Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Learn about Creds and how they work.
Creds are verifiable credentials, a portable, reusable, private, and secure way to build reputation and prove that you’re real (and not AI). Unlike NFTs and SBTs, Creds are private, revocable, and can be taken between different platforms and ecosystems.
This learning journey will be built out over the coming months.
We're making it easier for individuals and organisations to trust each other.
Get started by learning about what cheqd and Creds are and how the technological building blocks underpin the products.
Familiarise yourself with the core concepts around decentralised identity and how the $CHEQ token works within this technological ecosystem.
cheqd has a series of Products, ranging from Credential Service to Creds.xyz. Get started with tutorials and guides on how to use them.
Understand cheqd's Governance Framework, including how to delegate your tokens, vote and participate in cheqd Network governance.
Use our different block explorers to view network transactions, delegations, governance proposals and community pool spends.
When using the cheqd network, both testnet and mainnet, you will need to hold tokens to pay for the transaction. In this guide we offer options for setting up a wallet and adding cheqd's mainnet and testnet.
A Verifiable Data Registry ("VDR"), in the context of decentralised identity, is a place where Decentralised Identifiers (DIDs) can be anchored to.
Commonly, VDRs are blockchains, like cheqd. This is because they are great places to store data immutably.
However, a VDR could also be a web domain, like . We could store a public DID on this website, because only the admins of cheqd have the ability to edit this.
This is largely secure, but is not as resilient as a blockchain, because, for example, the hosting provider for the website could take it down.
New innovations in decentralised identity have tried to create a more flexible storage layer for DIDs. Sidetree is a technology which stores DIDs and DID Documents in a temporary Layer 2 storage layer called Sidetree. This data is stored in IPFS, batched and anchored to blockchains in rollups. This minimises the amount of transactions necessary to be made to the Layer 1 blockchain.
Hypothetically, by storing DIDs in a temporary storage Layer 2, with backups in IPFS, the DID could also be updated from being stored on one VDR to another VDR. This is currently the exploratory work of did methods such as did:orb.
KERI, meaning Key Event Rotation Infrastructure, is another emerging innovation in decentralised identity. Rather than anchoring a DID to a specific location or block within a chain, KERI relies on nodes witnessing Key Event Logs (KELs). A KEL may hold an authoritative source of truth about what the latest keys related to a DID are, and who holds them.
In simple terms, KERI's logs are not immutable like a blockchain, but rely on the law of large numbers, and trust that KERI witnesses will act in a trustworthy fashion - providing the most up to date KELs with the correct Key events.
Learn about how decentralised identity works, including verifiable credentials and decentalised identifiers.
Decentralised Identity, otherwise known as Self-Sovereign Identity ("SSI") is an emerging technology that enables individuals and/or organizations to maintain direct control of data relating to them, with the ability to explicitly consent to where it is shared, used and processed.
Decentralised identity aims to create a trusted data economy, where it is possible to verify, check and trust exactly who you are interacting with, in both physical and digital domains.
Through this data model, it is possible to:
Reduce fraud, scams and phishing attempts online through digital identity proofs;
Increase efficiency of signing up for new services, accessing events or proving attributes about yourself;
Eliminate the need for hundreds of passwords;
Empower individual privacy and GDPR data subject rights by design;
Increase accountability in digital environments, minimising trolls and hate speech.
Learn about the core building blocks of decentralised identity:
Any distinct model of decentralised identity revolves around three specific actors: the issuer, the holder and the verifier. Together, these three actors constitute what is known as the Trust Triangle.
Let’s discuss these three in turn:
However, an issuer could also quite easily be a friend, family member or even a local café. In fact, in the DeFi world, issuers could be those who you have interacted with online who attest to something about you.
The following image shows the basic flow of how SSI works, without getting into the technical details.
Let's run through this flow in turn.
One of the most important components of SSI, is understanding what goes on the blockchain and what does not.
In this first step, the issuer anchors a public signature to the blockchain in the form of a Decentralised Identifier (DID) and DID Document. In non-technical terms, the information contained in this signature is a statement from the issuer saying:
"Hey, this is my digital signature and signing keys that I am openly publishing to the world. This will help verifiers trust that if they see a digital signature within data they are presented, they can check whether it is mine or not."
The issuer may also publish what is known as a Schema, which is a list of the types of attributes there will be listed in a Credential that it issues. Schemas are useful for Credential interoperability.
To do this, the issuer needs to establish a secure off-chain, peer-to-peer connection channel with the holder. This is to preserve privacy and ensure that no personally identifiable information goes onto the blockchain.
A holder may use a digital identity wallet app to scan a QR code from the issuer to create a pairwise relationship.
Through this secure channel, an issuer will send a Verifiable Credential. This Credential is a packet of data which is tamper-proof and verifiable. Within the Credential will be the public signing keys and signature of the issuer, present in the DID Document (written to the ledger in step 1).
The Credential may also reference a particular schema, which the structure of its contents mirrors.
Once the Credential is sent to the holder, they now have a signed, verifiable and trustworthy instance of their data in a digital wallet that they control.
Digital identity wallet apps will have user interface which helps arrange different data by type and by substance, making it easy for the holder to have a holistic view of all their Credentials.
The holder is now empowered with full control and management capabilities over their personal data. The holder can consent and directly choose when their data is shared.
Once again, if the holder wants to share their data with a third party, another peer-to-peer channel needs to be created with a verifier. In a similar process, the holder might use their wallet app to scan a QR code from the verifier to create a secure, off-chain communications channel.
Once this channel is established, the verifier may request a selection of data from the holder.
The holder will be able to choose whether it wants to accept the request and will be able to explicitly consent to what data is shared with the verifier.
As mentioned in Step 2, the Credential that the holder presented to the verifier contained the signing keys and digital signature of the issuer.
Using the blockchain, and a process called DID Resolution, the verifier is able to check whether the signature and signing keys in the data received, correlates with what is published in the issuer's DID Document.
The verifier may also check the schema referenced in the credential, to check that all the correct attributes are present, and to also make it easier for the verifier to receive similar Credentials in the future, given there may be a common format.
The process of DID Resolution builds a chain of decentralised trust between the issuer, holder and verifier - without the issuer and verifier needing to have a direct relationship with each other.
The Trust Triangle enables a verifier to be able to trust data it receives from a holder without having to have any direct interaction or relationship with the issuer.
It also empowers the holder to maintain total control of their data and where it is used, through decentralised trust, utilising Decentralised Identifiers ("DIDs") and Verifiable Credentials ("VCs").
This is incredibly powerful for establishing trusted interactions at a large scale.
Learn about cheqd and how it works.
cheqd is a blockchain network, built in the , designed to do three core things:
To enable people and organisations to have digital, trustworthy interactions directly with each other, whilst maintaining privacy and without any centralised registry or organisation needed;
To facilitate new business models for and Verifiable Credentials, through the use of our token, $CHEQ;
To bridge the DeFi ecosystem with the ecosystem, for better user experiences, democratic governance, regulatory compliance and operational efficiency.
cheqd's goal is made possible through leveraging technology, and technical standards created by the World Wide Web Consortium (W3C): and .
This is you.
Digital identity is something that we rarely think about in our day-to-day lives, but it is something that we all have subscribed to.
Yet, currently, the average person, and likely you reading this, has over 150 accounts online, each with a separate username, password and security process.
Think of the likes of Facebook, X (Twitter), Instagram, Signal, Amazon, Telegram, Deliveroo, Uber... the list goes on.
Every time we open an account online, to use a service, buy something online, use social media, or even just browse the internet, we are creating a digital footprint for ourselves, which feeds into a digital profile.
And each of these different accounts holds personal data about you, such as your name, age, photographs, sex, gender etc., and also various preference data, such as what you browse, like, share or click on.
These digital profiles are generally secured behind a password, meaning that you feel a level of confidence that you have control over them.
However, in reality this is not the case.
Our data is stored across multiple gated siloes, and every time we want to access this data, we need to prove to the gatekeeper that we are who we claim to be through an authentication process.
In other words, every time you want to get access to your own digital identity data, you need to get through a locked door using a key.
We play out this sequence multiple times a day:
Person: "Hello there, can I please get into my account to view my own data please".
Company: "Ahhh maybe, if you have the password and key you can get in, otherwise nah, you can't have your data today".
Company: "HAVE YOU SEEN THIS NEW VIDEO OF A BABY MONKEY RIDING A PIG?"
Person: "That is some GREAT content, have some more of my preference data, I don't really care - I love it, thanks"
Company: *sweats advertisement money*
This is the digital sphere we have all become accustomed to, without really being aware of, or presented an alternative. Companies do monetise your data and do use your data to create specific digital profiles for you. But we are somewhat comfortable with this because we get to use a seemingly free digital service. For this reason, we feel a level of content sacrificing a little bit of privacy for a whole lot of convenience.
However recently, this model has led to two further issues:
As we get more and more accounts, remembering and managing passwords becomes increasingly difficult. Too many times we are faced with a popup, saying something along the lines of “Hold up, before you access this service we need to ask you some questions to verify that you are who you claim to be.”
And because it's getting more difficult to manage, we end up using the same password to access multiple accounts, which leaves the door open for scammers, hackers and fraudsters to easily phish the password away and obtain our digital assets.
This constant battle to access one’s own accounts and data is frustrating, and only becoming increasingly so. And we at cheqd believe that it’s outdated.
If you are asked to prove who you are to someone online, there is no existing way of doing this. Whilst in the physical world we have verifiable documents such as passports and driving licenses which contain trusted, safety features such as watermarks and common semantics, in the digital world we have nothing of the sort.
If I meet someone on social media, an eCommerce platform or a dating website, I have no simple way to verify that the person is who they claim to be. Why is this the case? Even though I have hundreds of accounts online, and many of them even require a Know Your Customer (KYC) procedure, I never hold that verified data. Companies hold that verified data... and they monetise it.
Over the last few years, there has been a big push for individuals to have greater control, autonomy and sovereignty over their own data.
Instead of companies managing data indirectly, on your behalf, it is now possible to hold your own data securely in a digital wallet.
This type of technology has been labelled by the industry as decentralised, or Self-Sovereign Identity (SSI).
Importantly, this data is cryptographically signed by a person or company that issues it to you. The data itself is secured with a digital trustworthy signature.
And you can share this with third parties to prove trust in your own data, identity and attributes.
This does a few things.
It re-centres control of data around an individual (or company, thing: real or virtual);
It enables far greater trust in digital interactions;
It becomes far easier to access new services with bi-directional trust and confidence.
And the use cases and projects of this technology are growing rapidly...
Learn more about the core building blocks for decentralised identity ecosystems:
An issuer is an entity that is able to issue trusted data in the form of . Issuers can come in many shapes and sizes. In most typical SSI use cases, issuers tend to be large organisations such as governments, financial services, health services, insurers or education faculties.
All an issuer needs to be able to do is to attest a fact or attribute about someone else. The level of trust in that attestation is up for the to decide.
A holder can be an individual, an organisation, a product or an object, which has a certain set of attributes that have been attested to by an .
The holder is able to hold and manage these attributes, in the form of , and directly consent to when, and with whom, these credentials are shared. This empowers the holder to be able to enact their by design and by default.
A holder is able to bundle their into a in order to prove attributes about itself to a third party. There are different types of Verifiable Credentials that a holder may hold; they may have different Signature schemes, some may afford greater privacy preserving benefits such as Zero Knowledge Proofs or Selective Disclosure.
A verifier is any entity that can verify the authenticity and validity of a , via a presented .
The verifier is able to check that the data presented was issued by the correct, legitimate and that the has not been tampered with. In most instances, the verifier may be able to check that the has not expired or been revoked.
Once the issuer has publicised their signature and signing keys, they are able to issue a to a holder.
The holder shares the data with the verifier in the form of a . Importantly, the data shared with the verifier is still visible in the holder's digital identity wallet app. This data can be revoked at any time by the holder, in a few clicks, in accordance with their data subject rights.
But it's my data right?
This is great content.
You hold your data directly.
