Table of Contents
- 1 Key Takeaways:
- 2 Web5: The Ultra Decentralized Web
- 3 What Is Web5?
- 4 Four Pillars of Web5
- 5 1. Decentralized Identifiers (DIDs)
- 6 2. Verifiable Credentials (VCs)
- 7 3. Decentralized Web Nodes (DWNs)
- 8 4. Decentralized Web Apps (DWAs)
- 9 Web3 vs. Web5 — What’s the Difference?
- 10 Table Comparison of Web 3.0 and Web 5.0
- 11 Conclusion
- 12 Identity.com
This is Part 3 of our web series on the evolution of the internet. For further insights, check out Part 1 and Part 2.
Key Takeaways:
- Web5, proposed by Jack Dorsey, aims to provide true user control over data,
- Web5’s framework revolves around Decentralized Identifiers (DIDs) and Decentralized Web Nodes (DWNs), allowing users to manage their online identities independently.
- Web5 empowers users to own their data, contrasting with Web3 where data can be stored on centralized entities despite a decentralized platform.
- The development of Web5 aligns with growing legislative focus on privacy, offering a potential solution for user-centric data control and privacy in the digital world.
Web5: The Ultra Decentralized Web
In the wake of Web3’s emergence, a crucial question has emerged: who truly holds control over users’ data on the internet? While Web3 enthusiasts have championed its promise of decentralization, doubts persist about whether users truly own and govern their personal information. Jack Dorsey, co-founder of Twitter and a vocal critic of Web3’s implementation, has echoed these concerns, asserting that “You don’t own ‘Web3.‘ The VCs and their LPs [venture capitalists and limited partners] do. It will never escape their incentives. It’s ultimately a centralized entity with a different label.”
Dorsey’s bold statement sparked a heated debate, and the issue of true decentralization became a major hurdle for Web3’s purported next phase. To address these concerns and redefine the concept of decentralized web, Dorsey proposed Web5, a vision for a more user-centric internet where individuals have complete control over their data and online identities.
Web5 aims to fulfill the promise of Web3 by decoupling data from applications and placing ownership directly in the hands of users. By utilizing decentralized identifiers (DIDs) and decentralized data storage (DIDs), Web5 empowers individuals to seamlessly manage their online presence and maintain control over their personal information.
What Is Web5?
On June 10, 2022, six months after Jack Dorsey’s critical tweet questioning the true ownership of Web3, his team at TBD unveiled a revolutionary concept that aims to redefine the future of the internet: Web5.
Web5 stands apart from simply being a successor to Web3. Web5 represents a blend of the best aspects of Web2 and Web3, harnessing the user-centricity of Web2 while embracing the decentralized promise of Web3. The result is a decentralized web platform that empowers users with unprecedented control over their data and online identities.
While the term “Web5” might suggest a simple stacking of Web2 and Web3, its significance runs far deeper. Dorsey and his team at TBD envision a web where users are not merely passive spectators. Instead, they are active participants, fully empowered to own and manage their online presence.
Web5 goes beyond simply borrowing elements from its predecessors; it actively seeks to address their shortcomings. Dorsey’s criticism of Web3’s execution highlighted concerns about its lack of transparency and true decentralization.
Web5 aims to bridge the gap by integrating the ethical principles of Web2 with the decentralized architecture of Web3. It’s a direct response to the centralized nature of current Web3 models that, according to Dorsey, merely masquerade as decentralized entities.
Four Pillars of Web5
Web5 goes beyond the “decentralization” mantra into actual implementation. The team developing the protocol is focused on building a solid foundation so that the new phase of the web is truly decentralized and not just a marketing tactic to sway unobservant users. There is no doubt that Jack wants to return data control to the people.
Jack further confirmed this when one of his followers responded to him with a question paraphrased thus, “if the scientists were in the driver’s seat of Web 1.0, the techno-entrepreneurs championed Web 2.0, and the VCs want to be in charge of Web 3.0, who then will be in control of Web5?” Jack replied, “the people.” Time will tell if this ultra-decentralized web will be a reality.
