Litentry this week: From Web 1.0 to Web 3.0

Table of contents:

  • Opinion: From Web 1.0 to Web 3.0
  • Testnet updates

🌉 Opinion: From Web 1.0 to Web 3.0

Internet development history

  1. Web 1.0: Web 1.0 represents the first stage of the Internet. In this stage, the real world underwent a simple transformation to the digital world, where news was simply copied onto the web. These sites were static, and in most cases, users could only interact with the company, and these interactions were one-way.
  2. Web 2.0: Web 2.0 was coined in the late 1990s as a further development of Web 1.0. At this stage, people see the Internet as a communication platform rather than a static world. User integration and two-way communication defined the Web 2.0 world. This concept is closely related to blogs, wikis, and user-generated content in sharing platforms (e.g., Youtube, Flickr, Facebook, etc.).
  3. Web 3.0: From a user’s perspective, the differences between Web 3.0 and Web 2.0 may not be obvious or even visible in the initial stages. However, unlike web 2.0, giant companies controlled users’ data and information and enjoyed huge profits from these data. In web 3.0, each user controls their own (digital) identity, assets, and data, and users can exchange assets, pay fees and sell data on their own.

Web 3.0 features

  1. Decentralized operation: Blockchain technology provides users with solid and verifiable guarantees, thus ensuring the security of the information they receive and offer and keeping the data they pay for confidential.
  2. Data authorization: In Web3.0, user data is stored in the block in the form of transaction and controlled by the individual user, and no third-party platform can grasp anyone’s data assets, and the characteristics of blockchain such as non-tamperability and information transparency ensure that any act of obtaining user data requires the authorization of the user, thus ensuring the user’s data authorization and value attribution.
  3. Decentralized identity: Through a decentralized universal digital identity system, instead of multiple digital identities fragmented by different centralized platforms, users manage their database, which cannot be accessed or tampered with by any third party at will, and users can independently authorize what identity information is used for what purpose, without worrying about identity information leakage and theft.

Decentralized Identity(DID) and Litentry

A decentralized identity is a set of entirely decentralized identities, allowing a user or an organization to have full ownership, management, and control of their digital identity and data, understood as the user having absolute control over that digital identity.

Litentry is targeted to develop a cross-chain identity protocol on the Web 3.0, including an identity-based network and related tools. Litentry will develop an aggregated identity that is an identity linked with accounts from different blockchains and off-chain applications/services, which represent the owner behind the accounts, and further present the owner’s credibility and reputationin various aspects.

Testnet: encrypted ETH link extrinsic

  • Implemented encrypted ETH link extrinsic and parse it in the enclave
  • Investigated parachain token issuance problem
  • Investigated token transfer during parachain launch
  • Investigated Collator staking
  • Upgraded Integritee node dependencies from upstream

Misc: Kusama parachain launch preparation

  • Upgraded Litentry-registrar
  • Upgraded Polkadot & Kusama validators
  • Twitter Linker Data provider requirements & documentation
  • Kusama parachain launch preparation plan
  • Finalized a workable types config for Polkadot js app/API

Authored by

About Litentry

Litentry is a Decentralized Identity Aggregator that enables linking user identities across multiple networks. Featuring a DID indexing protocol and a Substrate-built distributed DID validation blockchain, Litentry provides a decentralized, interoperable identity aggregation service that mitigates the difficulty of resolving agnostic DID mechanisms. Litentry provides a secure vehicle through which users manage their identities and dApps obtain real-time DID data of an identity owner across different blockchains.

Stay in touch with us through




Build a user-centric world with blockchain

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Sanitarium Hack Free Resources Generator

What are hash algorithms and which did PYRK choose?

4 Cybersecurity Facts Every Business Should Know

Hyperledger Fabric Certificate Authority(CA) Client

How to detect a spammer on your network? | Enterprise security magazine

Vulnerabilities of Android

Do not use ADUC to view LAPS passwords!

DMARC Report: 85% of Fortune 500 Leave Their Customers Vulnerable to Impersonation Scams

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Build a user-centric world with blockchain

More from Medium

Litentry this week: Mobile App approved by Apple Store & Google Playstore; Web3Go Profile added rec…

What Are Parachains?

How To Navigate Polkadot.js

Polkadot, Parachains and The Future