Your data now has a digital, trustworthy signature. ****
Get CHEQ
Start your journey of acquiring CHEQ. Head to our website to learn about the places you can get CHEQ.
CHEQ Tokenomics
Learn about the tokenomics of CHEQ, such as distribution, vesting and identity costs.
JSON-LD is a lightweight Linked Data format. It is easy for humans to read and write. It is based on the already successful JSON format and provides a way to help JSON data interoperate at Web-scale.
Linked Data empowers people that publish and use information on the Web. It is a way to create a network of standards-based, machine-readable data across Web sites. It allows an application to start at one piece of Linked Data, and follow embedded links to other pieces of Linked Data that are hosted on different sites across the Web.
The main difference between JSON-LD credentials and JSON credentials is the inclusion of a @context
field within the credential payload.
In JSON-LD, the @context
property can also be used to communicate other details, such as datatype information, language information, transformation rules, and so on, which are beyond the needs of this specification, but might be useful in the future or to related work.
@context
sectionLearn about Verifiable Credentials and how they secure your data.
Learn about digital resources written on cheqd
cheqd has built a Resources Module to extend the functionality of our decentralised identity network, providing capabilities not found on other self-sovereign identity networks.
A DID-Linked Resource is a blob of information stored on-ledger, discoverable through the same syntax that is widely used within the SSI industry.
Many SSI resources such as schemas currently reference web URLs such as . Other areas where this can be issues are:
DID methods, such as and , where trust is based on Web 2.0 infrastructure
Revocation lists maintained on servers, such as
If, for example, any of the infrastructure listed above was to experience downtime due to technical faults, a dDoS attack or a failure of a cloud hosting provider, this could hugely disrupt the proper use of Verifiable Credentials in a production environment.
Such web URLs as described above are also single-points of failure due to .
Credential schemas, once defined, should be able to be used and referenced for many years, without being changed. For this reason, keeping an up-to-date version of the links themselves is crucial. Moreover, if the schema locations are moved and the links are broken, the Credentials issued become far less trustworthy.
The way schemas are currently referenced from web URLs (e.g., schema.org/Person) is not immutable. Schemas may be changed and previous schema definitions may be purged from the database. This means if you had a Verifiable Credential issued in 2015 which referred to a particular schema in 2022, that schema definition may have significantly changed.
On the other hand, solutions that do currently store schemas on ledger (e.g., Hyperledger Indy) don't have semantic linkage between old and new versions. In this instance, current ledgers allow new versions to be made but don't offer an easy way for client apps to discover linkages as they evolve over time.
The use of Resources is potentially very broad; they can provide many different roles, such as:
A schema, such as Camenisch-Lysyanskaya ("CL") schema ‘CL’, JSON-LD schema, JSON schema etc.
A document, such as a Governance Framework
An branding elements, such as a company logo, brandmark, etc which can be pulled directly by block explorers and other Web3 applications
A revocation registry for revoking already-issued credentials.
Through extending the use of DIDs to identify other on-ledger resources, trust can begin to be chained.
You can think of it as a hyperlink for #Web3. But unlike a hyperlink, it is possible to specify the type of resource to be retrieved, and reject anything unexpected.
A Verifiable Presentation is a combination of , bundled together into a format to present to a third party.
Like VCs, Verifiable Presentations contain proofs (i.e. they can be signed with cryptographic keys). In this regard, a major difference between VCs and Verifiable Presentations is that Verifiable Presentations are signed with cryptographic keys of the holder to prove, for example, that the actor who is sharing the Verifiable Presentation is also the credential subject of the underlying VCs.
With some credential formats like AnonCreds, holders can freely choose which information (from underlying VCs) they include in a Verifiable Presentation and thus, share with a relying party. It is even possible for holders to prove to a relying party that they possess a certain attribute or fulfil certain conditions without disclosing details (e.g. the proof that one is older than 18 without revealing the real age) via so-called 'Zero Knowledge Proofs'.
There are multiple standards used for Verifiable Presentations, that will be listed below:
A "", in an everyday sense, is an attestation, evidence or proof of qualification, competence or authority issued to an entity, either individual or person, by a third party with relevant authority or assumed competence to do so. This may be evidence of authority, status, rights, entitlement to privileges, or the like, usually in a written form.
Historically, we have relied on public issuing bodies to verify our identities — i.e. passports, driving licence, birth certificates, etc. These credentials go on throughout our lives, being issued to us or requested by us at times we need them. We provide them to others regularly, without ever wondering what happens to them, where they now sit, and how long they’ll be retained.
Essentially credentials are a means to verify identity.
A Verifiable Credential ("VC") is a tamper-evident data file with a set of claims about a person, organisation, or thing that can be cryptographically verified. These verifiable credentials can be used to build , which can also be cryptographically verified.
Okay, stop there, let's simplify what this technical language means.
Let's imagine something we're all familiar with.
Here's a classic email with some attachments.
This is how most people are familiar with sending information about themselves digitally.
I am sure everyone reading this has had to attach a photocopy of their passport to an email, in order to prove that they are who they claim to be. Or alternatively, has attached their CV to an email to prove their work and education records, either as a word document or PDF.
The problem with this system, is that it is not currently possible to check the validity of an attachment sent via email. Word Documents, PDFs, JPEGs etc have no security features that allows a third party to check if they were legitimate or not.
Let's take the example of the CV. You receive it as an attachment, you read it, and to check the validity you need to contact the references which are generally at the bottom of the CV to check whether this person really did all the things they claim to have done.
This is time consuming, and frequently, owing to the lack of trust in these data formats, can be susceptible to fraud.
A Verifiable Credential is a digital file that stores data. However, importantly it is designed to hold two core types of data:
Claims
A claim is an attestation about something. It could say that "I went to Oxford University".
Proofs
The verification key material and the Decentralised Identifier ("DID") enable the issuer to essentially sign the claims in the credential, to vouch for their autheneticity.
Verifiable Credentials change the way that data can be trusted when presented. This is because when you receive a Verifiable Credential, you are able to check, without contacting another party:
Whether that data was issued by a specific issuer;
That the data hasn't been tampered.
Unlike attachments in an email, which are data files that need to be independently verified, to trust their contents; Verifiable Credentials enable that verification innately, through the use of Decentralised Identifiers. This is a powerful component for building trust in a decentralised Web 3.0.
Therefore, you can reach the definition:
A Verifiable Credential ("VC") is a tamper-evident data file with a set of claims about a person, organisation, or thing that can be cryptographically verified. These verifiable credentials can be used to build Verifiable Presentations, which can also be cryptographically verified.
For more information, please see the Verifiable Credential Data Model Specification below:
DIDs can identify any entity in a digital way.
It is easy to think of DIDs as identifying something in the same way as how a registration plate identifies a car, and a car's owner.
To take an example, this is James Bond's Aston Martin DB5.
James Bond's Aston Martin has a unique identifier, the license plate, identifying the owner of the car and also the features of the car:
BMT 216A
Similarly, a DID is a unique identifier, identifying the DID subject (a person, company or thing), and providing information about the DID subject.
did:cheqd:mainnet:fbe76ff9-54c0-49ce-ab18-aab8137dc8a6
Both identifiers can be checked against a registry in order to provide verifiable information about the thing that the identifier is identifying.
The process for withdrawing the information from the DID is very similar to the license plate number: through resolving a DID to get information about the DID Document.
License plates and DIDs both give third parties a high degree of trust and confidence in who/what they are interacting with.
To understand what we mean here, let's look at the following scenario:
Well, James Bond can likely prove control and ownership of that car in 3 main ways:
The license plate is on James Bond's car. And the unique registration plate BMT 216A
will be linked to Mr Bond's identity through a registry, such as the DVLA. Anyone is able to check that the registration details of the car match it's visual features, and authorised persons are able to check whether James Bond's identity matches the license plate.
James Bond holds the physical keys to unlock and use the car.
James Bond holds a physical document called a VC5 Logbook, which is a required document, alongside other identity documents, to update any of the information in the DVLA database.
This model uses the DVLA registry and the physical access/documentation about the car, as two separate layers of trust and assurance, meaning:
The BMT 216A
license plate could be removed and placed on another car
James Bond's keys could be stolen
James Bond's VC5 Logbook could be stolen or forged
However, doing any of the above would not result in an ownership change on the DVLA registry.
Trust in Self-Sovereign Identity models works in a very similar way, where:
A Decentralised Identifier (DID) is like the license plate
A DID Document on a blockchain is like the DVLA registry
A private cryptographic key is like the VC5 Logbook
Authenticating using the keys in the DID Document is like proving that you can open the car with your set of keys
Of course, there is a lot of complexity here, so we will walk through each part in this learning documentation in simple terms.
A DID is very similar to a car registration plate in the sense that it is a unique identifier, which if resolved, provides more information about the DID.
The equivalent to searching a registration plate number on a DVLA indexing site, is resolving a DID through a DID resolution method.
When you want to search for a License Plate registration, you generally search the Registration number into an indexing service, such as the DVLA website below:
Through this search function, you are able to retrieve information about what the license plate refers to.
For example, with James Bond's license plate, the following information is fetched:
This creates a level of confidence in the fact that the registration plate belongs to the specific car, as a person could cross reference the listed features against the visual features of the car. Further, any competent authority would have the power to go one level deeper and tie the legal owner of the car to the license plate.
A DID at face value is a URL, which has the following composition:
Below, you can see the method for resolving a registration plate number, as well as the similar method for resolving a DID.
An example of a DID Document is below, which explains various information about the DID subject. We will walk through this sequentially as it is quite technical and complex.
id
The id
field at the top identifies the DID subject. Using the above analogy, the DID subject would be James Bond's Aston Martin DB5, because it is the entity that is identified by the identifier. In more general identity use cases, the DID subject could be an entity such as a car, but is usually a company or organisation.
Note: This is the same identifier as what is inputted into the resolver to return this DID Document.
verificationMethod
The verificationMethod
, in this example, describes a cryptographic key or list of keys and the controller(s) of the key(s). Each Verification Key itself lists:
an ID
for the specific key;
the controller
, i.e., the identifier of the person or company with control over that key; and,
the type
of cryptographic key.
the verification key material such as publicKeyMultibase
Going back to the above analogy, holding a private key for a certain cryptographic key pair is like holding the V5C logbook, as it enables DID Controllers to update/change/amend information about the ownership of the DID.
Without access to the verification keys, the ownership or control of the DID would not be able to change.
In reality, James Bond himself could have a specific verification key, his colleague "Q" could have a second specific key and the Secret Intelligence Service MI6, could have a third specific key. Each party would be known as a DID Controller, and would be able to update/change/amend the DID Document accordingly.
authentication
The authentication
property is very important. This property enables only the DID subject to prove and authenticate who they are.
In our specific example, James Bond may be the only party that holds a Verification key, listed under the authentication property. This is almost analogous to holding the keys to the car. Using this property, if challenged about being the owner of the car, James Bond would have all the tools necessary to prove and authenticate the car, under this verification key for authentication.
service
The service
field provides further information about where to contact the DID subject. In our analogy, this could point to a specific email address for help@MI6.com. This property is quite flexible, but importantly, it should not disclose any personally identifiable information.
There are also other useful fields which may be included in a DID Document, such as assertionMethod
, keyAgreement
, capacityInvocation
and capacityDelegation
. These are outside of the scope of this introductory information, and should be the topics of further reading.
The key difference between the use of something like the license plate registry and the use of DIDs, is the former relies on a centralised database, whereas, the latter relies wholly on decentralised trust and cryptographic key management.
This makes DIDs far more extensible, scalable and workable beyond jurisdictional borders.
Earlier, I asked the rhetorical question: how can James Bond prove ownership and control of this car if someone was to challenge that it was his?
The next question is, how can James Bond prove control of his car, with the use of DIDs, DID resolution and verification keys?
James Bond still can likely prove control and ownership of that car:
The unique DID related to his Aston Martin DB5 will be registered on a Verifiable Data Registry, such as a blockchain.
Through using a DID Resolver to resolve the DID, a third party would receive a DID Document, containing verification keys.
