-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CIP 2: Professional Verifier Pool #2
Conversation
@nambrot can we close? |
I'd say this CIP is still open so I'd actually argue we should merge it as a draft? |
@@ -0,0 +1,93 @@ | |||
# CIP 2: Professional Verifier Pool |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please ensure your title follows the new cip-template.md file.
Also ensure status is Draft.
https://github.com/celo-org/celo-proposals/blob/master/CIPs/cip-template.md
Also please ensure the rest of the document headings are following the new CIP template document. Abstract, Simple Summary, Motivation, Rationale, Specification, CopyRight, Implementation, etc.
We should effectively revive the pool part of the old verification pool and the verifier app, and adjust it to the new interface to work as a module to the attestation service. Since this service is not expected to run by validators, but by specific entities, building this on top of proprietary tooling is likely ok. We could provide sybil resistance through dedicated APIs such as [https://developer.android.com/training/safetynet/attestation](https://developer.android.com/training/safetynet/attestation) or [https://developer.android.com/training/articles/security-key-attestation](https://developer.android.com/training/articles/security-key-attestation). If we deem these APIs to not be broadly available in our target markets, we could fallback to classic sybil mechnisms like Social Networks, although they are 1. not as sybil resistent and 2. not as permissionless/inclusive. | ||
|
||
|
||
### Alternative Solution |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd like to see this whole document following the new template so we can have consistency.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
To be merged please:
- Update to follow the new template
- Open a discussions issue
CIP 2 - Professional Verifier Pool - Discussions
- Update the discussions-to link in the new template header
I'll close as not relevant |
In the early prototypes of the lightweight identity protocol, Celo had a concept of a verifier app. It would send text messages on behalf of the protocol and would receive a share of the attestation fee revenue. It was a truly permissionless on-ramp. However, over discussions, we had sybil and game-theoretic concerns over the viability of that scheme. This CIP proposes a return of the verifier app in the context of a professionally run text message provider that uses verifier apps to send the message. In this scheme, the provider has a reputation to uphold and acts as a possible alternative to providers like Twilio.