or Gnosis Chain (formerly xDAI).</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*itevMvFKPtcydOz-" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*LN5sVoE_fSWGZ_xO" /></figure><p>89.4% was successfully claimed. Of the remaining 10.6%, most were allocations to Gitcoin projects(non-individuals) that benefited in trust bonus matching due to BrightID enabled donors. Some of the remaining were those who missed linking their BrightID with the fairdrop DApp in time.</p><p>These missed claims will be swept to BrightDAO common pool and will be spent on funding future tasks and projects proposed and passed by the community.</p><p>Considering the size of successful claims, the fairdrop was a great success. This is just the beginning and we hope to achieve similar or better success in the future.</p><h3>Fairdrop DApp</h3><p>The Fairdrop DApp used in the fairdrop is one of the many strong use cases of BrightID. It had been in development on the side for some time prior to the fairdrop as a generic product for any individual, project, or community to use for their airdrop.</p><p>The term <em>fairdrop</em> simply means that an airdrop is per individual rather than per address.</p><p>We learnt a lot about improving it through the BrightDAO fairdrop experience and it has been very encouraging to see how well it performed as intended in its earliest form.</p><p>Further development of the product will now be in the hands of the BrightDAO community. We heartily welcome any individuals, projects and communities that wish to further develop and utilize it.</p><p>Among the possibilities, it would be wonderful if we could make it the portal for perpetual airdrops, and it would be a game changer especially in terms of fair and wide distribution for onboarding new users to web3.</p><p>The project is open source on Github:</p><ul><li><a href="https://github.com/BrightID/fairdrop">https://github.com/BrightID/fairdrop</a></li><li><a href="https://github.com/BrightID/fairdrop-backend">https://github.com/BrightID/fairdrop-backend</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d31576fe2a2c" width="1" height="1" alt=""><hr><p><a href="https://medium.com/brightid/brightdao-fairdrop-1-retrospective-d31576fe2a2c">BrightDAO Fairdrop 1 Retrospective</a> was originally published in <a href="https://medium.com/brightid">BrightID</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What is Bitu Verification?]]></title>
            <link>https://medium.com/brightid/what-is-markaz-verification-level-47397372c8eb?source=rss----ae36d340be8a---4</link>
            <guid isPermaLink="false">https://medium.com/p/47397372c8eb</guid>
            <dc:creator><![CDATA[mohammad reza yazdani]]></dc:creator>
            <pubDate>Wed, 22 Dec 2021 10:26:00 GMT</pubDate>
            <atom:updated>2021-12-22T10:32:24.303Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*9b39QulmaOd6QsaSK97tRw.jpeg" /></figure><p>BrightID tackles the problem of Sybil (duplicate account) attacks. By developing a public graph, BrightID has brought about an infrastructure in which different algorithms can be tried to counteract such attacks. Applications will choose what algorithms suit them best to verify their users.</p><p>Bitu is the first graph-analysis-based verification method that BrightID offers. The nodes inside the main regions of the graph get verified by Bitu. It recognizes nodes outside the borders of those regions as Sybil accounts. This verification method is based on the fact that when a graph is drawn using <a href="https://en.wikipedia.org/wiki/Force-directed_graph_drawing">Force-directed algorithms</a>, Sybil accounts are pushed away from the main, dense regions to the borders. The reason is that Sybil accounts can not make a significant number of connections with honest ones and can only make connections with each other. That is why they get pushed away from the main regions to the surrounding districts.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/931/1*z4HEOMgdRdvJEuhrd5qxeA.jpeg" /></figure><p>In current seed-based algorithms, there is a small number of highly trusted nodes called seeds which have the power of verifying users. Because nodes are verified on the basis of their proximity to the seeds in the graph, such algorithms are very vulnerable to attacks from seeds.</p><p>In Bitu, however, there is no seed. In fact, every node is a seed and can verify others as long as they remain in the main regions of the graph. While seed-based methods rely on a minority of highly trusted seeds, Bitu relies on a low-trusted majority.</p><p>Can BrightID scale while maintaining security against Sybil attacks? We have been frequently asked, as <a href="https://medium.com/u/587a00dbce51">Vitalik Buterin</a> did in “<a href="https://vitalik.ca/general/2020/10/18/round7.html">Gitcoin Grants Round 7 Retrospective</a>”:</p><blockquote>BrightID is going to face a tough challenge making it reasonably easy for regular users to join but at the same time resist attacks from fake and duplicate accounts. I look forward to seeing them try to meet the challenge!</blockquote><p>Verification based on the help of a small number of highly trusted seeds gives users a hard time getting verified. On the other hand, increasing the number of seeds decreases the security of the network against attacks.</p><p>Relying on a majority of low trusted nodes instead of a minority of high trusted ones known as seeds enables Bitu to maintain scalability while ensuring security. Bitu enables users to get verified easily through making a single connection with one of the users in the main regions. Thus BrightID can scale its network. And if a user in the main regions tends to create a significant number of fake accounts to verify them by making connections with them, the fake accounts get pushed away from the main regions and even the attacker will get unverified. This prevents large-scale Sybil attacks and guarantees security.</p><p>Moreover, Bitu can tackle small-scale Sybil attacks; it enables apps to verify users based on the number of connections. For instance, Gitcoin may require users to have at least 10 “Already known” connections in Bitu. So the higher the required number of connections is, the more secure the app gets. This makes it too hard for Sybil accounts to make enough connections without getting out of the main regions.