The third party creates a challenge request to authenticate the DID, and James is able to use his private key to prove control of the public key listed in the DID document. This proves James has legal control of the car without reliance on a centralised party.
James Bond still holds the physical keys to unlock and use the car. He now also holds cryptographic keys to authenticate and prove ownership.
Through this method of DID resolution and authentication, people, organisations or objects can have a level of cryptographic trust in the identifiers relating to them, without reliance on traditional centralised models.
This is, and will continue to be, a core building block for Web 3.0 going forward.
JSON Web Token (JWT) is an open standard () that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.
This information can be verified and trusted because it is digitally signed.
JWTs are widely used in legacy identity infrastructure, underlying the frameworks used by and . As such, there is a plethora of software libraries and toolkits for developers to build upon using JWT, making their adoption far more seamless than other Verifiable Credential formats.
Much of the work in this page is influenced, iterated or directly replicated from excellent document on . We intend to give appropriate credit to this work, as expressed under a .
AnonCreds are a type or flavour of Verifiable Credentials that were originally developed by the company , and were subsequently adopted by the as part of the 'Indy' codebase that was contributed to , a project. This codebase was forked into the project for ledger code, for cryptographic libraries, and the ledger-agnostic Hyperledger Aries codebase for agent, wallet, and credentialing code.
AnonCreds are now far more widely adopted, through organisations such as the , and the .
AnonCreds were designed to provide additional privacy benefits, compared with JSON and JSON-LD based Verifiable Credentials. There are a series of differences that can be summarised as follows:
Camenisch-Lysyanskaya (ZKP CL-Signatures): a Credential format which is not defined in the W3C Verifiable Credential Data Model. Rather it is a bespoke data expression format coupled with a particular digital signature algorithm.
Link Secrets: A mechanism to link ZKP-CL credentials to DIDs, by including a DID for the holder in the credential’s schema. Holders can prove that Credentials are not tampered with and that they are authentic, since holders are the only party that knows the Link Secrets made at the point of issuance.
Schemas: The schemas are defined in a document and they are written to an Indy ledger where they can’t be changed. To update a schema, a new version must be created and written to the ledger for future use. This schema is fetched from the ledger by verifiers when calculating the verification.
Credential definitions: Each issuer of a Verifiable Credential must post a credential definition that says to the world, "I intend to publish credentials from schema X, signed using keys Y[0]...Y[N], and with revocation strategy Z". This helps verifiers prove that the Credential has not been tampered with.
Predicate proofs: Through the use of link secrets and Indy schemas, it is possible to present an assertion, such as "date_of_birth is more than 18 years ago)", without revealing any additional information.
Privacy preserving revocation: Using cryptographic accumulators and 'tails files', revocation statuses can be queried without creating a chain of correlation through which a user's privacy can be compromised.
The ZKP-CL processing model requires that the credential’s schema is defined and posted to an Indy ledger. The credential issuer follows the pre-defined schema. They leverage the CL Signature suite to sign each statement in the credential. The credential is anchored to a link secret that is known only to the holder (stored in the holder’s software), and when the holder is issued a credential, it packages up a cryptographic commitment to the link secret within another long number that the issuer uses for the credential ID.
A metaphor for this is that of a digital watermark; the link secret is like a stamp that is used to create a watermark. The stamp used to create the watermark is NOT packaged up or put in the credential in any form; all that is in the credential is very-hard-to-fake evidence that the holder possesses the stamp and is capable of generating such watermarks. Unlike non-ZKP methods, zero-knowledge methods generally do not share a correlatable identifier (such as a persistent or public DID) and also do not reveal actual signatures. Instead, they only reveal a cryptographic proof of a valid signature. This means the holder of the credential cannot be correlated just by presenting a proof of the credential (this is the primary privacy problem with public/private key cryptography that ZKP-CL Signatures were invented to solve over a decade ago).
All other non-ZKP Signature formats require a resolvable DID—which is a correlatable globally unique identifier—and also produce the same signature on all equivalent presentations, which is a second fully correlatable globally unique identifier
AnonCreds have been the subject of heavy debate within the decentralized identity community for the following reasons:
Interoperability: AnonCreds are intrinsically tied to Hyperledger Indy, and largely to Hyperledger Aries. Historically, they cannot be written to other Layer 1 Utilities, nor are they compliant with the W3C Verifiable Credential data model, given their core architectural differences. As such, this shoehorns adopters into a particular tech stack, which although open source, is largely reliant on the Indy/Aries community for updates, since there is no formal Standard.
Scalability: The use of ZKP-CL signatures, whilst certainly containing benefits from a privacy perspective, are very large files which can lead to inefficiencies when used at scale in production environments.
Hyperledger Indy has performance and scalability issues when it comes to running more than 25 nodes in terms of its throughput. Its method of revocation also generates very large files, which is very slow to compute in a low-latency environment.
Much of the work in this page is influenced, iterated or directly replicated from our .
Selective disclosure empowers an individual to decide which specific pieces of information, contained within a Verifiable Credential, will be disclosed to a verifier. This stands in contrast to the conventional practice of revealing all the data present in a Verifiable Credential.
For instance, Alice could selectively share only her age to confirm eligibility for purchasing products on an e-commerce platform, without divulging other personal details found in her Verifiable ID document used for verification. This approach enhances privacy and provides individuals with greater control over their personal data.
Selective disclosure is a crucial element of Self-Sovereign Identity (SSI) because it allows individuals to share only the essential personal information required for a transaction or interaction. This minimizes the risk of identity theft and various forms of fraud.
A Selective Disclosure JSON Web Token (SD-JWT) is a subtype of JSON Web Token wherein the claims within the body are hashed, rendering them unreadable without proper disclosure. The original values of the claims can be unveiled by providing the necessary disclosures.
When presenting a conventional credential via JWT, the claims are plainly visible to the verifier. In contrast, with an SD-JWT credential, claims are encrypted in a hashed format, ensuring their unreadability. The holder can then choose which claims to reveal to the verifier by providing plain text key-value pairs (referred to as disclosures) alongside the SD-JWT. The verifier can hash these disclosures and compare them to the values in the SD-JWT, thereby verifying the inclusion of the claim in the SD-JWT. Additionally, SD-JWTs allow for the inclusion of decoy hashes in the credential, serving as dummy values to obfuscate the actual number of claims in the credential.
A visual representation, such as , , , etc
Audience | Quick wins | Longer term strategic objectives |
---|
A proof is cryptographic evidence to support that claim. In decentralised identity, this evidence is generally attested to by an . This proof is often represented by both the of the issuer, as well as a piece of cryptographic material, that relates to a specific public key of the issuer, for a specific purpose, such as an assertionMethod.
As previously mentioned a DID is a unique identifier that can be anchored to a , in order to store information in a highly available way.
cheqd has multiple implementations of a DID Resolver, and for more technical information you can look at our .
One common implementation of a DID Resolver is through hosting a DID Resolver on the .
When inputted here, relevant information will be shown about the DID, in the form of a DID Document. This is possible because the DID and it's adjacent DID Document are both stored on a , such as a blockchain or trustworthy database.
is being proposed as a Standard and is in the process of being taken to the .
Nonetheless, many proponents of SSI contend that AnonCreds are still the most production-ready Credential types at this present instance. Certainly, AnonCreds are the only off-the-shelf Credential type that can provide privacy-preserving functionality such as predicate proofs, which is why, for example, Governments such as are large proponents of AnonCreds.
CL-Signatures | Supported | Supported |
---|
JSON (JWT)
W3C standard for representing data in a plain JSON format with a JWT proof.
JSON-LD
W3C standard for representing data in a plain JSON format with a Data Integrity proof.
SD-JWT
Extension of JSON based JWT with ability for selectively disclosed attributes.
AnonCreds (ZKCreds)
Hyperledger-championed format with capabilities for zero-knowledge proofs and selective disclousre.
Link secrets | Supported | Indirectly supported | Supported via SDKs |
CL-Schemas on-ledger | Supported | Supported | CL-Schemas as resource on ledger linked to a DID Document. |
Credential definition | Supported | Supported | CL-CredDef as resource on ledger linked to a DID Document |
Predicate proofs | Supported | Supported | Supported via SDKs |
Privacy preserving revocation | Supported | Supported | Revocation Registry Definitions, indexes and Entries as resources on ledger linked to DID Documents |
SSI Community |
Web 3.0 community | Enable Web3 Companies to use on-ledger Resources to fetch company information (such as logos, token info, relevant token APIs) to populate Block Explorers and Exchanges, rather than through Keybase or manual processes. |
Tokenomics are typically documented and distributed via a dedicated whitepaper. However, since our tokenomics will be a constant iteration, we have been using blogs to explain these in an easier-to-digest format, with a summary available in the Governance Framework.
Part 1 of cheqd’s tokenomics covered the context/background, utility through parameters such as initial supply and inflation, and governance tokenomics. It’s now time to complete the picture with distribution/allocations.
Part 2 of cheqd’s tokenomics covered the initial distribution of the token.
Part 3 of cheqd’s tokenomics covered the planned architecture of the payment rails.
Tokenomics part four outlines measures to improve the tokenomic sustainability of the cheqd network. This is achieved through an increase in the network’s identity transaction pricing for DIDs and Resources (from gas price to more concrete dollar values) and the introduction of deflationary mechanisms in the form of burns. Essentially, the fee used for identity transactions will be split: a portion will go back to Validators and Delegators as block rewards, a portion will be burnt (destroyed) to reduce supply, and a portion will be designated to the Community Pool. The exact weighing of this split is for you, the community, to decide.
We are proposing to introduce two new mechanisms to the cheqd tokenomics:
Identity transactions such as DIDs, credential schema, etc. writes will have a cost greater than gas which will increase rewards from the network as identity utility increases.
This has been achieved using genesis parameters which will be updated periodically to maintain stable pricing for users until we migrate to using oracles such as those provided by Umee.
A proportion of the identity transaction charges will be burnt to establish equilibrium with the inflation on the network and target total supply returning to a total initial supply of one billion $CHEQ.
A Commonwealth discussion has been created to open up discussion on the proportion of any charges which should be burnt.
The $CHEQ community pool recently funded work by Animo to reward them for their work on their Anoncreds demo on cheqd and continue their work on Anoncreds ledger independence. We believe the percentage of network rewards should be increased to encourage work such as this.
A Commonwealth discussion has been created to open up discussion on the proportion of network rewards which should be allocated to the community pool.
Identity transaction pricing and burns will augment the work we are doing on payments for self-sovereign identity/decentralised identity.
It’s almost a year to the day since we successfully launched the cheqd mainnet. In that time, we have learnt a huge amount, especially regarding tokenomics which we are now proposing to update.
Currently (prior to the proposed update), writing a DID to cheqd mainnet only costs gas, which is approximately 0.004 $CHEQ. This is extremely cheap when compared to networks such as Sovrin, where writing a DID costs $10, especially taking into account the value we are bringing as a network, protocol and team.
Alongside this, $CHEQ is currently inflationary (where staking rewards come from), with only slashing, tombstoning or no-with-veto slashing providing any deflationary pressure.
We are proposing to update and improve both of these.
The best and easiest place to start is pricing.
Per the introduction, current identity transactions on cheqd are too cheap for the value they create. We intend to move to the following pricing structure, which is still extremely competitive whilst matching the value created much closer.
Note: Currently, schemas, credential definitions and revocation registry transactions are all priced the same since on-ledger they are all categorised as “resources”. Over time, these will likely become opinionated and differentiated according to the value they create and the burden they place on the ledger.
The keen-eyed of you will notice that the pricing above is in dollars, and obviously, cheqd mainnet runs in $CHEQ. In short, we are setting parameters to convert from US dollars to $CHEQ using baselined $CHEQ pricing at network update. For more details, please see the Implementation: Dollar to $CHEQ section below.
At current price levels ($0.03-$0.04), writing a DID will equate to 66.6 - 50 $CHEQ, which leads us to where these tokens will be distributed upon writes. This mechanism is similar to the mechanism Osmosis uses to fund the community pool through network charges for anyone creating external pool incentives. It also brings us towards the mechanisms built by the Kujira team for rewards to increase as the use of the network utility increases.
