Use Cases

Learn about use cases of EBPTO & IP Domains

Use Cases

There are limitless use cases that can be implemented using VC.iD verifiable credentialed domains. Unlike traditional domains, VC.iD are stored at the wallet level, outside of the custody and control of any 3rd third party.

Domains are stored on-chain in the EBPTO Registry Ethereum smart contract, fully leveraging the security, composability, and consistency guarantees outlined in our model.

A manager (registered to an Ethereum address) controls the on-chain records associated and corresponding to each domain.

Credentialed data records are cryptographically signed by the domain manager and stored on L2 Gnosis Safe (formally xDAI) and mirrored to IPFS. The signature of these records is saved on the primary domain itself. This key is called the VC.iD.

Public Profile

Public profiles with verified social accounts can be used to create a fully decentralized and portable user identity record. This can be used in a variety of scalable applications.

At the highest level, authenticate ENS simply by registering a domain. Or personalize your domain page by uploading custom images, connecting verified accounts of your choice, and resolving your domains to your Ethereum wallets, and create customizable QR codes corresponding to any source of your choosing.

Blue check as a distributed, verified service.

Social & E2EE

We are rapidly entering the next era of digital communication and social networking—one where users data is portable, and they can take their profile, graph, interactions, and communications wherever they want to; credentialed profiles become essential.

Credentialed profiles operate as an extended authentication layer, providing fully end to end encryption (E2EE) in everything from timelines, social graphs to chats.

Using Public Profiles and domains, one could easily build and monetize entire robust social networks with hardly any technical abilities or upfront capital required.

Content creators will unlock potential uses cases and rapidly take their micro-platforms and ability to engage directly with their supporters to new and previously unimaginable heights.

Cross-chain identity & reputation

Any registered user can link crypto wallets and annotate activity from many different blockchains. Weight, score and roll up data into a programmable and customizable user credit profiles.

On-chain resume

Complete tasks, learn skills and earn credentials that prove contribution via user activated achievements and metrics. Build a decentralized school or institute and seamlessly track performance and participation.

Entitlements & Automated Reward Distribution

Teams can build bridges between products and users based on verifiable achievements to unlock airdrops, content, specific rewards and more.

Trustless governance & Sybil defense

Users can create and operate decentralized governance systems. Create proposals, submit votes and create a sybil resistant governance app. Verified credentials establish non-Sybil traits, preventing capital capture via Sybils.

Activities designed to benefit the growth of community can be seamlessly and programmatically rewarded to members of a governance model assigning different voting weights to each given criteria.

Proof of Reserves

Wrangle and group wallets to create a transparent audit, providing completely unbiased and transparent data reports of any given assets held in reserve.

Make the most of the blockchain's immutable public ledger and bring precious, curated and interoperable data directly into focus.

Multi-app & Global Gaming Profiles

Using the identity protocol (VC.iD) to store profile data and gaming data in a way that can be consumed, added to, or extended by any app or game in Web3.

Federation

Create a new layer of identity portability across web3. Using the EBPTO issue new domains (.example, .developer) and federate them across the network.

Dive Deeper

Looking to explore more possibilities of EBPTO

Verified Credentials
Frequently Asked Questions
Build with EBPTO (Grants)
XMTP Chat Toy