メインコンテンツまでスキップ

Decentralized Identity: Who Are You On-Chain?

The $20 Million Sybil Problem

On September 15, 2020, Uniswap airdropped 400 UNI tokens to every address that had used the protocol. At $3 per token, each address received $1,200 worth of tokens—the most generous airdrop in DeFi history.

Within hours, the gaming began:

The farmer:

Address creation script:
for i in 1 to 10,000:
Create new address
Execute 1 swap on Uniswap (cost: $5 gas)
Wait for airdrop

Cost: 10,000 × $5 = $50,000
Received: 10,000 × $1,200 = $12,000,000
Profit: $11,950,000

Actual case (confirmed):
One entity controlled 10,000+ addresses
Received $12M+ in UNI tokens
Sold immediately for ETH

The problem: Uniswap couldn't distinguish between:

  • 10,000 unique humans each making 1 transaction
  • 1 human controlling 10,000 addresses

This is the Sybil attack—creating multiple fake identities to game systems that assume one-person-one-account.

Scale of the problem:

Major airdrops (2020-2024):
Uniswap (2020): $1.2B airdrop, ~30% to Sybils (~$360M wasted)
Optimism (2022): $215M airdrop, ~20% to Sybils (~$43M wasted)
Arbitrum (2023): $1.8B airdrop, ~15% to Sybils (~$270M wasted)
StarkNet (2024): $700M airdrop, ongoing Sybil issues

Total wasted: ~$700M+ to Sybil attackers

Why this matters beyond airdrops:

Governance:
- One person creates 1,000 addresses
- Votes 1,000 times
- Captures governance
- Outcome: Plutocracy, not democracy

DeFi lending:
- Need undercollateralized loans
- Requires reputation/identity
- Without it: Only overcollateralization works
- Barrier: Billions in locked capital

Quadratic funding:
- $1M matching pool for public goods
- Sybil attacker creates 1,000 identities
- Captures most of matching funds
- Real projects get pennies

Social systems:
- Reputation means nothing
- Can't build trust
- Communities can't form
- Anonymous = no accountability

Yet blockchain's core value proposition is permissionless access—anyone can participate without permission. Identity verification seems to contradict this.

This creates a fundamental tension:

Permissionless ←──────────→ Identity-verified
(Pseudonymous) (Known humans)
↓ ↓
No barriers No Sybil attacks
No discrimination Accountable systems
Maximally inclusive Trustworthy voting
↓ ↓
But: Exploitable But: Gatekeeping
Sybil attacks Exclusion risk
Gaming systems Privacy loss

This lesson explores decentralized identity:

  • How do we prove humanity without central authorities?
  • Can we have privacy AND verification?
  • What are Decentralized Identifiers (DIDs)?
  • How do Verifiable Credentials work?
  • What is Proof of Personhood?
  • Soulbound Tokens and non-transferable reputation
  • Real-world applications and trade-offs

Current state (2024):

Total DID methods: 100+ different standards
Largest identity system: Worldcoin (5M+ users, biometric)
Most adopted: ENS (2M+ names registered)
Quadratic funding with identity: $50M+ distributed via Gitcoin
Use cases: Still nascent, <5% of users have verifiable identity

Understanding decentralized identity is crucial because it's the missing piece that will unlock:

  • Undercollateralized lending ($50B+ potential market)
  • True democratic governance (not plutocracy)
  • Fair public goods funding (quadratic voting)
  • Reputation-based systems (credit scores, professional credentials)
  • Human-centered crypto (not just whale-dominated)

Let's explore how identity can be decentralized, private, and Sybil-resistant—three properties that seem impossible to achieve simultaneously.

The Identity Problem in Blockchain

Pseudonymity vs Anonymity

Current state:

Bitcoin whitepaper (2008):
"Privacy can still be maintained by... using a new key pair for each transaction"

Reality:
- Addresses are pseudonyms (like usernames)
- Not anonymous (can be linked to real identity)
- But no inherent identity verification

What we have: Pseudonymity

0x742d35Cc6634C0532925a3b844Bc9e7595f0bEb

This is a pseudonym (like "CryptoKing42")
Properties:
✓ Can transact freely
✓ Can accumulate reputation (transaction history)
✓ No central authority needed
✗ Can't prove it's a unique human
✗ Can create unlimited addresses
✗ No inherent cross-platform identity

What we lack: Unique humanness

Cannot prove:
- One person = one address
- This person is over 18
- This person is a US citizen
- This person hasn't voted already
- This person is creditworthy

The Sybil Attack

Named after the book "Sybil" about dissociative identity disorder (multiple personalities).