The tokens being charged by the network can either be distributed across stakers or burnt (or both according to a defined split):
Burn: Provides a deflationary mechanism to counter inflation on the network.
Distribution: Augments inflation-based rewards so APY will rise as network use does.
If we assume that 50% of the tokens spent will be burnt, we have 50% being distributed to delegators, validators and the community pool.
Using the example in the diagram below, any block with a DID written within it is worth approximately ~four times a standard block where the block reward is ~12 $CHEQ. This means rewards on the network will begin to rise with adoption.
It is also worth noting that whilst resource transactions (which include revocation writes and updates) are substantially cheaper than DID transactions, we are expecting them to be orders of magnitude more frequent. Sovrin mainnet has a ratio of approximately fifty revocation registry updates to every DID, which we believe will be on the extreme low-side as adoption scales.
Repeating a table we included in Tokenomics part 3 below, issuing credentials and hence interacting with revocation registries is significantly higher than DID transactions.
Tokens which have been charged by the network for identity transactions but not burnt will be distributed according to stake on the network so, distributed across delegators, validators and the community pool.
As mentioned above, the network is currently inflationary only aside from slashing, tombstoning and no-with-veto having deflationary effects. Implementing a burn mechanism will bring the system into equilibrium.
The volume of tokens burnt will increase in the same way as distributions will, with the aim of bringing total supply back to one billion.
Bringing distribution, rewards and burn all together means the system will be dynamic and as the network use increases, both rewards and burns will increase, increasing APY whilst also bringing the total supply back towards one billion. As rewards increase, the $CHEQ community can prioritise APY or accelerating burns to drive total supply down to the original initial supply.
In the first version of identity transaction pricing, we are achieving dollar pricing through periodically adjusting on-ledger parameters , using baselined $CHEQ prices, via governance votes. Over time, we intend to migrate to oracles such as those provided by Umee to maintain constant dollar pricing for our partners. Until we have implemented oracles, we propose to update the parameters quarterly to keep pricing stable. Please see the Community and Governance section for more details.
Read more on our ADR on Genesis Parameters
As can be seen in the image above showing the genesis parameters which define the costs in $CHEQ, there is also a “burn factor” variable which sets the percentage of the tokens charged for identity transactions which will be directly burnt. This can be adjusted through on-ledger governance votes according to the cheqd community preferences.
Implementation of these mechanisms (pricing, distribution, and burn) will require on-ledger votes both to implement but also to periodically maintain these, especially before we implement pricing oracles to programmatically maintain stable dollar pricing for our partners.
We would welcome the community's feedback on the burn_factor, specifically on whether they would prioritise burning more or increasing rewards on the network.
Our view is that a high burn_factor
in the immediate term would be preferable since this minimises the amount of burning required in the future to return to the total initial supply (one billion) whilst maintaining rewards where they currently are but would welcome the community’s views and opinions. We’re looking forward to engaging here. To that end, we have begun a Commonwealth discussion here.
Until we build support for oracles so that dollar pricing can be maintained programmatically, we will need to periodically update the genesis parameters covered in Implementation: Dollar to $CHEQ
. _Currently, we believe this should be quarterly so that we do not need to hold governance votes every month which would put too much burden on both delegators and validators. However we would welcome feedback from the community.
This also feels an opportune time to open a discussion on the percentage of network rewards allocated to the community pool, specifically to increase the percentage allocated and hence empower and reward more work like Animo’s work on demonstrating AnonCreds on the cheqd network via the community pool. We have therefore opened up another Commonwealth discussion here.
We believe all of these changes will improve the sustainability and success of the cheqd ecosystem but, as always, want to hear the community’s feedback. As per the introduction, we are constantly learning here at cheqd and want to make sure we build on those learnings to achieve maximum success.
We want to open these changes up for discussion, specifically, the burn_factor which will define the proportion of network charges which will be burnt and how much will be distributed to delegators, validators and the community pool. We also want to open up a discussion to increase the proportion of rewards allocated to the community pool to further incentivise work like that being delivered by Animo.
As we launch these implementations onto the network, we are able to focus on building support for cheqd into more SDKs to allow our partners to access the network utility more easily as well as focusing on our USP: payments, which is what we’re most excited about.
Please head to the following Commonwealth discussions for each debate or our Telegram and Discord for more informal conversations:
Burn percentage discussion
We look forward to hearing from you.
Thanks, The cheqd team
The values and statements made above are indicative only and should not be construed as an offer or guarantee.
This document sets out the aims and intentions of the core cheqd team for the payment models, based on the current state of its ecosystem in November 2022. These evaluations are subject to change for technical, legal, business and other reasons. We will make our best efforts to keep the entire cheqd community informed and updated with changes to this distribution strategy.
cheqd Governance
Integral to cheqd is the concept of decentralised Governance, explained in full detail in our Governance Framework. This is important because the content of the cheqd tokenomics and this distribution document are subject to change if the governance mechanism opts to make Major Network Changes. Such governance decisions are outside of the direct control of the core team. As such, changes may affect (among other things) the token ($CHEQ) price , the specifics of token distribution and the network parameters.
Legal Uncertainty as a Risk Factor
There is underlying legal uncertainty in the nature of blockchain projects due to how quickly the industry is evolving and how legal regulations and frameworks need to adapt to keep up. For this reason, it is reasonably foreseeable that there will be further guidance and regulations on digital assets, cryptocurrency, Decentralised Autonomous Organisations (DAOs) and digital identity going forward. cheqd’s core team has made the best efforts to build cheqd in a generative way to develop alongside updates in the law. This notwithstanding, there is still a surface area of risk, where future or existing legal regulations could have a negative effect on the proper functioning of the project and on the value of $CHEQ.
No regulatory authority in Singapore, including the Monetary Authority of Singapore, has reviewed or approved the $CHEQ tokens or any of cheqd’s documentation, including blog posts, website material, webinars, events, videos or other graphics (the “Information Material”). The acquisition of tokens is subject to a potential acquirer’s compliance with the laws and regulations in the jurisdiction they reside in.
Acquisition as a Risk Factor
The acquisition of $CHEQ tokens carries with it significant risks. Prospective acquirers should carefully assess and take into account such risks prior to acquiring $CHEQ tokens. cheqd's initial core team and all of their collective past, present or future officers, directors, managers, employees, agents, advisors or consultants, or any other person (collectively, “cheqd”), expressly disclaims any and all responsibility for any direct or consequential loss or damage of any kind whatsoever arising directly or indirectly from: (a) reliance on any information contained in the Information Material; (b) any error, omission or inaccuracy in any such information; and (c) any action resulting therefrom. cheqd does not guarantee the accuracy of the statements made or conclusions reached in the Information Material and does not make, and expressly disclaims, all representations and warranties (whether express or implied by statute or otherwise). Past is not a reliable indicator of the future. The Information Material does not constitute advice, nor any recommendations or an offer, by cheqd or any of its affiliates and all of their collective past, present or future officers, directors, managers, employees, agents, advisors or consultants, or any other person, to any recipient of the Information Material. cheqd strongly encourages you to seek appropriate advice in respect of $CHEQ tokens and taking into account your personal circumstances, including but not limited to financial, legal, tax advice.
The Use Case as a Risk Factor
The $CHEQ token is worthless in itself and gains potential value within the cheqd ecosystem only through the protocol, its use and through continual use of Verifiable Credentials utilising cheqd payment functionality. Therefore, the success of the coin’s utility depends on multiple factors, including but not limited to, the health of the overall cryptocurrency market, the resilience of the cheqd protocol, and the success of Self-Sovereign Identity vendors in implementing real-world use cases.
$CHEQ must also be held within a wallet that can, ideally, consume Verifiable Credentials as well as $CHEQ tokens. This relies on the work of third parties to facilitate a functioning and healthy ecosystem.
In order to offer access to acquiring the $CHEQ tokens, it is essential that cheqd engages centralised or decentralised exchanges to list and facilitate the trade of tokens. The dependence on exchanges to recognise and list $CHEQ is a large risk vector. The likelihood of (specifically centralised) exchanges listing cheqd is directly correlatable to the size and activity of the cheqd community and the functional capabilities of the protocol and its governance model.
Security of Technology as a Risk Factor
Blockchains are not infallible to risk; nor is the storage of private keys for the purposes of owning $CHEQ and Verifiable Credentials. The wallet and the tokens it contains can only be accessed using the corresponding private keys. The owner of the tokens is solely responsible for keeping their private keys safe and protecting the safekeeping and protection of the private keys for the wallet against unauthorised access. While there will be safeguards put in place to help prevent such loss, the issue cannot be ruled out.
51% Proof of Stake attacks as well as rogue, malicious Governance proposals could be damaging to the proper functioning of cheqd as a protocol and as a community. It can also not be ruled out that blockchains generally, the cheqd Network, or other decentralised protocols become the target of attacks by hackers - alongside the further development of new technologies such as quantum computing.
Verifiable Credential Data Model v1.1
Learn about the W3C Recommendation for Verifiable Credentials.
Verifiable Credential Data Model v2.0
Learn about the proposed improvement to the initial VC Data Model.
Hyperledger AnonCreds
Learn about Hyperledger's approach to privacy preserving digital credentials.
ISO mDoc
Learn about the ISO standard for mDocs adopted by Google and Apple.
Undestand how the $CHEQ token operates as a utility.
Tokenomics are typically documented and distributed via a dedicated whitepaper. However, since a large proportion of the tokenomics for cheqd directly relate to governance, our tokenomics will be a constant iteration, we incorporated them into the cheqd network’s documentation here, which will also be continuously updated.
We can then continue using blogs to explain the initial and updated tokenomics in an easier to digest format.
Tokenomics are typically documented and distributed via a dedicated whitepaper. However, since a large proportion of the tokenomics for cheqd directly relate to governance and our tokenomics will be a constant iteration, we incorporated them into the cheqd network’s Governance Framework, which will also be continuously updated. We can then continue using blogs to explain the initial and updated tokenomics in an easier to digest format.
Firstly, let’s start with a brief summary for those with little time to spare. The main groups are broken into:
Community and grants: Token rewards for our incredible community, especially those who have been with us since the start and who are key to the adoption of self-sovereign identity (SSI). This also includes grants for the SSI community so they can immediately use and vote on the network.
Foundation: The treasury will be used to support cheqd’s mission as well as vote on the direction of the protocol.
Contributors: The core team and those who have supported us in executing, including our exceptional advisors.
Shareholders: Our investors, as mentioned in our announcement here, who supported us when our mission was simply to establish the payment rails and commercial models for self-sovereign identity without us knowing where this would take us. Again, a huge thank you!
Vesting: Based on our analysis, it is possible to both stake unvested tokens and receive staking rewards for those unvested tokens, helping secure the network. Circulating supply at Token Generation Event: Our distributions and calculations put the maximum circulating supply at 5.42% including treasury provided liquidity.
The token and identity communities are both absolutely critical for us and the adoption of SSI and trusted data. We have the opportunity to not just achieve success for cheqd but the paradigm as a whole — data control back to individuals.
cheqd is committed to launching the network in a regulatory compliant fashion, so any offerings will target to fit within the laws set out within each geography. The current paradigm of identity is a problem globally, and we can only work at that scale if we are not excluded from certain countries or geographies. That being said, we fully intend to reward our community for their support, both until now and in the future, as we wouldn’t be where we are without our earliest members. We hope the cheqd community will spread the paradigm far and wide, demanding companies to adopt the technology, educating friends and family, introducing the concept into their workplaces so that everyone can get back their privacy. We would remind everyone to join our Telegram and Twitter to keep an eye out for our news and surprises.
To make adoption as easy as possible for the SSI community, we provide token grants to the companies developing in this space. These grants will smooth the transition to using a token-based network and provide them with stakes, which can generate token rewards, helping to offset the cost of using the network. We are already seeing the impact of these grants on the SSI community’s ability and willingness to adopt the network, which I look forward to Tobias Halloran (Head of Partnerships) sharing in the coming weeks and months. It will also provide us with a window to establish the necessary partnerships with custodians, exchanges and OTC desks such that their end clients do not need to worry about handling tokens at all.