</p><p>An example helps clarify how it works. User X wants to create 10 fake accounts in order to use them in the Gitcoin application. If Gitcoin requires only one “Already known” connection for verification, user X with strong connections to the main regions of the graph can drag those ten accounts into the main regions without the risk of getting out of the main regions. However, if Gitcoin requires ten or more “Already known” connections for verification, user X needs to either connect these ten fake accounts to honest users or connect these ten accounts to each other to reach the minimum required number of connections. Note that honest users don’t make connections with unknown accounts as “Already known” and connecting those ten accounts to each other causes all these ten accounts to get pushed away from the main regions of the graph and get unverified.</p><p>Bitu is the first method that tries to tell bots and fake users from real ones through the viewing of the graph. The BrightID graph is available to the public, and everyone can easily distinguish the main regions and the borders by looking at the graph. You can log in to the <a href="https://explorer.brightid.org/">BrightID explorer</a> and see your own and your connections’ location in the graph. Refer to our <a href="https://brightid.gitbook.io/brightid/getting-verified/bitu-verification">Gitbook</a> for more information on how to get verified in Bitu.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=47397372c8eb" width="1" height="1" alt=""><hr><p><a href="https://medium.com/brightid/what-is-markaz-verification-level-47397372c8eb">What is Bitu Verification?</a> was originally published in <a href="https://medium.com/brightid">BrightID</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[BrightID Verification Story]]></title>
            <link>https://medium.com/brightid/brightid-verification-story-2d0c2ab82f42?source=rss----ae36d340be8a---4</link>
            <guid isPermaLink="false">https://medium.com/p/2d0c2ab82f42</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[sybil-attack]]></category>
            <category><![CDATA[brightid]]></category>
            <dc:creator><![CDATA[mohammad reza yazdani]]></dc:creator>
            <pubDate>Fri, 17 Dec 2021 11:21:15 GMT</pubDate>
            <atom:updated>2021-12-22T09:32:48.185Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*R4T2M0ySlpz1AXnVoceVrA.jpeg" /></figure><h4>Reaching the Next Milestone in Counteracting Sybil Attackers</h4><p>The development of BrightID began three years ago with the goal of providing a decentralized platform for applications to ensure the uniqueness of their users and counteract the attack of bots on their applications. We believe that the only decentralized, scalable, and reliable way to detect humans from bots in the future of cyberspace is to rely on the social relations of humans.</p><p>From the beginning, BrightID was supposed to distinguish real users from bots and verify them by analyzing the graph formed by connections that users make with their friends and family members. However, the graph-analysis-based verification methods can only be used if there is enough data covering them. It is not possible to use such verification methods unless a graph of a significant number of users who have connected with at least a small number of friends exists. That is why BrightID had to make use of another verification method to verify its early users in the initial stage although that method was not reliable and scalable.</p><p>Joining connection parties and making connections with a trusted person who hosts the call was the initial verification method that BrightID used. In this stage, BrightID was like a newborn fed on milk. As milk is the only suitable food for a newborn to grow in the first stages of growth, the only healthy way that BrightID could grow enough was to rely on the Stars in connection parties to verify users. And just as milk is not enough for newborns to grow as they age, BrightID cannot grow by only relying on stars. And just as humans always use milk as nutritious food, using stars can always be a basic verification method in BrightID.</p><p>Today, we are proud to announce that BrightID has grown enough to start using graph-analysis-based verification methods. BrightID has more than 30,000 active users, 10,000 of whom have made 4 connections on average with the people they know in person. That is why BrightID can now start to use other verification methods. Soon BrightID will be making use of various verification methods, the first ones are Aura and <a href="https://brightid.gitbook.io/brightid/getting-verified/bitu-verification">Bitu</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=2d0c2ab82f42" width="1" height="1" alt=""><hr><p><a href="https://medium.com/brightid/brightid-verification-story-2d0c2ab82f42">BrightID Verification Story</a> was originally published in <a href="https://medium.com/brightid">BrightID</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[BrightDAO is Here!]]></title>
            <link>https://medium.com/brightid/brightdao-is-here-bdcb198393e?source=rss----ae36d340be8a---4</link>
            <guid isPermaLink="false">https://medium.com/p/bdcb198393e</guid>
            <category><![CDATA[dao]]></category>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[ethereum]]></category>
            <category><![CDATA[decentralization]]></category>
            <dc:creator><![CDATA[C. Adam Stallard]]></dc:creator>
            <pubDate>Thu, 16 Sep 2021 17:00:22 GMT</pubDate>
            <atom:updated>2021-09-16T17:00:22.611Z</atom:updated>
