Access Control

XStar’s "humanity scores" retrieved from Xstars' Identity oracle (Stage 3) can be effectively utilized for access control within a project, platform or online community. This approach enables token-gated access based on an individual's verified on-chain reputation and identity credentials thereby taking all efforts to remove bad actors and bot accounts.

Current stage allows projects to direct their users to the XSTAR protocol for self verification, through a unique link provided by the XSTAR team, a dashboard is then setup to provide projects with a list of all verified wallet addresses.

(Stage 3) After deployment of the gasless L2 optimistic rollup for specific identity use cases (XHITO) a decentralized oracle network will be developed and maintained to provide identity information to dApps and projects utilizing the XHS scoring algorithm.

XStar`s decentralized oracle network ensures secure and reliable access for smart contracts to off-chain identity or credential-related data feeds and web APIs.

The process would involve the following key steps:

  1. User Identity Verification: Users would go through Xstars' attestation process, providing various forms of identity verification such as social graph analysis, biometric data, and other relevant credentials. These attestations are anchored to the user's blockchain address.

  2. Humanity Score Calculation: Xstars' Identity oracle calculates a "humanity score" for each user based on the verified attestations associated with their wallet address. This score quantifies the user's reputation and degree of real human identity verification.

  3. Mapping to Web3 Domain: The user's wallet address is mapped to a Web3 domain name, which serves as a token-gated user license, granting access to their unique humanity score from the Identity oracle.

  4. Access Control Integration: The project or platform integrates with Xstars' Identity oracle, allowing it to query and verify a user's humanity score linked to their Web3 domain. Access privileges and functionalities within the project are then assigned based on this score meeting certain predefined thresholds.

This approach ensures that only verified human users with a requisite level of attestation can access sensitive areas, premium features, or governance mechanisms within the project. It mitigates risks associated with Sybil attacks, bot networks, and other malicious actors attempting to gain unauthorized access or overwhelm the system.

Moreover, by anchoring identity verification to blockchain addresses and enabling token-gated access through Web3 domains, XStar’s Proof of Humanity system upholds the principles of decentralization, transparency, and user sovereignty over personal data. Users maintain control over their attestations and can selectively disclose their verification status without relying on centralized identity providers.

Last updated