As with most other projects, the focus of the foundation, managing the cheqd treasury, is to maintain and accelerate the adoption of the network primarily through: further feature development, business & partnership development, and marketing. In addition to this, we will likely establish further grants and further advisor agreements where necessary. As per our governance framework, we will only be one vote of many on the network but want to be a major contributor guided by the community. Beyond the initial distribution, we expect proportionate staking rewards to flow back to the treasury to maintain a constant supply to maintain the team. Our priority here is ensuring we have sufficient treasury to support the project’s development and its team for an extended period.
As you have spotted, we have a variety of vesting periods over the groups, which naturally impact the circulating supply of tokens. In addition to vesting, block rewards will also increase that circulating supply. Naturally, it’s up to each token holder how much comes into circulation but the graph below outlines the maximum circulating supply at each stage.
As always, we would love to know your thoughts or feedback on our decisions and direction as comments on the article or via any of our other channels, take your pick! Have we missed something? If so, let us know!
Learn about how the $CHEQ token operates
The $CHEQ token at a basic level is used for three core functions:
Network decisions: cheqd is a Delegated Proof of Stake network, where individuals can vote on network decisions via a decentralised governance framework.
Identity writes: $CHEQ can be used to write Decentralised Identifiers (DIDs) and DID-Linked Resources to the network. This write also includes a percentage of tokens burnt from the network.
Credential Payments: $CHEQ can be used to pay for decrypting on-ledger resources for the purpose of a Verifier paying a Credential Issuer.
Learn about the different mechanisms of the $CHEQ token below:
Over the past months, the team has been analysing the desired behaviour of the network stakeholders as well as the available functionality provided by Cosmos to identify the levers to achieve the right incentives. Whilst there are many parameters, we will focus the analysis on the key parameters which affect the incentives on the network.
Our Network parameters are listed here:
It should be noted that these parameters can, at any point, be modified via the governance procedures.
The main function of the general parameters is to set supply, inflation and targets for bonded targets.
The Initial supply of tokens, i.e. to be minted at the Token Generation Event, is set to 1b (1 x 10^9) which we deemed adequate for the initial size of the network. Please see inflation for how this is likely to increase.
The goal for the percentage of bonded tokens (goal_bonded) is currently set to 60%. This was benchmarked against a number of projects and we feel this strikes the balance between securing the network and paying for identity transactions.
The inflationary parameters were much more impactful to network incentives based on our analysis. Implementing zero inflation would eliminate block rewards and therefore incentivise the push for maximum adoption of the network utility since rewards would entirely depend on transaction fees. Rewards would scale with transaction volume but consequently rewards would be low at low transaction volumes and also unpredictable. As a benchmark, Sovrin’s self-sovereign identity network has variable volumes month-by-month for various transaction types, and thus rewards for node operators / validators that only relied on transaction fees would make it difficult for node operators to predict fees collected from the network.
Inflation (inflation_min & inflation_max) somewhat solves this problem by introducing block rewards which are independent of transaction and hence gas fees. Assuming there is little to no downward pressure on price at low inflation, block rewards provide a largely predictable reward over sufficient time, ensuring support and securing of the network is rewarded. However, inflation dilutes the incentive for network use, i.e. scaling rewards according to transaction volume.
Consequently, inflation can be seen as a double-edged sword. It rewards maintaining the network even at low volumes, but dilutes the incentive to drive maximum adoption.
By modelling rewards against transaction volume and using a number of reference points (CIVIC, EVEREST, LUNA & UST all-time high transaction volumes) we established that inflation_max should be <4% to achieve any meaningful incentives through transaction volumes. We similarly used all-time low transaction volumes to identify inflation_min as 1% to maintain sufficient rewards at low volumes.
As with the general parameters above, we analysed existing projects (e.g. Fetch.ai, Terra & Akash) and modelled various scenarios to understand the impact of the parameters on the network.
Across these projects, the values for communitytax, baseproposerreward and bonusproposerreward appear to be set to their defaults. Our modelling suggests the reason for this is that aside from communitytax, rewards across the network are largely dictated by stake regardless of the baseproposerreward and bonusproposerreward values**.**
As a result, we similarly didn’t see a reason to change the default values.
However, as the network progresses and becomes increasingly decentralised, it may become beneficial to reduce these values. For example, looking at Osmosis, another token on Cosmos, the communityrecently lowered these values to 0. The logic behind this decision was to reduce the Node Operators with the largest stake on the network from getting richer, and to incentivise a wider breadth of stake distribution.
Tokenomics is a subset of overall network governance. It is a way of incentivising or decentivising different actions on the network through economic forces, which in turn, regulates user behaviour.
For tokenomics to have an effect on the progression of the network, there must also be ways that a User can interact with its governance. In cheqd’s Network, we use a system of collective voting, based on liquid democracy. This voting architecture has a symbiotic relationship with the tokenomics to regulate the network.
Let’s explain this simply. I want to make a materially significant change on the Network, let’s say a Parameter Change, adjusting the default parameters explained in this post. The steps necessary to reach an accepted Proposal are as follows:
I need to draft a Proposal;
I need to make a deposit alongside my Proposal to publish it on-ledger;
I need that deposit to reach a parameter known as MinDeposit;
This needs to happen before the max-deposit-period expires.
The Proposal will then reach what is known as voting stage, where:
Enough people need to vote on the proposal for it to be valid (quorum);
A minimum threshold need to vote ‘Yes’ on the Proposal;
Below a certain number of votes must veto the Proposal;
The ‘Yes’ threshold must be met before the voting period expires,
If all the stars align above, then the Proposal will be accepted and the changes will be rolled out across the Node Operators in a process known as signal and switch. The specifics of this process will be articulated and explained in greater depth and detail in our Governance Framework.
So where do tokenomics come in? Well, someone needs to set the default parameters for:
MinDeposit
MinDeposit period time limit
Quorum
Threshold
Veto
Voting period time limit
The value of these parameters has a knock-on effect on other aspects of the network. For this reason, choosing these parameters is therefore not a simple game of ‘numberwang’. We selected each value for a reason.
We did a detailed analysis of each token on Cosmos, taking the MinDeposit as a factor of the amount of tokens staked on the respective Network.
We found that the range was very large and calculated that our minimum deposit could sit proportionately as low as 360 (Cosmos’ lowest value) or as high as 36,000 (Osmosis’ highest value), given our total tokens at 1 billion and a bonded goal of 60%.
Another common theme we noticed was that projects tended to begin with a higher MinDeposit and then lower this value through a Proposal as the Network matured (Cosmos and Osmosis). This is something that we thought would be valuable to replicate as well, in line with the Principle of Entropy.
We settled on a value of 8,000 as MinDeposit. This was not only a sensible middleground given our calculations, but gives us the option to Propose to scale down the value as the network progresses and becomes more decentralised.
Max_deposit_period and voting period
For the MinDeposit time period (max_deposit_period) and voting period (voting_period) we settled on the value of 1 week. This is because this figure seems unproblematic and functional for healthy Cosmos communities. 2 weeks, which was the parameter on our testnet, was too long to wait in order to push through new updates.
For the quorum and threshold, there is a very strong relationship between the two values. Once again we have decided to stick with Cosmos’ default parameters because they work well in healthy governance communities.
These are:
33.34% quorum; and
50% threshold.
One model of Governance that we think would be a valuable addition further along our roadmap, however, is Polkadot’s system of Adaptive Quorum Biasing. In this model, the lower the quorum tends, the higher the threshold tends, and vice versa. If this feature was implemented into Cosmos SDK’s governance module, Proposals to move to this would certainly be welcomed.
Veto is possibly the most extreme example of where governance and tokenomics overlap, as a veto vote ‘burns’ the tokens invested in the Proposal which sit in an escrow called a ModuleAccount.
We believe that the 33.34% default setting for veto is both high and low enough. Veto votes should be used sparingly, only when Users think that a Proposal is contradicting a core cheqd Principle (to be released in our Governance Framework).
As we’ve mentioned briefly above, these values are very much the start and we fully expect these to be updated by the community through the processes set out in the governance framework. Our hope though is that these values set a strong foundation for a successful, self-governing ecosystem.
As we covered in the context section, these values are the Minimum Viable Tokenomics to establish the network. As the base values are updated by the community, the team will begin delivering more complex tokenomic functionality including a variety of commercial models such as transactional payments, subscriptions or volume-based discounting.
Our primary focus will be on enabling these commercial models along with stable settlement, achieved through support for stablecoins and potentially central bank digital currencies.
If you rather watch a video about our tokenomics, cheq out our webinar below.
You can also download the cheqd Tokenomics slides here.
There are plenty of terms and metrics used to measure a project’s tokenomics, often with their own methodology for measuring certain aspects of them, which can cause plenty of confusion. This is further complicated by the fact that certain terms are accidentally used interchangeably or can have a different definition or interpretation depending on the user or reader of it.
“Circulating Supply” is a great example of this.
Circulating Supply (CS) is defined by CoinGecko as: "The amount of coins that are circulating in the market and are tradeable by the public."
Below we have outlined a few different potential interpretations of Circulating Supply using different calculation methodologies:
Token distribution is done programmatically based on Cosmos' Vesting Accounts. Every vesting wallet receives their tokens at the outset but they are locked natively and automatically vest and unlock.
This explains why vested tokens are not automatically shown as Circulating Supply, since tokens are distributed in advance, they are automatically vested and unlocked, and are not moved between accounts. Here's an example to illustrate how it works.
Token holder
Receives 1 million tokens with a vesting period of 2 years into a Cosmos SDK genesis account
Can see their wallet with 1 million tokens but can't move tokens (no transfer/sell)
Tokens start vesting on a block-by-block basis (in the case of continuous vesting accounts)
Can stake or vote with their entire balance
Can only transact tokens once they are vested
We decided to distribute the tokens and automate its release as it is far more efficient, secure, and precise than the alternatives, e.g. there is no need for smart contracts which can be vulnerable, or manual distribution which is effort intensive and inefficient. We save our team precious time that can be better spent elsewhere, i.e. not spending days unlocking and transferring tokens.
Learn about the network parameters for cheqd
Variable | Current Value | Initial Genesis value (if different) | Type |
---|---|---|---|
Note: Despite the document below detailing out the payment models we are building, we are not trying to impose a single business model on everyone, we believe all ecosystems need to have their own choice in what works best for them. The tooling and patterns will be made available to the SSI community to use as they see fit, allowing for a mix of free and paid credentials.
To use an example, we see it as unlikely that the National Health Service in the UK would charge for credentials moving between their own hospitals. However, they may seek to monetise those which are used in private health.
We believe both models should be possible and will be providing the tooling on that basis.
The requirements explained below are best understood following an SSI example. We’ll briefly consider peer-to-peer verification before payments or transfers of digital assets, inc. NFTs.
Either through self-attested data or third-party attested data one user can prove their identity to another, avoiding the service support imposters which have plagued OpenSea recently or remove the need for test transfers, i.e. sending 1 token to confirm the recipient then sending the balance. This could be especially powerful in allowing DeFi protocols to meet theTravel Rule whilst maintaining individual’s privacy as far as possible.
User journey steps:
Institution 1 shares documents to KYC provider
KYC provider issues certified docs to Institution 1
User creates DeFi pool (e.g. liquidity) with defined KYC criteria / process
Institution 1 provides appropriate KYC information
Pool processes certified docs and stores encrypted references
Institution 1 supplies / trades assets as desired.
Institution 2 does not provide appropriate KYC info
Institution 2 attempts to supply / trade assets as desired but is blocked by pool
Before diving into the payment models, it is worth grounding on the principles which informed these. Whilst there are many detailed requirements they can be summarised into:
Privacy: It should not be possible to follow payments to either identify an individual or track their interactions (even pseudonymously).
