There are limitless use cases that can be implemented using verifiable credentialed domains. Unlike traditional domains these are stored at the wallet level by their owners outside of the control of any big tech third party.

Domains are stored on-chain in the EBPTO Registry (Ethereum smart contract) leveraging the security, composability, and consistency guarantees.

A manager (registered to an ethereum address) controls the on-chain records associated to each domain.

Credentialed data records are cryptographically signed by the domain manager and stored on L2 (Gnosis Safe formally xDAI) and mirrored to IPFS. The signature of these records is saved on the primary domain itself. This key is called the VC.iD.

Public Profile

Create public profiles with verified social accounts which can be used to create a decentralized identity record. At the highest level authenticate ENS simply by registering a domain. Customize by uploading images and connected verified social accounts.

Blue check as a distributed, verified service.

Social & E2EE

As we rapidly enter the next era for social and a new way to think about communication within web3—one where users data is portable, and they can take their profile, graph, interactions, and communication wherever they want to; credentialed profiles become key. Credentialed profiles operate as an extended authentication layer providing fully end to end encryption in everything from timelines, social graphs to chats.

Using Public Profiles one could build entire social networks.

Cross-chain identity & reputation

Link crypto wallets and annotate activity from many chains, weight, score and roll up into a credit profile.

On-chain resume

Complete tasks, learn skills and earn credentials that prove contribution. Build a decentralized school.

Entitlements & Automated Reward Distribution

Teams can build bridges between its products and users based on verifiable achievements to unlock airdrops, specific rewards and more.

Trustless governance & Sybil defense

Operate decentralized governance. Create proposals, submit votes and create a sybil resistant governance app. Verified credentials establish non-Sybil traits, preventing capital capture by sybils.

Activities designed to benefit the growth of community can be rewarded to members of a governance model assigning different voting weights to each.

Proof of Reserves

Wrangle wallets to create a transparent audit providing unbiased report of assets held in reserve.

Multi-app & Global Gaming Profiles

Using the identity protocol (VD.iD) store profile data and gaming data in a way that can be consumed, added to, or extended by any app or game in Web3.

Federation

Create a new layer of identity portability across web3. Using the EBPTO issue new domains (.example, .developer) and federate them across the network.

Dive Deeper

Looking to explore more possibilities of EBPTO

Verified Credentials
Frequently Asked Questions
Build with EBPTO (Grants)
XMTP Chat Toy