Changes in privacy from Web1.0 to Web3.0

Tusima
4 min readJun 24, 2022

--

Web1.0: The beginning of internet privacy

Web 1.0 is the first developmental stage of Internet technology, it lasted between 1994 and 2004. In that era of internet technology, users hardly needed to consider privacy. They were pure content consumers, and the content is provided by Websites. A typical example of this is news portals. Users rarely interact with each other, so they do not expose too much of their privacy. Of course, Web 1.0 is not completely without interaction or payment functions, but these functions are greatly limited because the transfer infrastructure cannot guarantee security.

Although Web 1.0 is built on an open, decentralized, and community-managed protocol, Web 1.0 is only a readable network, and users can hardly interact with the content of pages in the Web 1.0 era. However, with the increase in the number of users and the development and innovation of Internet technology, people have a demand for network interaction. The most innovative company in the Web 1.0 era is Pizza Hut. Pizza Hut developed a pizza ordering page in 1995, where consumers could place their orders and pay cash when the pizza was delivered. Privacy concerns arise with internet interactions.

Web2.0: We have no privacy

The birth of Web2.0 is mainly to overcome the limitations of Web1.0. Compared with Web1.0, the main advantage of Web2.0 is that users can interact with the network. With the development of the Internet, users’ demands for social networking, music, video sharing, and payment transactions have risen sharply.

The user’s demand for social attributes has also expanded to many Internet companies. Social media platforms such as Facebook, MySpace, and Twitter provide users with social functions; data sharing software such as Napster which meets users’ needs for music and video; Google provides users with shortcuts to search for massive amounts of Internet information. Traditional institutions such as Bank of America meet users’ payment transaction and electronic transfer needs and adopt new encryption standards such as 256-bitAES.

The fresher and more interactive Internet experience brought many new features to users that enhanced the user experience. Nevertheless, this has not come without any problem as some issues persist to date. For example, if users want to use these new functions, they need the authorization of a centralized third-party platform to manage large amounts of data.

As a result, these centralized entities are endowed with enormous power and influence in terms of data and content rights, and a lot of communication and business activities are concentrated on closed platforms owned by a few tech giants, such as Google, Meta, Amazon, etc., and this model has been running to this day.

We realized the importance of privacy on the Internet very early. When it comes to the Internet, elementary school information teachers and parents will tell you not to reveal your real name on the scary Internet, after all, you don’t know who is behind the screen.

But we also lately realized the importance of privacy on the internet. Our clipboard is frequently read by third-party apps, and our likes and actions are sent to Google Analytics from countless Websites (if you press F12 now, open The browser’s Console, and click on the source, you can probably see it), our data is sold at a clear price, these behaviors are stealing our data and privacy unknowingly. In recent years, we only learned later We feel that we have been destroyed by some Internet companies for a long time, so we began to use Telegram, Duckduckgo, Mirror, and other applications… Of course, the most important thing is that in the Web3 era, privacy has finally been accepted by users with the popularity of blockchain and developers’ attention. In the open and user-led Web3 era, privacy protection will be a standard.

Web3.0: Defining true privacy

Privacy in the Web3 Era = Confidentiality + Anonymity = Data Privacy + Identity Privacy + Computational Privacy

In the Web3 era, assuming that all our interactions and network traces are interactions with applications on the chain, then all our data will be transactions and the information contained in transactions. Take a transfer from an ERC-20. Taking the function (parameters are _from, _to, _value) as an example, a transaction will consist of the following contents: transfer sender, transfer receiver, and the transfer amount. For these transactions, we can define privacy, anonymity, and confidentiality in the Web3 era.

Anonymity in this case means both the sender and receiver of the transaction (the actual identity) are made non-public, although the transfer amount may be public (only the _value parameter is made known).

Confidentiality refers to transactional and other contents made non-public, in this case, the sender and receiver may be made public (only _from and _to may be known). The real identity (Privacy) would be made anonymous.

In summary, confidentiality refers to the anonymity of all the contents of the transaction, including the sender of the transaction, the receiver of the transaction, and the transfer amount all need to be non-.

Privacy is a big focus in web 3.0 and so users would be given the right to choose whether to disclose data before the transaction is sent, allowing users to actively choose whether this transaction requires privacy. After the transaction, the user actively chooses the privacy of the transaction execution.

Tusima is based on SNARK and account model and uses Sigma protocol as the privacy algorithm to generate privacy proofs. It ensures decentralized-finance privacy protection, maintaining the privacy of user identity and transactions in Web3.0.

At the same time, you can still disclose financial data to people and institutions you trust and benefit from Web 3.0 and other decentralized networks.

Tusima is a zk-rollup-based multi-chain privacy financial network that integrates zero-knowledge proof and multi-chain interoperability. Its goal is to become a privacy financial infrastructure for Web 3.0.

Welcome to join TusimaDAO and follow us :

Medium: https://medium.com/@TusimaNetwork

Twitter: https://twitter.com/TusimaNetwork

Discord: https://discord.com/invite/Zdsg3fAuSy

--

--