Privacy: Resulting from 1, but also to ensure the network remains General Data Protection Regulation (GDPR)and other privacy regulation compliant, no personal data (even encrypted) should be written to the ledger.
Stability: Any price for a credential should be stable (against fiat) across time to avoid misaligned incentives, i.e. a verification is delayed hoping for a price increase or decrease.
Low-cost: Transfers should not incur significant costs
Arbitrage resistant: Recipients of data should not be able to avoid paying for that data if a tariff has been set
Commercially sustainable: Any commercial model(s) should enable the network to be self-sufficient without penalising ecosystems on top.
Flexible: Proprietary credential formats should not be required. Commercial models should not be dictated by the network. They should be available for those who wish to use them but not dictated by the protocol.
One model we have seen frequently is monetising any “identity” writes to the ledger, with some focusing on public DIDs and others allowing personally identifiable information onto the ledger to make charging easier, albeit by sacrificing privacy.
We see this as an unnecessary sacrifice. From our analysis, it is much better to focus on credential presentations / reads rather than writes to the ledger which the table articulates using passport issuance in the UK as an example.
The average UK household takes ~3.9 holidays per year.
Multiplying for both outbound and inbound flights (x2) and the touchpoints whilst travelling (x4: check-in, exit border, departures, entry border) equals 31.2 checks per year. This ignores non-travel uses of passports, i.e. opening bank, insurance or telecomms accounts._
Since credentials should not be written to the ledger, using passports as an example there is approximately a 1.5m factor between the DIDs written and the number of the credentials read / received. Monetising these fits the needs of the market most but also works best with the volumes.
Now to the payment model themselves.
Whilst there are numerous commercial models to come, we will focus on the two payment models which will help form the building blocks of these. These are:
Holder pays issuer; Receiver pays holder
Receiver pays issuer
Note: Whilst the diagram shows one organisation as an issuer and one as a receiver, these roles are interchangeable depending on the data being transacted and the surrounding interaction.
As can be seen from the table below, each of these models has its place facilitating business models for identity already and we expect SSI ecosystems will combine these to suit their needs.
Firstly, we will tackle “receiver pays issuer” since it is both the model which is requested most by our partners and the model which will have the greatest impact on cheqd tokenomics.
We will be stepping through the building blocks before arriving at the solution we will be building, explaining our logic as we go, covering:
Revocation registries
Stablecoins
Escrows
Line of credit
Collateral
Revocation registries, as their name suggests, are used to define whether a credential has been revoked or not once it has been issued. As usual this is best explained using an example:
As we all know, driving licences are used for much more than proving the ability of an individual to drive. They are frequently used in bars or grocery shops for buying cigarettes or alcohol, or specific to the latter, picking up packages which have been delivered there. In this scenario, there is little benefit to knowing if the driving licence has been revoked or rescinded. Your legality to drive (or not) does not have any bearing on whether you are old enough to buy cigarettes or are the right individual to pick up a package.
In contrast, your ability to rent a car is directly tied to that legality to drive, hence why rental agencies verify your licence as well as checking for any points.
Crucially, whilst revocation registries exist on-ledger, they do not identify individuals, preventing privacy leakage. This provides an ideal component for monetising credential verifications where desired.
For anyone interested in more detail, our partners at Tykn have written an excellent explanation on the requirements and workings of current revocation registries on Hyperledger Indy.
Since one of the requirements was for the price of and payments for credentials to be stable over time, this enforced the need to use a stablecoin for denomination and payment. Using any volatile token could lead to arbitrage opportunities for both verifying or paying for credentials leading to dysfunctional ecosystems. However, since the tooling will be built to be agnostic, counterparties who wish to transact in non-stables will be able to do so.
Whilst we will initially build out around a single stablecoin for speed, we expect this to be flexible in the future so any ecosystem can decide to use any stablecoin. This would also allow settlement in Central Bank Digital Currencies / GovCoins which could bring broad adoption to cheqd.
Rather than build our own stablecoin, we will leverage pre-existing solutions in the market, partly for our own speed but also, if it’s not broken, it doesn’t need fixing.
Since maintaining anonymity for individuals, minimising transaction costs and establishing an extensible pattern were key requirements, our team and advisors coalesced around an escrow pattern.
An escrow is a contractual arrangement in which a third party (the stakeholder or escrow agent) receives and disburses money or property for the primary transacting parties, with the disbursement dependent on conditions agreed to by the transacting parties. (Wikipedia)
Escrows have been used for centuries to ensure payment is only made if certain conditions are met whilst preventing either the sender or the recipient from gaming the payment. Most people experience these when buying houses with funds put into escrow with solicitors until the transfer of ownership of the house can be confirmed, at which point the funds are unlocked.
Uncoincidentally, our CEO holds patents for using escrows for Hashed Timelock Contracts for cross-blockchain payments as part of his work on Central Bank Digital Currencies on the Jasper-Ubin project with the Monetary Authority of Singapore and Bank of Canada.
This function maps extremely well to executing a payment only if a credential has been verified. Escrows also present additional benefits:
Aggregating payments reduces the number of privacy attack vectors since payments are not made individually
Aggregating payments reduces the transaction costs overall since payments are made in bulk
Extensibility, see section further on.
A line of credit (LOC) is a preset borrowing limit that can be tapped into at any time. The borrower can take money out as needed until the limit is reached, and as money is repaid, it can be borrowed again in the case of an open line of credit. (Investopedia)
Since organisations prefer to maintain their capital / cash as far as possible rather than pay transactional fees, it does not make sense for any receivers to make payments to the escrow each time a verification is performed.
Instead, we expect organisations to prefer either a fortnightly or monthly payment cycle. Since payments are incurred per verification but only settled fortnightly, monthly or on-demand, this creates the need for credit with the receiver building up debt on the escrow before settling periodically. This is analogous to liquidity provisioning in pools in that liquidity can be bonded for a given timeframe, then claimed based on that committed timeframe.
The question then becomes, where does this line of credit come from. Since we are operating in a public-permissionless system, it makes little sense for issuers to extend lines of credit to receivers. Especially since these roles are interchangeable. Which leads us to collateral.
This line of credit can be leased from the network through collateral locked to the escrows. This allows a receiver / receiver of data to maintain a line of credit up to the value of the CHEQ they hold multiplied by a factor to avoid margin calls, creating the two following scenarios:
Receiver settles debt on time: credit limit remains
Receiver does not settle on time: collateral slashed / penalised on pre-agreed terms
Over time, it is likely that the collateral will become blended to reduce volatility and hence reduce the factor required to avoid the margin calls mentioned above. MakerDAO has plenty of excellent work on this which we will be leveraging so we don’t reinvent the wheel! Initially, we are likely to use a 200% liquidation ratio to protect against volatility with the aim of reducing this as the solution matures. Similarly, we will be looking at existing implementations such as Aave to bootstrap development.
Please see more details in the Supply & Demand section below.
We are closely watching Osmosis’ superfluid staking and Persistence’s liquid staking work respectively for their ability to provide returns whilst assets are locked as collateral.
Combined Combining the components mentioned above results in the payment diagrams below. The arrows in white are the typical credential flow with those in gold showing the payment flows we will be laying on.
User journey steps:
Issuer publishes credential price and recipient wallet address (either on ledger or not)
Receiver stakes $CHEQ to Escrow contract to collateralise line of credit
Issuer issues credential to holder
Issuer updates revocation registry for the credential
Holder presents / shares credentials and commits to pay
Receiver presents which credential they want to verify to Escrow contract and commits to pay
Escrow checks CHEQ <> Stablecoin exchange rate for use to evaluate credit limit
Escrow increments debt amount with credential price
Escrow retrieves revocation result from the Revocation registry
Escrow returns revocation result to Receiver
Receiver pays Issuer in stablecoin
Receiver presents proof of payment to the Escrow
Escrow checks proof of payment
Escrow clears down the debt
Cycle repeats
Extensibility As mentioned when explaining escrows, one of their benefits is extensibility, specifically for commercial models. The payment flow above represents a building block for these with the escrow the key piece of the puzzle to move from “receiver pays issuer” to much more complex commercial models such as subscriptions, volume-based discounting or cost mutualisation.
To achieve these, the escrow moves from facilitating payments between two organisations in a relatively dumb manner, e.g. debt is built up by receiver to an issuer and periodically settled, to adjusting the debt increment depending on a pre-agreed schedule, e.g. an issuer provides discounts to any receiver who verifies more than 10k credentials in a given month, or a consortium nets off their debts to each other before settlement to reduce the amounts being transferred unnecessarily.
We see this as one of the major benefits to using escrows for this purpose.
One of the greatest opportunities with these payment rails is rewarding the individual (holder) for the data they share, whether that data has come from an issuing organisation or is direct from themselves. Specifically flipping around the following quote:
If you are not paying for it, you’re not the customer; you’re the product being sold.
Since there are already models for this interaction in the current world (brave browser and the Basic Attention Token), it is easy to model this into an SSI payment flow. Furthermore, the transaction fees and price stability requirements are less restrictive since the interaction is expected to be transactional and payment will be relatively instant whether issuing or presenting / sharing credentials.
That being said, the individual or organisation may wish to pay or be paid in either stablecoin or stable & privacy token to maintain price stability but more importantly their privacy.
As per Table 2, there are frequent interactions where an individual will purchase a credential from an organisation and then be able to share it elsewhere without restriction, potentially being paid / rewarded in the previous section. Passports are an easy example, but so is classpass (subscription / voucher which allows access to multiple gyms / salons), showing the range of value these credentials can represent.
The pervasiveness of this model already will guarantee this model will see frequent use.
As CHEQ will be used as collateral for the lines of credit mentioned above, we expect this will have a significant impact across supply & demand.
The tokenomics at distribution / genesis were covered in our Tokenomics Part 2. At the time of writing this blog (28th February 2022), the total supply of CHEQs in the market is ~1.008B with an inflation rate of ~2%, with a maximum of 4% currently set.
We are currently working on APIs to feed Total Current Supply and Current Circulating Supply directly into CoinMarketCap and CoinGecko since these are not readily available in Cosmos SDK.
Since CHEQs will be used as collateral for lines of credit, across the entire network CHEQs will be locked up in proportion to the number of organisations maintaining these lines of credit and the size of the line of credit they wish to maintain.
The table below articulates the proportion of tokens which would be locked up dependent on the token price, assuming a 200% liquidation rate which would be likely when the payment models are first released.
Related to this, it is worth us re-sharing how many of these ecosystems /use-cases and hence companies (since each consortium will involve multiple companies) we are expecting to leverage the network.
Throughout this blog we have talked about the payment models being building blocks for the commercial models. Whilst the payment rails will keep the cheqd team busy enough for a while, we will then build out those customisable commercial models for DAOs, consortia and individual organisations.
Beyond this, we have ideas on how to solve reputation in a public-permissionless SSI ecosystem, i.e. ensuring incentives prevent bad actors from issuing fraudulent credentials, and counter-party risk, i.e. where poor quality or fraudulent credentials are issued, any party harmed by these can claim, potentially via insurance mechanisms.
Expect more blogs as we flesh out our ideas for tackling these.
This approach and architecture has been gestating since we founded cheqd with the last 6 months dedicated to establishing a standards-based viable network for anyone who wants to use the network regardless of payments.
We have now turned our focus to building the payment and commercial models for SSI as we originally set out to do. There is much more work to be done but we wanted to share our approach so that anyone who is interested in our mission and interested in collaborating can begin doing so.
Understand how $CHEQ is used for payments for verifiable credentials
One of the most repeated bits of feedback that we've had, throughout our survey results and community engagement, is that: more easy explanation and examples on how cheqd can be used in practice would better help people understand the project.
These subpages will try and lay out simple use cases where cheqd will be able to create new commercial models.
There has been a consistent cold start problem for digital credential ecosystems where organisations do not see a clear commercial model or revenue opportunity to justify the switch up costs to credential-based technologies. This is because the perceived value in Verifiable Credentials is the costs saved when there is a significant amount in circulation (the chicken🐔), but this cannot occur without organisations issuing credentials in the first place (the egg🥚).