Currently, Web5 and Web3 differ significantly in terms of architecture and backend operation. In spite of the fact that Web5 is still in its early stages, it is important to explore the frameworks and protocols on which it is built and compare it to Web3. Let’s analyze Web5’s four pillars which are:
- Decentralized Identifiers (DIDs)
- Verifiable Credentials (VCs)
- Decentralized Web Nodes (DWNs)
- Decentralized Web Apps (DWAs)
1. Decentralized Identifiers (DIDs)
DIDs are new, globally unique identifiers that enable users to be in charge of their identity. In contrast to centralized third-party identifiers such as emails and phone numbers which are siloed to each ecosystem, users can control how their identities and personal information are used, shared, and accessed. Remember the email used by the user? That will be an example of the DID in Web5.
As part of Web5, the unique identifier of users will be connected to their data via the Decentralized Web Node (DWN). By doing so, users’ data is cut off from centralized storage. Users will have total control over their data, and developers can focus on building the best user experience without worrying about storage. Public blockchains will enable the connection between DIDs, DWN, and other frameworks of Web5. A user’s DID is the only thing that interacts with the public blockchain, not their data, DWN, apps, or websites.
2. Verifiable Credentials (VCs)
Verifiable credentials are tamper-evident, cryptographically enabled digital credentials. They are secure and impossible to forge without proof that they’ve been tampered with. They prove a user’s identity similar to a national ID, student ID, international passport, driver’s license, etc. Verifiable credentials connected to a user’s decentralized identifier further confirm the user’s credibility and establish a user’s digital identity as genuine.
As an example of Web 2.0, a user registers with Paypal using an email address (a third-party identifier). The new user will have access to some features but not all, and there will be limitations such as a maximum transaction limit of $7,500 per month. To lift these limitations and access the full features of PayPal, users will need to undergo ID verification. The process requires a valid ID from the government or legal entities, such as an international passport or driver’s license. This means of identification provided by the user is a form of credential. The legal means of identification provided to Paypal will be a form of Verifiable Credential (VC).
3. Decentralized Web Nodes (DWNs)
In a fully decentralized web, nodes communicate and work together to host and share web content between users/participants without needing a central authority or organization to control it. These nodes are Decentralized Web Nodes (DWNs or Dweb Nodes).
DWNs are a crucial part of Web5. They are the distributed networks used by Web5 users to host and serve content to all users via peer-to-peer (P2P) protocols. They serve as data storage and the message-relaying mechanism that enables Web5 users to communicate, share and identify information among one another. DWNs resemble distributed databases, but users control and distribute them among all Web5 users.
In other words, DWNs form highly connected networks of nodes that locate public or private information associated with users through their decentralized identifiers (DIDs). As a user, you can host your personal data completely separate from any app you use. You will have complete control over your data since these apps need your permission to access it.
With decentralized Web Nodes, a user’s data can sync to the same state across multiple nodes, enabling them to easily secure and manage their data while communicating with other users, apps or services without relying on location-specific infrastructure or routing mechanisms. Decentralized web apps are built on decentralized Web Nodes and decentralized identifiers.
4. Decentralized Web Apps (DWAs)
In a more relatable term, DWAs can be called decentralized “progressive web apps.” Social media platforms like Twitter, Facebook, Telegram, etc., commonly use Progressive Web Apps (PWAs). They are website versions of native apps and rely on web browsers that support the necessary web technologies. Typically, they include most, if not all, of the features found in native apps. They can effortlessly operate as native apps; some are also installable from app stores. We can describe PWA as a “hybrid” between websites and mobile applications in lay language.
You can understand the concept of DWA using the PWA understanding above; just replace the word “progressive” with “decentralized.” There is a major difference, though, “PWA operates with a centralized server” while “DWA operates with a Decentralized Web Node (DWN).”
Benefits of DWAs
DWAs are decentralized, so they can be launched without a server since data is stored on DWNs. As a result, developers can concentrate on building apps that offer exceptional user experiences while DWNs handle data storage. Through the user’s DWN address, Decentralized Web Apps only access the DWN when necessary. Due to users being in control of their data, the user will need to grant access to the query or request. The user must approve private data, whereas the DWA can retrieve public data automatically from the DWN.