            <content:encoded><![CDATA[<h4>A community for decentralized proof-of-uniqueness</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*63DQWeM6NBR_rNjN7z8Q9A.png" /></figure><p>We’ve grown. At <a href="https://apps.brightid.org">30,000 sponsored users</a>, we need to imagine more clearly how a decentralized proof of unique human system can manage itself.</p><p>We need to imagine our movement as a collection of teams self-organizing and rallying to contribute: verification helpers, anti-sybil researchers, user-experience experts, and many more.</p><p>A DAO powered by <a href="https://1hive.gitbook.io/gardens/">1Hive Gardens</a> and <a href="https://aragon.org/">Aragon</a> technologies is the best structure to achieve this.</p><p>$BRIGHT is the token that makes <a href="https://dao.brightid.org">BrightDAO</a> work.</p><p>A <a href="https://fairdrop.brightid.org">fairdrop</a> and ongoing fair distribution mechanisms (think BrightID-enabled faucets) are the best ways to allocate $BRIGHT. (A “fairdrop” simply means some or all rewards are given per person instead of per address.)</p><p>We’ve written <a href="https://brightid.gitbook.io/bright/what-is-bright/">several guides</a> to help explain <a href="https://brightid.gitbook.io/bright/what-is-bright/">$BRIGHT</a>, <a href="https://brightid.gitbook.io/bright/bright-dao/">BrightDAO</a>, and the BrightID-enabled <a href="https://brightid.gitbook.io/bright/getting-bright/fairdrop/">fairdrop</a> process.</p><ul><li><a href="https://brightid.gitbook.io/bright/what-is-bright/">$BRIGHT guide</a></li><li><a href="https://brightid.gitbook.io/bright/bright-dao/">BrightDAO</a></li><li>$BRIGHT <a href="https://brightid.gitbook.io/bright/getting-bright/fairdrop/">fairdrop</a></li></ul><h3>Launch Party / AMA</h3><p>Still have questions?</p><p>Today at 11:00 a.m. Pacific, CurlyBracketEffect of <a href="https://twitter.com/rabbithole_gg">RabbitHole</a> and DAOnToEarth podcast fame will be our MC to introduce us to the wonders of BrightDAO and $BRIGHT.</p><p>Join us on our <a href="https://discord.gg/zT47QeUzaW">discord stage</a> for this epic gathering.<br>* <a href="https://discord.gg/nTtuB2M">BrightID discord</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bdcb198393e" width="1" height="1" alt=""><hr><p><a href="https://medium.com/brightid/brightdao-is-here-bdcb198393e">BrightDAO is Here!</a> was originally published in <a href="https://medium.com/brightid">BrightID</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[BrightID 2021 Q2 Roadmap]]></title>
            <link>https://medium.com/brightid/brightid-2021-q2-roadmap-e8585a42c3fc?source=rss----ae36d340be8a---4</link>
            <guid isPermaLink="false">https://medium.com/p/e8585a42c3fc</guid>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[unique]]></category>
            <category><![CDATA[social-network]]></category>
            <category><![CDATA[brightid]]></category>
            <category><![CDATA[blockchain]]></category>
            <dc:creator><![CDATA[C. Adam Stallard]]></dc:creator>
            <pubDate>Sun, 21 Mar 2021 10:04:21 GMT</pubDate>
            <atom:updated>2021-03-25T08:02:11.481Z</atom:updated>
            <content:encoded><![CDATA[<h4>Here’s what the next three months look like for BrightID.</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*uR9OpO3X6ewZ4c1G1LhSQQ.png" /><figcaption>BrightID Q2 2021 Roadmap</figcaption></figure><p>Let’s go into each of the six milestones in a little more detail.</p><p>🔬 <strong>Node discovery.</strong> How does a client (for example the BrightID app on your mobile device) know which node in the BrightID network to connect to? After this milestone, clients will be able to find out about other nodes from a small list of hard-coded “seed” nodes. If seed nodes trust other nodes, they’ll be added to the list. Then clients can use a “<a href="https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Promise/race">promise race</a>” and other data to find the best node to connect to.</p><p>👩‍🔬 <strong>Anti-Sybil: Stronger connection types.</strong> You may have noticed there are different connection levels in BrightID. Different connection levels create different graphs of users. The goal is to have a verification that uses the very strong “recovery” connection level, which real people only assign to others they trust enough to help guard their BrightID against theft or loss.</p><p>🕵🏽‍♀️ <strong>Blind signatures.</strong> Currently, BrightID nodes store mappings between anonymous identifiers used by apps and BrightID identifiers so that an app can query about someone’s unique verification using their own identifiers. (BrightIDs are not shared with apps.) While this structure makes it less likely that a data leak could reveal information from one app to another, we can do even better. <a href="https://forum.brightid.org/t/improved-privacy-social-recovery-for-apps-no-need-for-contexts/54">With blind signatures, we can remove this mapping completely</a>. This simplifies the architecture and makes the system even more immune to data leaks.</p><p>📲 <strong>Client portability.</strong> We’ve already created the necessary features in the node API for a user to install BrightID on multiple devices and backup or recover their BrightID using another device, but would be hard to implement this without an example. We’re going to build a web version of BrightID that supports these features so that others can use it as an example to make their own BrightID clients.</p><p>💉 <strong>Anti-Sybil: attack modeling and injection.</strong> <a href="https://github.com/BrightID/BrightID-AntiSybil">We’ve already created a great platform for modeling sybil attacks and comparing the results of different algorithms or parameters</a>. In some approaches to sybil-resistance in social networks, there is a manual review step, and the algorithm is used to prioritize accounts to review. As a pseudonymous network, BrightID prefers an automated way to define the line between sybil and honest users. We can do this by automatically injecting modeled attacks into the real graph and measuring their rank against previously measured nodes.</p><p>🛡️<strong>Node Security.</strong> BrightID nodes have already gone through a hardening process, with sensible rate limits in place by default, but we want to take another pass at this. We also want to create <a href="https://stoplight.io/blog/introduction-to-api-testing/#api-producer-contract-testing">API contract tests</a> to make sure our node API and <a href="https://dev.brightid.org/docs/node-api/">reference docs</a> match. We will also audit the use of digital signatures and secure message passing.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e8585a42c3fc" width="1" height="1" alt=""><hr><p><a href="https://medium.com/brightid/brightid-2021-q2-roadmap-e8585a42c3fc">BrightID 2021 Q2 Roadmap</a> was originally published in <a href="https://medium.com/brightid">BrightID</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Introducing IDChain]]></title>