Unfortunately, the benefits of credentials, prior to the point of mass adoption, provide no compelling reason for businesses to change their current data collection and retention practices until this is the case.
Since launching cheqd, our hypothesis has been that Credential Payments will be the catalyst for credential adoption, by incentivising issuers to release data back to the holder, and allowing them to set a price for trusted data checks. This thinking has since been validated by data collected by cheqd’s partners and potential customers, where 70% of respondents believed that payment rails would help drive adoption with their customers.
We now believe that credential ecosystems are technically mature enough to scale, especially with new regulations like eIDAS 2.0 accelerating their adoption and providing a template for interoperability. Yet, there is a barrier between the theoretical and philosophical benefits of Verifiable Credentials, and the commercial and business benefits of Verifiable Credentials. A payments or incentive layer is still required to provide a compelling reason for enterprise organisations to make the switch.
To achieve this shift, we’ve built Credential Payments into our cheqd Studio product to allow organisations to build trusted data markets easily, with simple REST APIs. This abstracts the complexity and responsibility of handling interactions with the ledger and provides a clear integration pathway for developers that are not familiar with decentralised identity standards or blockchain.
Learn about the prices for writing DIDs and DLRs to cheqd
At a basic level, the CHEQ token is used to pay identity writes on the cheqd network. This functionality is made available through custom modules built by cheqd for DIDs and DID-Linked Resources.
As cheqd is integrated into more Software Development Kits, it will become easier for cheqd's partners to write identity transactions to the network.
Note: the prices listed below are subject to change, as they are parameters controlled by community governance mechanisms.
The below link is the canonical place for the updated identity write pricing.
This is Jane Doe
Jane Doe has recently completed her university degree at Bright University. She wants to receive a digital, verifiable and certifiable copy of her diploma to apply for a prospective job.
In order for this to happen, first Bright University needs to register their Decentralised Identifier (DID) to a Verifiable Data Registry or ledger. In this case, Bright University anchor their DID to cheqd, using the cheqd DID method.
The specific Public DID is registered as did:cheqd:mainnet:923u592u5ghgu3r8
Bright University also anchors an adjacent DID Document which contains information about Bright University such as:
This is the DID of Bright University
This is the endpoint for Bright University's help/contact address
These are the list of public keys that Bright University might sign with for Verifiable Credentials for University Degrees.
Jane has completed her degree and she has successfully achieved a First Class Honours. Now, she wants to receive a digital copy of the diploma to be able to hold it in her digital identity wallet.
On the physical certificate there is a QR code which Jane scans. This creates a peer-to-peer encrypted channel between the University and Jane's phone, which has her digital identity wallet.
Bright University issues a Verifiable Credential to Jane through this peer-to-peer encrypted channel. The Verifiable Credential has the following claims:
This is Jane Doe's diploma
Jane Doe graduated from Bright University in the year 2022
Jane Doe achieved a First Class Honours in her MSC degree in Computer Science.
The Verifiable Credential has a proof, meaning it is digitally signed by the Public DID of Bright University, as well as potentially cryptographic material referring to a specific public key, which may be used for a particular purpose (such as asserting claims).
To learn more about Verifiable Credentials, please see the page:
In return for a very high value University Credential, that provides Jane a verifiable record of her diploma, and is an optional addition to Jane's physical diploma, Jane is required to pay the University $10.00 USD.
Jane is required to pay this $10.00 in $CHEQ (or a stablecoin that she holds), before she is able to receive the Verifiable Credential. In the background the price of $CHEQ is equated to $10.00 USD, and is transferred to Bright University's wallet address.
Jane receives the Verifiable Credential to her digital identity wallet once the payment has been successfully completed. This entire data flow takes place off-ledger. This is important because it keeps all of Jane's personal information private, and only with her.
Jane now holds a Verifiable Credential of her University degree in her digital identity wallet and is able to use this to prove claims about herself.
Jane applies online for a new job as a Lead Engineer at a leading technology company.
The technology company asks for Jane to upload her education records. Rather than filling out the form manually; Jane scans another QR code to create a peer-to-peer encrypted channel with the technology company. Jane sends a Verifiable Presentation containing her claims and the attached proof to those claims, in a few clicks or taps.
The technology company is able to verify the validity of the claims that Jane presents, by resolving the DID embedded in the Presentation. Through resolving the DID, the technology company is able to see the DID Document and the information contained. Automatically, the technology company is able to ascertain that the proof inside Jane's Verifiable Presentation was issued by the real Bright University and is for the correct purpose.
The technology company is now satisfied and progresses Jane to the next phase of the application.
John Smith is a gamer who has built a substantial in-game profile for game developer's, Digiplay, latest metaverse game. John wants to receive a verifiable copy of his in game assets, which he can hold ownership of, unilaterally, in his digital data wallet, in order to port these assets over to a new game made by MetaZap.
In order for this to happen, first DigiPlay needs to register their Decentralised Identifier (DID) to a Verifiable Data Registry or ledger. In this case, DigiPlay anchors their DID to cheqd mainnet, using the cheqd DID method.
The specific Public DID is registered as did:cheqd:mainnet:6nhj3p3yf8f83g14
DigiPlay also anchors an adjacent DID Document which contains information about the game developer, such as:
This is the official game developer DigiPlay
This is the endpoint for DigiPlay's help/contact address
These are the list of public keys that DigiPlay might sign with for Verifiable Credentials for different game accomplishments and in-game assets.
John has put a significant amount of hours into DigiPlay's title, but does not want to lose the progress he's made, as the game becomes obsolete and older. He wants to be able to port his progress into another, technically compatible title, in order to continue progressing from a relative position. He also has unlocked unique and rare skins, cosmetics and in-game assets which he wants to be able to use in future games.
Therefore, he scans a QR code provided by DigiPlay on their in-game main menu which creates a pairwise, peer-to-peer encrypted channel between John and DigiPlay. Through this channel, DigiPlay issues John a Verifiable Credential, or series of Verifiable Credentials, with various in game information such as:
This is John Smith's gamertag: JohnSmith99
John has reached rank 55 in our title
John has received the following achievements on his profile:
Achievement A
Achievement B
Achievement C
John has unilateral ownership of rare and unique items in this game:
NFT Blue Leopard skin for GG-B67
NFT Navy-blue 49145 player skin
NFT 8676 Custom stock
In this instance, the Verifiable Credential gives John a way to prove that he owns these items, easily, and he is able to showcase his profile and in-game assets in compatible wallets and third-party games.
Since without a Verifiable Credential, John will lose these in-game assets he has earnt, he is happy to pay a $15,00 one-time fee to get a verifiable digital copy of his assets in order to hold them unilaterally in a digital wallet, data vault or secure enclave on his PC, games console, or mobile phone.
Before John is able to receive the Verifiable Credential, in the background the price of $CHEQ is equated to $15.00 USD, and is transferred to DigiPlay's wallet address.
John receives the Verifiable Credential once the payment has been successfully completed.
John now holds a Verifiable Credential of his in-game profile in his digital data wallet on his desired console, mobile or computer, and is able to use this to prove attributes about himself.
John now wants to start a new game with a brand new metaverse title, made by game's company MetaZap.
John wants to port his in game assets, skins and prestige to MetaZap to build verifiable status in his player profile and allow him to use his unique items.
When John starts up MetaZap, the initial loading menu asks John whether he wants to port over any existing assets. John scans another QR code to create a peer-to-peer encrypted channel with MetaZap. John sends a Verifiable Presentation containing his relevant data and claims with the attached proof to those claims.
MetaZap is able to verify the validity of the claims that John presents, by resolving the DID embedded in the Presentation. Through resolving the DID, MetaZap is able to see the DID Document and the information contained from DigiPlay. Automatically, it is able to ascertain that the proof inside John's Verifiable Presentation was issued by the real DigiPlay and starts downloading John's assets into his MetaZap account.
Governance is not an easy concept to understand. This is because it is something which cannot be easily visualised and lacks a common definition.
If I said to you, what is an apple? You might respond by saying that it is a small round fruit which is commonly red, but can be green or even yellow. If I asked 10 people the same question, I would get a pretty similar answer. Apples are easy, they exist in the physical world and we come across them on a daily basis.
Now, if I asked the same 10 people: what is governance? Someone might say governance is about how the country is run. Someone else might say that governance is about law and order. None of them will provide a correct or incorrect answer, they will provide an answer based on what their conception of governance is.
Governance can come in many shapes and sizes. You can govern something as large as a country, or something smaller such as a school, or something intangible like a social media platform… or a blockchain.
Governance is a challenging concept. It relates to setting rules and standards that people abide by and follow. Most models of governance rely on a hierarchical structure, where a sovereign authority regulates from a top-down perspective. For example, a national government is responsible for setting laws and enforcing them on the public. This makes sense because, without a level of prescribed governance to keep the public in check, order would descend into anarchy.
At cheqd, we like to think about Governance as constituting 4 parts:
Now, let’s break these down simply.
The law is something we are all familiar with. It’s a set of rules imposed on us, usually by a government or sovereign entity in a particular, defined jurisdiction. Non-compliance with law often results in a punishment of some sort.
Importantly, however, laws are rules that you have a choice whether to follow. You can choose to break the law if you want to, if for example you feel a law is morally unjust, however there will be consequences for your actions. Laws act to deter people from breaking them. In this sense, they are guidelines that are enforced by punishment.
Principles and social norms are a fun specimen. They play on human behavioural psychology. The crux of governing through principles and social norms is that if you get enough people to do something, or believe something, the community will innately enforce that thing.
For example, it is not illegal to sing the entire musical of Les Miserables to yourself, rather loudly on the London Underground. In fact, it might make the London Underground a much more cheery place, were carriages to normalise singing. However, there is a social stigma against loud singing on the London underground. As a matter of principle and to enforce this principle, you will not be thrown into a jail cell, but you will receive a lot of cutting stares, disgruntled faces, and maybe someone whispering and gesturing for you to keep it down. Or for particularly awful singing, a tut.
The point is here, that people impose principles that are unwritten, because they follow the general herd mentality of a normalised society, from the perspective of that society.
Most things humans touch or have created in the world have a fiscal element. Or at least, you could probably make a strong argument that is the case. For this reason, when it comes to governance, there is generally a financial angle.
In this way, regulating markets and the price of something has a large amount of sway on whether something will be willingly followed. Tokenomics largely implement this for decentralised networks.
Like law, architecture is something that sets the boundaries of what people can and cannot do. In the physical world for example, a locked door in a University signals that students cannot enter. The difference between law and architecture is that people do not have much of a choice to circumvent the architecture regulation. In this case, a student could purchase the tools to break through the locked door, but it would require a high degree of effort and force.
In digital domains, architecture becomes a much more powerful method of governance, as rules, boundaries and punishments can be coded into protocols themselves to deter or incentivise people. These architectural boundaries can be so strong that it can make it near impossible to avoid them. For example if you find a locked door in a video game, unlike in the physical world where it might be possible to break through it, in the digital world there may be no possible method of going through, and the door acts as a permanent and unbreakable barrier.
Governance is a multifaceted concept, encapsulating each of the four parts, discussed above. It is a way of regulating behaviour and ensuring order in a given system.
All four of these parts weigh into one another, and different weightings can be applied to different Governance Frameworks.
For example, Governance set by governments relies largely on Law & Guidelines, to uphold order and less on Architecture.
This can be represented via the diagram below, which shows how government uses different quantities of the modalities to govern.
Whereas, the regulation of a Social Media Network relies much more on Principles & Social Norms and less on Markets & Economy.
This is represented in the diagram below.
In this sense, Governance is something flexible, which can be adapted for different use cases, based on a combination of factors such as, among other things:
Whether there is a clear jurisdiction;
Whether the system is in the physical or digital world;
Whether there is a currency.
"Governance is a way of regulating behaviour and ensuring order in a given system. We think of it as a melting pot with Principles, Laws, Economics and System Design as the ingredients."