Let’s say you went to the beach during your vacation, took some pictures, and downloaded WhatsApp for the first time just to share these pictures with your friend. WhatsApp will request permission to access your local storage before sharing these pictures, and you can decide whether to grant this permission or not. Without permission, WhatsApp cannot access these pictures. This is possible because your pictures (data/information) are entirely under your control (in this case, your phone’s local storage, which is obviously under your control).
You can grant permission for the moment and then remove it from your mobile phone settings the following day. Despite having permission yesterday, WhatsApp won’t have continuous access to your data. This freedom or data control of yours would not have been possible if WhatsApp stored all your pictures in its silo (database). WhatsApp isn’t a decentralized web app, but do you get the point? Assume WhatsApp is your “DWA,” your phone’s local storage is your “DWN,” and your pictures are your “data.”
Web3 vs. Web5 — What’s the Difference?
Web5 appears to offer “look-like” features of Web3, giving both next generations of the web similar benefits and limitations. Despite having blockchain affiliations and promising similar features, these two have different architectures and backends. This will require looking into their differences.
Table Comparison of Web 3.0 and Web 5.0
Criteria |
Web 3.0 |
Web 5.0 |
Blockchain Implementation |
Developers deploy application logic in the form of smart contracts on Blockchain platforms such as Ethereum. | Developers build applications individually, while Decentralized Identifiers (DIDs) are the only component of Web5 that interacts with the Blockchain (Bitcoin). |
Apps |
Apps are “Decentralized applications (DApps)” because developers deploy them on decentralized networks. | In 5.0, we call apps “Decentralized Web Apps (DWAs)” because they enhance normal web apps with DIDs and equip them with external data storage capabilities (dWeb nodes—DWN). |
Complete Decentralization |
Web3 is decentralized but not at the same level as Web5. Web3 is said to have traces of centralization because data are stored on centralized third parties like OpenSea or Coinbase. The storages are decentralized as third parties but centralized as individual entities. | Web5 is an extra decentralized phase of the internet as data storage isn’t just moved away from individual apps or centralized storage silos to third parties like OpenSea and Coinbase. Rather, users can host their data, as total control of where and how to save the data is given to users. |
Servers/Storage |
Data is stored on decentralized off-chain storage silos. | Individuals can host their data on Decentralized Web Nodes (DWN). |
Data Ownership |
Through non-fungible tokens (NFTs), users have control over their data as it is ties to their identity. | Users own their data which is isolated from the apps, blockchains, or platforms they use and stored on DWNs. |
Native Tokens |
Most blockchains hosting Web3 apps or platforms offer native tokens. | Does not need a native token, nor is there any native token in sight yet. |
Transaction and Operation |
Does not use DIDs; instead, it uses native tokens of the blockchains where it is deployed. | Web5 uses DIDs representing an entity’s cryptographic state on a decentralized ledger. |
Architecture |
Web3 appears to be a total replacement or alternative to the present Web2. | Web5 combines the present Web2 structures with a complete decentralization that Web3 proposes’. |
Conclusion
The web was created more than three decades ago. Due to the web, numerous developments have occurred across many industries, but privacy remains a bone of contention. The privacy subject is so important that legislators have been focusing in that direction with policies and legislations, one of the latest being the CPRA — California Privacy Right Act.
Without legislation, Web5 seems to be the only web with the architecture that delivers true decentralization. In terms of true decentralization, it solves privacy issues, gives users control over data, and makes companies the ones requesting consumers’ data, with consumers having the right to refuse. Will this be a reality? Jack Dorsey and the future will prove that to the world.
Identity.com
Among our goals at Identity.com is a user-centric internet, where users are in control of their data–this makes us support true decentralization of users’ data. More reason why Identity.com doesn’t take the back seat in contributing to this future via identity management systems and protocols.
The work of Identity.com as a future-oriented company is helping many businesses by giving their customers a hassle-free identity verification process. Identity.com is an open-source ecosystem providing access to on-chain and secure identity verification. Our solutions improve the user experience and reduce onboarding friction through reusable and interoperable Gateway Passes. Please refer to our docs for more info about how we can help you with identity verification and general KYC processes.