            <link>https://medium.com/brightid/introducing-idchain-392c76c31d73?source=rss----ae36d340be8a---4</link>
            <guid isPermaLink="false">https://medium.com/p/392c76c31d73</guid>
            <category><![CDATA[democracy]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[ethereum]]></category>
            <category><![CDATA[identity]]></category>
            <dc:creator><![CDATA[C. Adam Stallard]]></dc:creator>
            <pubDate>Thu, 09 Jul 2020 23:08:49 GMT</pubDate>
            <atom:updated>2022-01-15T08:54:40.689Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ncNPYQgTwKctCgycx3omjw.png" /></figure><p>We created IDChain to synchronize BrightID node operations, but its unique qualities make it an attractive platform for other projects. We’ve been using it for several months, and it’s ready for other projects to use.</p><h4>Features</h4><ul><li>Short block intervals.</li><li>Every verified unique human gets a lifetime supply (average) of gas.</li><li>Validators (the proof-of-authority equivalent to miners) can be democratically elected. The top proposal is to use delegated proof-of-stake with quadratic voting to lessen the voting power of whales. This is possible with BrightID.</li><li>Validators get paid a modest salary by <a href="https://github.com/BrightID/BrightID-Constitution">BrightID Main DAO</a>, instead of gas fees (which are instead burned). This ensures that validators are aligned with making IDChain usable by the masses, not making a profit.</li></ul><h3>Start using IDChain</h3><p>IDChain is ready to use right now. Follow <a href="https://idchain.one/begin/">these steps</a> to receive your free supply of Eidi (the native gas token) and start using IDChain with <a href="https://metamask.io/">Metamask</a>.</p><h4>Eidi</h4><p>Eidi is the native gas token on IDChain (similar to Ether on <a href="https://ethereum.org/">Ethereum</a>). The lifetime supply is designated by validators to match what they believe an average user will spend on transaction fees. If a user spends more, they need to buy Eidi from a user that spends less.</p><h3>What can I do with IDChain?</h3><h4>Launch a cheap Aragon DAO</h4><p>BrightID and IDChain itself use <a href="https://blockchainhub.net/dao-decentralized-autonomous-organization/">DAOs</a> on IDChain for governance. You can start making <a href="https://aragon.idchain.one/#/">Aragon DAOs</a> at <a href="https://aragon.idchain.one/">aragon.idchain.one</a> with your lifetime supply of Eidi.</p><h4>Move tokens between Mainnet and IDChain</h4><p>We’ve implemented the excellent bridge from <a href="https://bridge.poa.net/">PoA</a> to create a way to move tokens between Mainnet and IDChain. The bridge is at <a href="https://omni.idchain.one">omni.idchain.one</a>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/870/1*Mtq2m33guZjrYiknfklczw.png" /></figure><h4>Easily run a node with DappNode</h4><p>IDChain is in the <a href="https://dappnode.github.io/explorer/#/">public registry in DappNode</a>, so go ahead and spin up a node with <a href="https://dappnode.io/">DappNode</a>!</p><h4>Explore blocks and contracts</h4><p>IDChain comes with the excellent open-source block explorer by <a href="https://medium.com/poa-network">PoA</a> called <a href="https://docs.blockscout.com/">blockscout</a>, which you can check out at <a href="https://explorer.idchain.one/">explorer.idchain.one</a>. Just like etherscan, blockscout lets you view and interact with verified smart contracts, such as <a href="https://explorer.idchain.one/address/0x6E39d7540c2ad4C18Eb29501183AFA79156e79aa/contracts">the one that distributes Eidi</a>.</p><h3>What is proof-of-authority?</h3><p>A proof-of-authority blockchain uses authorized individuals to sign blocks and stake their real-world reputation. This approach was pioneered by Parity, which created the <a href="https://openethereum.github.io/wiki/Aura">Aura algorithm</a>. A lot of great tooling was created by <a href="https://medium.com/poa-network">PoA Network</a>. (We are using <a href="https://docs.blockscout.com/">blockscout </a>and <a href="https://bridge.poa.net/">PoA bridge</a>.) They have also written great articles on proof-of-authority, <a href="https://medium.com/poa-network/poa-network-preserving-the-human-blockchain-connection-774e221308aa">such as this one</a>.</p><h3>Future Plans</h3><p>Anyone can port DApps and contracts they like from Mainnet to IDChain. Some features we’d like to see:</p><ul><li>Bridges for other tokens besides DAI. <a href="https://docs.tokenbridge.net/amb-bridge/about-amb-bridge">Arbitrary message bridges</a>.✔️ BrightID now has AMB and a <a href="https://omni.idchain.one">token omnibridge</a>.</li><li>Various ways to vote: <a href="https://en.wikipedia.org/wiki/Liquid_democracy">liquid democracy</a>, <a href="https://en.wikipedia.org/wiki/Ranked_voting">ranked choice</a>, <a href="https://en.wikipedia.org/wiki/Quadratic_voting">quadratic voting</a>, <a href="https://medium.com/giveth/conviction-voting-a-novel-continuous-decision-making-alternative-to-governance-aa746cfb9475">conviction voting</a>. Citizens of IDChain should have many options for democratic participation.</li><li>Decentralized exchanges. <strong>Update:</strong> <a href="https://swap-info.idchain.one">Swap on IDChain</a> 🦄.</li><li>Other DAO-like platforms, such as <a href="https://colony.io/colony/brightID">Colony</a>.</li><li>Anything you want!</li></ul><p><a href="https://docs.google.com/document/d/12fsJldS4_-_WZRTH51HPsApJRHDovLWdNC8CNCtgrIU/">IDChain Governance plans: request for comments.</a></p><p>**UPDATE**<br>Moloch DAOs can now be created with a simple GUI interface via <a href="https://daohaus.club/">Daohaus</a>. Simply connect your wallet to IDChain and summon a DAO. It will suggest WEIDI (wrapped EIDI — the gas token on IDChain) as the primary token.</p><p>Please see our <a href="https://github.com/BrightID/IDChain">github repo</a> for more information.</p><h3>Get In Touch</h3><ul><li><a href="https://discord.gg/nTtuB2M">Discord (chat)</a></li><li><a href="https://twitter.com/BrightIDProject">Twitter</a></li><li><a href="https://www.brightid.org/#use-in-your-project">Web form</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=392c76c31d73" width="1" height="1" alt=""><hr><p><a href="https://medium.com/brightid/introducing-idchain-392c76c31d73">Introducing IDChain</a> was originally published in <a href="https://medium.com/brightid">BrightID</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What value do Subscriptions (Subs) have for applications?]]></title>
