Ozimiyaki (ozimiyaki)

Ozimiyaki

Just Artist

10 Followers

Recent casts

I love small accounts. Grinding alone but nobody listening to them. And I am a small account I am grateful to myself and other small accounts for all of our content.

  • 0 replies
  • 5 recasts
  • 4 reactions

GM Pals! O.O This image shows how idOS securely stores identity data, manages access permissions, and connects it to multiple financial applications. The data remains the property of the user; applications can only access it if permitted. Network Layer The function of the Network Layer is to secure data (encryption & signatures), store identities, and perform authentication. Essentially, your data is stored in a decentralized and secure manner, rather than on a single company's server. Integration Layer This layer acts as a bridge between data and applications, serving to regulate who can access data, write and read data, KYC permissions, and provide SDK and RPC. Application Layer This is the final layer, where users can use their data or interact with applications. The bottom line is that users have complete control over their data; applications only “borrow” it with permission. Web3 onboarding should be this simple. No repetitive KYC. No locked data. Identity stays in the hands of the user.

  • 0 replies
  • 4 recasts
  • 6 reactions

Top casts

A lot of money is cool, but if the money is only used for hospital treatment it's a stupid thing, Don't forget to exercise.

  • 2 replies
  • 3 recasts
  • 3 reactions

GM Pals! O.O The first time I saw this picture, I was very confused about how to understand it. But let me try to explain it in a very simple way. The image explains how user identity data is created, stored, and shared with other parties in a secure and controlled manner. 1. User & Wallet First, there must be a user, and usually users have a wallet that is used for authentication. In addition, there is a public key that functions to encrypt data. 2. Attributes (Identity Data) Users definitely have attributes, which serve to describe them, but these are not automatically shared with anyone. 3. Credential (Proof of Identity) Credentials are created from attributes. Credentials can be considered as digital documents that prove something about the user, are encrypted, signed by the KYC provider, and remain linked to the user. Next👇

  • 1 reply
  • 3 recasts
  • 3 reactions

Onchain profile

Ethereum addresses