Trendyol Tech
Published in

Trendyol Tech

What’s Web3 Authentication? How Can We Use It?

Photo by Batyrkhan Shalgimbekov on Unsplash

What Is Web3? How Web3 Works?

Web3 would rely on blockchain technology to break big tech companies’ (like Google or Meta) domination on the Internet and return it to us, to the people. Though it’s a bit of a utopia, it has an attractive vision for anybody that is concerned about the dominance of huge companies and their desire to control how people experience the Internet.

A Brief History of the Web

Web3 Authentication: Is It a Perfect Security System or Just Hype?

Not both. Neither is the perfect security system nor just hype. Although we’ll never have a completely secure system, I can say that we can have the best thanks to Web3.

Why Do We Need Web3 Authentication?

As described above, Web3 applications offer users the chance to interact with specific blockchains. However, users should have a safe way to connect to these crypto networks. Using the Web3 authentication method, users can connect to a network they select. Once authenticated, they can interact with other authenticated users in the network.

  • Increased security: Property proof with public key encryption is safer than the proof of ownership by e-mail / password or third party. Web3 wallets (or authorizing tools) can store the credentials locally on your device rather than servers and make the attack surface smaller.
  • Increased privacy: No email needed, and no third party involved.
  • Simplified UX: It’s a login flow that you can do with a single click within a few seconds, without having to write or remember any password.
Photo by FLY:D on Unsplash
  • Users need to have an authentication application: This authorization flow obviously doesn’t work without the Web3 authorization application (like MetaMask). It should be difficult to convince users to install this application, and the development of this application can be quite costly.
  • Work needs to be done at the back-end side: As we see, the implementation is quite simple. However, to integrate it into an existing complex system, it requires some changes in all areas that touch authentication: Signup, database, authentication routes, etc.

How the Authorization Flow Works?

Photo by Markus Spiske on Unsplash
Photo by Sigmund on Unsplash



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store