            <link>https://medium.com/brightid/what-value-do-subscriptions-subs-have-for-applications-49b7602aa228?source=rss----ae36d340be8a---4</link>
            <guid isPermaLink="false">https://medium.com/p/49b7602aa228</guid>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[public-good]]></category>
            <category><![CDATA[commons]]></category>
            <category><![CDATA[funding]]></category>
            <dc:creator><![CDATA[C. Adam Stallard]]></dc:creator>
            <pubDate>Tue, 07 Jul 2020 17:56:59 GMT</pubDate>
            <atom:updated>2021-05-05T08:43:07.603Z</atom:updated>
            <content:encoded><![CDATA[<h4>Subs are great for small apps with high growth potential needing a unique identity solution.</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*4ieGfR831ZwBQUAMb7EcKA.png" /></figure><p>We’ve explored <a href="https://medium.com/brightid/brightid-sponsorships-5327a8d39f1e">Sponsorships</a> in three articles (<a href="https://medium.com/brightid/inside-brightids-funding-model-9f6f828c6f0">1</a>, <a href="https://medium.com/brightid/announcing-sponsorships-8ccd91ce1211">2</a>, <a href="https://medium.com/brightid/brightid-sponsorships-5327a8d39f1e">3</a>). In this one we’ll look at Sponsorships and Subscriptions in terms of the value they offer applications integrating with BrightID.</p><p>According to the <a href="https://www.brightid.org/whitepaper">BrightID whitepaper</a>, there are two main reasons an application would want to buy Sponsorships:</p><h4>1. To acquire new users.</h4><p>One of first tasks for new BrightID users is to link their BrightID with applications. They do this from the “Apps” tab. Since the first app they link with will need to sponsor them, apps that have Sponsorships will be listed at the top.</p><p>We’re also creating an apps site to display the growth of BrightID in terms of users and applications. We want to show which applications have the largest influence on the network. Here also, applications with the most Sponsorships will rise to the top.</p><h4>2. To decide how BrightID funds are used.</h4><p>BrightID’s funds come from the sale of Sponsorships and are governed by BrightID Main DAO.</p><p>There’s no expectation of profit from Sponsorships or governing BrightID (BrightID Main DAO managers are unpaid); it’s a matter of deciding how the money is spent. Obviously, there’s potential for conflicts of interest, which is why the managers should represent many projects that can keep each other in check. Indeed, <a href="https://github.com/BrightID/BrightID-Constitution#requirements">the constitution of BrightID Main DAO mandates that no group of managers with a shared external affiliation should compose nearly half of the managers</a>.</p><p>Because the price of Sponsorships is capped, there’s a lot of potential value in unique verifications that isn’t captured. An application that pays for a small portion of that value can help decide how to direct money to improve the verification process in the future.</p><h3>Subscriptions explained</h3><p>Now that we know why an app would want to buy Sponsorships, we can understand why it would want to buy Subscriptions. One Subscription produces 252 Sponsorships over six years. The rate of production increases every year according to the chart below. Since the first 400,000 Subscriptions are on sale for $1 DAI each (the same cost as one Sponsorship), this represents a large savings.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/600/1*tbKLJ2hkn4Ib5kxuIAhOLw.png" /></figure><p>Many apps have aspirations to grow rapidly, but don’t have up-front money to pay for the users they intend bring in. This is exactly where Subscriptions can help. Subscriptions generate a stream of Sponsorships that matches the exponential growth pattern to which a new application aspires.</p><p>In the future, there will be enough large, well-liked, and well-funded apps integrated with BrightID that users should have an easy time finding one they’re already using to sponsor them. BrightID will no longer serve as an advertising channel for smaller apps — only apps with many users will be able to garner the top spots in BrightID lists. Smaller apps that have unactivated Subscriptions or unassigned Sponsorships from Subscriptions can resell them to larger apps.</p><p>Since BrightID Main DAO only plans to sell 900,000 Subscriptions, future applications won’t have the option to buy them, but those with aspirations to grow quickly won’t face the same challenge of finding Sponsorships because there will then be plenty of large apps willing to sponsor new users. (Users only need one sponsorship per lifetime and it’s good across all apps.)</p><p>Subscriptions are therefore meant to attract apps that aspire to grow rapidly and want to take advantage of large discounts for being first.</p><p>Both Sponsorships and Subscriptions are on sale via the <a href="https://sp.brightid.org/">Sponsorships Dashboard</a>. More information about the <a href="https://www.brightid.org/sponsorships">sale and the dashboard is available on this page</a>.</p><h3>Get In Touch</h3><ul><li><a href="https://www.brightid.org/#use-in-your-project">Web form</a></li><li><a href="https://discord.gg/nTtuB2M">Discord (chat)</a></li><li><a href="https://twitter.com/BrightIDProject">Twitter</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=49b7602aa228" width="1" height="1" alt=""><hr><p><a href="https://medium.com/brightid/what-value-do-subscriptions-subs-have-for-applications-49b7602aa228">What value do Subscriptions (Subs) have for applications?</a> was originally published in <a href="https://medium.com/brightid">BrightID</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Anonymous Participation (e.g. voting) using BrightID]]></title>