Definition:

Sybil Attack: Creating many pseudonymous identities to gain disproportionate influence

Classic example:
Peer-to-peer network:
- 100 honest nodes
- 1 attacker creates 900 fake nodes
- Network: 10% honest, 90% attacker
- Attacker controls consensus

In blockchain context:

1. Governance attacks:
Protocol: 1 token = 1 vote
Attacker: Splits tokens across 1,000 addresses
Benefit: Can vote 1,000 times on proposals
Impact: Appears as grassroots support, actually one whale

2. Airdrop farming:
Protocol: Airdrop to all users
Attacker: Creates 1,000 addresses, uses each once
Benefit: 1,000x the airdrop
Impact: 50%+ of airdrop goes to farmers

3. Quadratic funding exploitation:
Matching formula: Favors many small donors over few large
Attacker: Creates 100 donors donating $1 each
Benefit: Gets same matching as 1 donor giving $10,000
Impact: Steals matching funds from legitimate projects

4. Reputation gaming:
System: Build reputation over time
Attacker: Creates 1,000 accounts, builds rep on each
Benefit: 1,000x reputation building
Impact: Floods system with fake high-reputation accounts

5. Social graph manipulation:
System: Influence based on followers
Attacker: Creates 10,000 fake followers
Benefit: Appears influential
Impact: Manipulates algorithms, trends, consensus

Cost-benefit analysis:

Airdrop example:
Expected value: $500 per address
Addresses needed: 1,000
Cost per address: $5 (gas for qualifying transaction)
Total cost: $5,000
Total revenue: $500,000
Profit: $495,000
ROI: 9,900%

Why not do this?
- Technically: Nothing prevents it
- Legally: Gray area
- Ethically: Debatable (gaming vs theft?)

Why Identity Matters

Use cases requiring identity:

1. Undercollateralized lending:

Current DeFi:
- Want to borrow $1,000
- Must deposit $1,500 in collateral
- Capital inefficient (need 150% upfront)

With identity/reputation:
- Borrow $1,000 based on credit score
- Collateral: $0-500 (partial or none)
- Capital efficient (like traditional lending)

Market size:
Current DeFi lending: $20B (overcollateralized)
Potential with identity: $500B+ (closer to TradFi scale)

2. Democratic governance:

Current:
- 1 token = 1 vote
- Whales dominate (top 10% own 90% of votes)
- Plutocracy, not democracy

With identity:
- 1 person = 1 vote
- Whales can't create fake identities
- Actual democratic decision-making

Example:
DAO with 10,000 token holders
Current: Top 10 whales = 60% voting power
With identity: Each human = 0.01% voting power

3. Quadratic funding:

Matching formula (simplified):
Matching = (√donation₁ + √donation₂ + ...)²

Without identity:
Attacker: 1 person, 100 fake identities, $100 each
Matching: (√100 × 100)² = (10 × 100)² = 1,000,000
Steals entire matching pool

With identity:
Attacker: 1 verified person, $10,000 donation
Matching: (√10,000)² = 100² = 10,000
Fair share of matching

4. Reputation systems:

DeFi credit score:
- Borrow and repay multiple times
- Build credit history
- Get better rates, higher limits

Without identity:
- Can abandon address and start fresh
- No persistent reputation
- Credit scores meaningless

With identity:
- Reputation follows you
- Cannot escape bad history
- Lenders can trust credit scores

5. Compliance and regulation:

Regulations require:
- KYC (Know Your Customer)
- AML (Anti-Money Laundering)
- Accredited investor verification
- Age verification (gambling, adult content)
- Geographic restrictions (sanctions)

Without identity:
- Cannot comply
- Regulatory hostility
- Limited institutional adoption

With identity:
- Selective disclosure (prove age without revealing)
- Compliant protocols
- Institutional comfort
- Mainstream adoption possible