            <link>https://medium.com/brightid/anonymous-participation-e-g-voting-using-brightid-42a13b4d1c94?source=rss----ae36d340be8a---4</link>
            <guid isPermaLink="false">https://medium.com/p/42a13b4d1c94</guid>
            <category><![CDATA[voting]]></category>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[ethereum]]></category>
            <category><![CDATA[privacy]]></category>
            <dc:creator><![CDATA[C. Adam Stallard]]></dc:creator>
            <pubDate>Tue, 16 Jun 2020 20:15:51 GMT</pubDate>
            <atom:updated>2021-05-03T07:56:41.454Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*nfIU1W6gq1VID8hRJoQyqQ.png" /></figure><h3>Overview</h3><p>An application using BrightID can choose at most one of the following for its users.</p><p>1. Anonymity within a group of participants. (No one — not even BrightID node operators — knows which BrightID maps to which participant.)</p><p>2. The ability to re-register with an application; i.e. if an account becomes unrecoverable, a user can register to use the application again. To avoid abuse, there is a permanent link between the lost account and the new account.</p><p>In this article, we’ll focus on the first option and show how to use BrightID with applications that provide anonymity within a set of participants. In these cases, participants perform one or more unconnected actions (for example, votes), and there’s no need for an “account” or “profile” to provide a history of connected actions. In such cases, the possibility of re-registering with a new account connected to one’s previous account isn’t useful — and by disallowing it, anonymous participation becomes possible.</p><p>The solution uses <a href="https://ethereum.brightid.org/">Ethereum</a> and a privacy mixer that accepts custom smart-contract-based (e.g. <a href="https://eips.ethereum.org/EIPS/eip-20">ERC-20</a>) tokens. The use of <a href="https://github.com/appliedzkp/maci/blob/master/specs/01_introduction.md">MACI</a> to provide privacy and collusion resistance is briefly discussed.</p><p>BrightID nodes do not store any personally identifiable information, only unique identifiers (i.e. BrightIDs). This article shows how to keep users anonymous even if third-party applications leak information.</p><h3>Setting up Anonymous Participation</h3><h4>Create a Context</h4><p>An application can have its own context with its own set of unique users, or it can share its context (and user registry — see below) with other applications.</p><p>To create a context, an application chooses which BrightID nodes will administer the context and provides them with the following:</p><ul><li>Name of the context</li><li>linkAESKey (32 bytes). Used by nodes serving the context to privately share information with each other when a user links their BrightID to a contextId.</li></ul><h4>Create a User Registry</h4><p>All users that will take part in anonymous actions within the new context should now link their BrightIDs to a previously unused Ethereum address as the contextId. This is as simple as creating a deep-link of the formbrightid://link-verification/&lt;node url&gt;/&lt;context&gt;/&lt;ethereum address&gt; for users to open in their mobile browser. The link is stored on BrightID nodes serving the context.</p><h4>Distribute Action Tokens</h4><p>The context creator should create and deploy a smart contract that implements the <a href="https://github.com/BrightID/BrightID-SmartContract/blob/master/v4/IBrightID.sol">IBrightID interface</a>. We’ve provided an <a href="https://github.com/BrightID/BrightID-SmartContract/blob/master/v4/BrightID.sol">example smart contract</a>. Users can submit signed verifications obtained from a BrightID node’s /verifications endpoint to the smart contract. If a submitted address hasn’t been used (i.e. there are no previous addresses in the signed array, and no matching address in the smart contract storage), an action token should be minted for that address.</p><h4>Mix Action Tokens</h4><p>Although contextIds provide a middle layer to limit the visibility of BrightIDs, there is still a privacy weakness: BrightID nodes serving the context know which BrightIDs correspond to the newly created Ethereum addresses (contextIds). If an action token holder were to now use their token, BrightID nodes serving the context would see which BrightID is associated with each action.</p><p>To strengthen the privacy further, the tokens should be sent through a mixer and received into fresh Ethereum addresses. Now users can complete actions — limited to one per unique human — without associating them (even indirectly) to a specific BrightID. Not even BrightID nodes serving the context can tell which BrightID is associated with an action; they only know the set of action-takers (i.e. which BrightID are registered in the context).</p><h4>Reusing Action Tokens</h4><p>An action token can be reused for multiple actions with the following caveats:</p><ul><li>A user’s “unique” status in BrightID may have changed between actions. (They may have been flagged as “fake,” “duplicate,” or “deceased” and removed from their primary group.)</li><li>The actions of a single participant will be anonymously linked to each other unless a mixer is used between actions.</li><li>A user that loses access to their action token will be unable to participate until old action tokens are retired and new ones issued.</li></ul><h3>Collusion Resistance</h3><p>Mixing action tokens helps with privacy within a set of participants, but is not immune to collusion (e.g. vote buying). <a href="https://github.com/appliedzkp/maci/blob/master/specs/01_introduction.md">MACI (Minimal Anti-Collusion Infrastructure)</a> precludes many forms of vote buying by giving a person being bribed a way to generate fake proofs that are indistinguishable from real ones. Because of the possibility of receiving a fake proof, a briber can’t know whether or not a bribe succeeded.</p><p>MACI conceals the links between actions and actors using zero-knowledge proofs. It could therefore take the place of action tokens and mixers while providing extra defenses against collusion.</p><p><em>Thanks to </em><a href="https://ubiresearch.org/author/aleeza"><em>Aleeza Howitt</em></a><em> for the suggestion of using a privacy mixer to simplify the integration of zero-knowledge proofs, and to Barry Whitehat, </em><a href="https://medium.com/@weijiek"><em>Koh Wei Jie</em></a><em>, and Vitalik Buterin for chats on privacy and MACI.</em></p><h3>Contact</h3><p>* <a href="https://www.brightid.org/">BrightID</a><br>* <a href="https://discord.gg/nTtuB2M">Discord (chat)</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=42a13b4d1c94" width="1" height="1" alt=""><hr><p><a href="https://medium.com/brightid/anonymous-participation-e-g-voting-using-brightid-42a13b4d1c94">Anonymous Participation (e.g. voting) using BrightID</a> was originally published in <a href="https://medium.com/brightid">BrightID</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[BrightID’s Social Recovery]]></title>
            <link>https://medium.com/brightid/brightids-social-recovery-46bc71ce84ae?source=rss----ae36d340be8a---4</link>
            <guid isPermaLink="false">https://medium.com/p/46bc71ce84ae</guid>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[social-network]]></category>
            <category><![CDATA[brightid]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[C. Adam Stallard]]></dc:creator>
            <pubDate>Fri, 17 Apr 2020 01:01:42 GMT</pubDate>
            <atom:updated>2021-01-02T21:29:09.930Z</atom:updated>
            <content:encoded><![CDATA[<h4>Never lose your BrightID</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*LBCvgwlgXZUPeJwE-vSsXw.jpeg" /><figcaption><a href="https://www.dreamstime.com/group-business-people-holding-big-key-forward-to-success-creative-teamwork-concept-isolated-illustration-outline-hand-group-image112086497">Image © Sunan Panyo</a></figcaption></figure><p><strong>Update</strong>: <a href="https://brightid.gitbook.io/brightid/setting-up-social-recovery">The latest guide to Social Recovery is here.</a></p><h3>Social Recovery is Easy</h3><p>BrightID uses social connections to prove your uniqueness to applications — and to recover your account to a new phone.</p><p>We’ve made setting up social recovery easy because it’s important that everyone does it. It’s the way to recover your BrightID if it’s lost or stolen. For now, it’s also the way to move your BrightID to a new phone.</p><p>This article will walk through how to use this important feature.</p><h3>Setting up Recovery</h3><h4>Choose your Trusted Connections</h4><p>Once you’ve made three connections in BrightID, you’ll see a notification.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/216/1*_dlxxsFK82fY2oTi7eIxvg.png" /></figure><p>Tap it and you’ll be able to select three or more “Trusted Connections.”</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/216/1*cbTk10A7mDL4R4amXYcTQQ.png" /></figure><p>You can choose anyone among the connections you’ve already made. Make sure to choose people you can trust to be in charge of your BrightID.</p><h4>Backup Names and Photos</h4><p>The next step is to choose a password you can remember. This step only backs up the names and photos of your connections. The password encrypts the backup so that only you can recover it.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/216/1*1gej0hM59fcXCaOqy6eWeQ.png" /></figure><h3>Recovering your BrightID</h3><p>If you need to restore your BrightID to a new phone for whatever reason, follow these steps.</p><h4>Start Recovery</h4><p>When you first install BrightID, you have two options. In this case, you’ll choose <strong>Recover BrightID</strong>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/216/1*Wps8I59HmhwaKwWZeO0nyQ.png" /></figure><h4>Trusted Connections</h4><p>You’ll need two of your trusted connections to scan the code. After the second successful scan, your BrightID and connection photos and names will be restored.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/216/1*WL2yUWolTg-Zec_I9rb4Pg.png" /></figure><p>The BrightID on your old phone will now be blocked from performing any actions on your behalf.</p><h3>Get More Help</h3><p>To get help and meet other users, <a href="https://www.brightid.org/meet">register for a BrightID meet</a> or pop into our <a href="https://discord.gg/nTtuB2M">discord</a> or <a href="https://t.me/brightid">telegram</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=46bc71ce84ae" width="1" height="1" alt=""><hr><p><a href="https://medium.com/brightid/brightids-social-recovery-46bc71ce84ae">BrightID’s Social Recovery</a> was originally published in <a href="https://medium.com/brightid">BrightID</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[BrightID “Sponsorships”]]></title>
            <link>https://medium.com/brightid/brightid-sponsorships-5327a8d39f1e?source=rss----ae36d340be8a---4</link>
            <guid isPermaLink="false">https://medium.com/p/5327a8d39f1e</guid>
            <category><![CDATA[unique]]></category>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[funding]]></category>
            <category><![CDATA[nonprofit]]></category>
            <category><![CDATA[humanity]]></category>
            <dc:creator><![CDATA[C. Adam Stallard]]></dc:creator>
            <pubDate>Mon, 24 Feb 2020 23:15:58 GMT</pubDate>
            <atom:updated>2024-02-21T00:44:52.105Z</atom:updated>
            <content:encoded><![CDATA[<h4>Long-term funding for a public good</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*YAN9oBoOkvkCWJloaIcjgw.png" /></figure><p><a href="https://medium.com/brightid/inside-brightids-funding-model-9f6f828c6f0">In a previous article</a>, we saw how Aleeza, Philip, I, and others arrived at “sponsorships” as the preferred sustainable method for funding BrightID. Now I’ll add my thoughts on why we’re using sponsorships precisely the way we are.</p><p>First — as a recap — what are “sponsorships?” A sponsorship entitles a user to share their proof-of-uniqueness with applications. It’s paid once — by an application — and is good for the lifetime of the user across all applications. We set the price at $1 DAI (subject to increases to keep the true cost stable, as approved by <a href="https://github.com/BrightID/BrightID-Constitution#responsibilities-of-brightid-main-dao">BrightID Main DAO</a>). We set the cost low enough to not be a burden to anyone while allowing BrightID as a public good to be continuously funded. It’s not burdensome to users because it’s paid by the apps they use. It’s not burdensome to apps because it has a value for apps that I’ll discuss later.</p><h3>Why Opt-in?</h3><p>The sponsorship system is opt-in. If an application doesn’t find sponsorships valuable, it can choose to create its own front-end for managing users’ BrightID keys, and run its own nodes to analyze the BrightID social graph. Funds collected through the sale of sponsorships go to <a href="https://docs.google.com/document/d/1F8rrUcrAIsKEVmxvfx8sLf2JyqAmtoAmfssDwZ0b2TM/edit#heading=h.26yx1q8tvqko">BrightID Main DAO, </a>which uses its budget to grow the BrightID network, research new graph analysis and privacy methods (including subsidizing users who run nodes), and develop new front-ends and use-cases for BrightID. An application that doesn’t opt-in can’t be funded through this method; it has to figure out how to fund itself.</p><p>Besides being eligible for funding through the BrightID Main DAO, applications that opt into the sponsorship system can benefit more from the network effect of other apps that bring in users. A person that started using BrightID to gain access to a certain app will soon find an array of other apps they’re already verified to use. If a certain application didn’t have the funds to buy enough sponsorships for its users, it can simply send them to another application that does. This benefits both applications: the first receives the benefit of having its users verified through BrightID for free and the second receives the benefit of new users trying it out for a very low user acquisition cost ($1 DAI).</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*zuPVcHWHqdxB0Aw1ZRoCMA.jpeg" /></figure><h3>Where to Collect?</h3><p>Now that I’ve recapped how sponsorships work and why it’s a useful and valuable system, let’s talk about how we arrived at the current implementation. As a public good, BrightID should thrive on donations from those who benefit. There are two possible levels of beneficiaries: apps and users. All users are on the BrightID platform to use apps, and apps seem a simpler target since they are more likely to have funds on hand. Of the possible action or transaction points where funds can be collected, let’s consider “making a connection” and “sharing a verification with an app.” The benefit of collecting funds at the time a user shares a verification as opposed to at connection-time is that the app doesn’t waste money paying for users that may turn out to be sybils and therefore won’t be verified. It’s also clear at the verification-sharing time that the user is there to use a particular app, whereas at connection-time this isn’t yet known.</p><p>Let’s continue with the idea of collecting a fee at the time when a user shares a verification with an app. Verifications are most useful when re-checked with some regularity to make sure that a user hasn’t died or had their verification revoked. We don’t want to discourage frequent checks by charging a fee for each check. It’s therefore preferable that one payment pays for all checks for a single user. This is basically what a sponsorship is. Once an application has paid for a sponsorship for a user, that user’s verification can be checked as often as needed.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*egX_Fo4Drg3L-0x3gHgPfA.jpeg" /><figcaption><a href="https://www.pexels.com/@minan1398">Min An</a></figcaption></figure><h3>Rich Apps / Poor Apps</h3><p>The final point to consider is: what do we do in the case that an application can’t afford to buy sponsorships for its users? We could allow apps to figure out for themselves how to pay for this expense, but let’s consider what an application in this situation has as valuable collateral: users. It seems to make sense that if we allow an application to send its users to try out another application, this could be a valuable arrangement for both: the first application receives free sponsorships, while the second application receives users they may not have gotten otherwise. This is what we’ve allowed to happen by saying that a user’s sponsorship is good across all applications and lasts a lifetime.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*sPJnnvXN-OMrlMoS4vTxiA.jpeg" /><figcaption><a href="https://www.flickr.com/photos/wonderferret/">wonderferrett</a></figcaption></figure><h3>Humanity (re)Fund</h3><p>The price of a sponsorship is $1 DAI per user per lifetime, is good across all apps, and is stabilized through voting by the <a href="https://github.com/BrightID/BrightID-Constitution#responsibilities-of-brightid-main-dao">BMAIN DAO</a>. This should provide plenty of funding for BrightID indefinitely. BMAIN DAO is disallowed by its articles of incorporation from making a profit. If the time comes that there is more in BMAIN DAO’s vault than what is needed, it will be returned to all of humanity as a refund. Yes, we can do this with BrightID and <a href="https://www.hedgeforhumanity.org/">Hedge for Humanity</a>’s aptly-named Humanity Fund.</p><h3>Before you go</h3><p>Some useful links for BrightID all in one place:<br>* <a href="https://www.brightid.org/">BrightID</a><br>* <a href="https://www.hedgeforhumanity.org">Hedge for Humanity</a><br>* <a href="https://www.brightid.org/sponsorships">Sponsorships and Subscriptions</a><br>* <a href="https://github.com/BrightID/BrightID-Constitution">BrightID Main DAO’s constitution</a><br>* <a href="https://discord.gg/brightid-596752664906432522">Discord (chat)</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=5327a8d39f1e" width="1" height="1" alt=""><hr><p><a href="https://medium.com/brightid/brightid-sponsorships-5327a8d39f1e">BrightID “Sponsorships”</a> was originally published in <a href="https://medium.com/brightid">BrightID</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>