"Decentralised governance is the concept that no single person, organisation or entity will be able to unilaterally make decisions or changes that affect the Network. Instead, the direction of change is decided by the democratic votes of an ever-growing, diverse collective."
This is made possible because of the architecture of the Network, which enables the Network to become self-regulating and autonomous over time.
This is how the cheqd Network governance will look to begin:
Over-time the Network may vote to raise or lower these sliders, in accordance with group consensus.
One thing that will stand out looking at this chart is the lack of Law governing the Network.
In this way, the decentralised Network acts as its own Legislature, Executive and Judiciary, as decentralised consensus checks and balances each stage in the passing of a proposal.
A decentralised Network where accountability is spread out as such is often referred to as being sufficiently decentralised.
The cheqd Governance Framework embodies the following General Governance principles. These General Principles SHOULD be used as checks and balances against new Proposals on the Network.
Updates, amendments or revisions to this Principles list can be made through the process explained in the Section .
cheqd SHOULD enable digital identity data for an entity to be represented, exchanged, secured, protected, and verified in an interoperable way, across multiple decentralised identity Networks, using open, public, and royalty-free Standards, such as the Standards for Decentralised Identifiers (DIDs) and Verifiable Credentials (VCs) defined by the World Wide Web Consortium (W3C).
cheqd SHOULD enable applications to build on top of the Network, maximising usability and accessibility, in order to create additional value and utility for other members of the industry.
cheqd can be defined as a Layer 1 component of the Trust over IP stack, and SHOULD act as a module for other Layers in the stack to plug-into, from a technical and governance perspective.
cheqd Network and Community SHOULD enable Network Users to easily access and verify information necessary to understand the incentives, rules, policies, and algorithms under which Node Operators and other participants of the Network operate.
cheqd SHOULD therefore, open source its work to the entire community.
cheqd Network and Treasury SHOULD uphold the highest levels of integrity in the running of the Network, ensuring decisions and proposals are made in a public domain, without coercion, in the collective best interests of the cheqd Community.
Network Users SHOULD control their own identifiers and encryption keys, and be able to employ end-to-end encryption for all interactions.
Network Participants SHOULD always have a right to vote on the cheqd Network and have full control of their choice of vote.
cheqd Network code and updates SHALL provide appropriate, measurable security of the data, including protection against unauthorized or unlawful processing, accidental loss, destruction, or damage, using significant technical and organizational measures.
cheqd Network SHOULD make publicly available their network health monitoring, data and analytics tooling.
cheqd Network Users SHALL NOT enable personal data, as defined in the GDPR, to be written to the Network, in either a plain text proposal, memo, DID Document or a software update.
cheqd Network SHALL ensure any data uploaded to the Network is anonymous and uncorrelateable.
A User’s right to be forgotten (i.e. the right for their personally identifiable information to be erased or put beyond use) SHALL be promptly honored wherever applicable.
Network Users SHOULD notify the other Users of the Network as soon as practically possible if there is a security breach, data breach or else if a Regulator has made an inquiry into the Network’s operations.
cheqd SHOULD always strive to be environmentally sustainable, given the imminent threat of climate change and the important role that technology can play in mitigating this threat.
For example, this MAY be achieved through a Carbon Tax on the Network. A Carbon Tax is a nominally small fee that is charged for the use of the Network, which can be put aside into a Community Pool, and donated for the betterment of the environment.
cheqd Users SHALL NOT exclude or discriminate against any other User within its governance scope, on the basis of age, body size, visible or invisible disability, incapacity, ethnicity, sex characteristics, gender identity and expression, level of experience, education, socio-economic status, nationality, country of origin, heritage, personal appearance, race, caste, color, religion, or sexual identity and orientation.
cheqd Users SHOULD always seek to use inclusive and neutral language to best reflect the interests of a diverse, multidisciplinary and multicultural Network.
The cheqd Network SHALL NOT allow any use of the Network that results in technical or regulatory privacy infraction, such as surveillance, personal tracking, and abuse.
cheqd Network SHOULD use the tools available to it, such as the veto power to ensure that the network is not used as a Layer 1 for Layer 2 and 3 applications that compromises Privacy.
cheqd's unique superpower for monetising credential issuance
Verifier pays Issuer is a Credential Payment flow that enables "issuers" to charge a premium fee to validate the legitimacy of the credential's status. This is an incredibly powerful tool for companies that want to issue Verifiable Credentials, but also want to put a sensible commercial model in place.
This is Jane Doe
Jane Doe has recently completed her university degree at Bright University. She wants to receive a digital, verifiable and certifiable copy of her diploma to apply for a prospective job.
In order for this to happen, first Bright University needs to register their to a or ledger. In this case, Bright University anchor their DID to cheqd, using the cheqd DID method.
Bright University, however, want to make sure that they also receive a payment when Jane uses her digital diploma for other purposes. As such, Bright University create a "Premium" credential with a $20.00 fee to fully validate.
Bright University anchor their DID to cheqd, and create a "chargeable" $20.00 DID-Linked Resource to allow relying parties to Pay to Trust the credential's status and also the governance framework under which the university operates.
The specific Public DID is registered as did:cheqd:mainnet:923u592u5ghgu3r8
and the DID-Linked Resouce is available via did:cheqd:mainnet:923u592u5ghgu3r8/resources/5c2529b0-656d-4244-8e55-906d124df523
.
Bright University specify that $20.00 must be paid to Bright University to access the status information regarding the credential they will issue to Jane.
Jane has completed her degree and she has successfully achieved a First Class Honours. Now, she wants to receive a digital copy of the diploma to be able to hold it in her digital identity wallet.
On the physical certificate there is a QR code which Jane scans. This creates a peer-to-peer encrypted channel between the University and Jane's phone, which has her digital identity wallet.
This is Jane Doe's diploma
Jane Doe graduated from Bright University in the year 2022
Jane Doe achieved a First Class Honours in her MSC degree in Computer Science.
$20.00 ($CHEQ or stablecoin) must be paid to Bright University to validate and verify the status pof the credential.
The Verifiable Credential has a proof, meaning it is digitally signed by the Public DID of Bright University, as well as potentially cryptographic material referring to a specific public key, which may be used for a particular purpose (such as asserting claims).
Jane now holds a Verifiable Credential of her University degree in her digital identity wallet and is able to use this to prove claims about herself.
Jane applies online for a new job as a Lead Engineer at a leading technology company.
The technology company is only able to verify the validity of the claims that Jane presents by resolving the DID embedded in the Presentation and by paying $20.00 to Bright University to verify the Credential's legitimacy, status and validity.
Through paying to verify the credential, the technology company is able to see the DID Document and also the Credential status information stored as a DID-Linked Resource. Automatically, the technology company is able to ascertain that the proof inside Jane's Verifiable Presentation was issued by the real Bright University and is for the correct purpose.
The technology company is now satisfied and progresses Jane to the next phase of the application.
On the other side, Bright University make $20.00, which they can later withdraw into fiat currency. This creates a trusted relationship between the "Verifier" (technology company) and the "Issuer" (Bright University) whereby a fair payment can be made for cryptographically verifiable data that makes the technology companies recruitment process much easier.
Introduction to the cheqd Governance Framework
Governance Frameworks are generally perceived as largely inaccessible documents, for various reasons:
People do not understand what governance is, or why it is important;
The documentation is generally convoluted and difficult to find;
They are too formal and written in abrasive, legal language;
They do not educate the reader about the concepts they are governing.
At cheqd, we want our Governance Framework to be something that is easy to read, understand and use in practice. We want this document to be clearly understood by a diverse and multidisciplinary audience and collective, spanning across the world.
We are committed to writing our documentation in simple language, using easy examples to explain difficult concepts, and designing a Governance Framework which is open and easy to change.
This is the most important part of any Governance Framework...
Core to our Governance Framework, above all, is first, common understanding and common acknowledgement of how a system is run, and secondly, clear, accessible and democratic ways to influence decisions and the direction of change. This can only be achieved through clear communication, transparency and inclusivity.
Through this Governance Framework, WE want to help YOU as a Network User, Node Operator or cheqd Community Member understand and familiarise yourselves with the following:
What Governance (and decentralised governance) is;
What cheqd’s mission is, and how our Network functions;
How you can impact Network Governance, either in off-chain forums, or through on-chain Proposals;
How the cheqd Network rewards participants through transaction fees and rewards;
What Principles YOU SHOULD uphold while using the cheqd Network;
How cheqd has built its Network to become more decentralised over time, as Low Entropy tends towards High Entropy.
In return, we kindly ask that YOU, while using the cheqd Network:
Demonstrate empathy and kindness toward other people;
Act with openness and respect to Users of differing opinions, viewpoints, and experiences;
Give and gracefully accept constructive feedback;
Accept responsibility for your mistakes, and are open to apologizing to those affected by our mistakes;
Focus on what is best not just for YOU and your desired outcomes on the Network, but make decisions with the entire cheqd community in mind.
We also ask that YOU follow the provisions of our Code of Conduct to ensure the best experience for others in the community.
Let’s make cheqd a success together, and payment rails for trusted digital data a global standard: improving trust and efficiency in every industry.
This section is a set of Foundational Principles which are core to the Network. They set a baseline of Principles which the General Principles sit underneath in terms of hierarchy.
The Foundational Principles SHOULD NOT need to change throughout the lifecycle of the Network. They are designed to be flexible enough to underpin the Network as it progresses.
Updates, amendments or revisions to this Principles list can be made through the process explained in the Section .
A Principles based Governance model is toothless unless there is a Principle explaining how to properly follow and interpret the Principles.
Given the genesis structure of the Network, a lot of power to govern the Network is vested in the architecture, and decentralised consensus from the Users of the Network.
For this reason, the Principle Principle holds that Network Users should follow these Principles.
This Principle SHOULD be upheld in the following way:
If there is a clear contradiction between a Principle listed in this Governance Framework and a Proposal made to the Network, that Proposal SHOULD be either:
Rejected, meaning that it will not reach voting stage, but the creator of the Proposal will be refunded its tokens;
Vetoed, meaning that it will not reach the voting stage and the deposited tokens for the Proposal are burnt.
Naturally, it will be at the discretion of the voter whether to reject or veto the Proposal. The User SHOULD use their reasonable judgement to make this decision, based on the degree of harm the hypothetical Proposal could do to the Network.
Throughout this Governance Framework, it will be made clear where the veto should be used, to maintain the security and safety of Network Users.
With respect to the Principle Principle, it is also crucial to balance the right to freedom of expression with the other Principles set forth in this document.
We do not want Users to feel hesitant to make genuine, well-intentioned Proposals, for fear of having their Proposal vetoed. We want Users to feel that their voice can be heard without being shut down and penalised. And we want to instill a culture of inclusivity and open-discussion.
The Balancing Principle adds on to the Principle Principle. If there is a Proposal to amend, add or remove a Principle which is well-reasoned and well-intentioned, such Proposal SHOULD NOT be vetoed.
Voters SHOULD make a judgement call, based on their own morals and perceptions whether such a Proposal is genuinely well-intentioned; or whether it is created to antagonise, discriminate or cause harm to a set of persons or Users.
Of course, if there is a strong personal sense that a Proposal constitutes the latter, then a veto vote will be the best course of action.
We cannot set or regulate these boundaries, and we will not be able to intervene here, but we want the Network to govern this delicate grey area itself, minimising toxicity and maximising inclusion.
We want the Network to keep itself in-check.
What does this look like?
Entropy is the transition from a centralised Network, where very few people make decisions that change the course and direction of the Network, to a fully decentralised Network, where a large, diverse collective reach consensus on the course and direction of the Network.
At the genesis of the Network, there will be a set of default parameters and decisions made by a select few. Therefore, this state has very Low Entropy because there is purposefully curated form, structure and order.
As more node operators join the Network, as more decisions are made, and as the capability to make a decision on the Network is spread across more and more Users, Entropy increases. This is because the initial structure, form and order is gradually dissipated.
This Principle therefore holds that decisions made on the Network SHOULD be taken with a view to increase Entropy and to make the system more decentralised.
This Principle SHOULD be self-fulfilling in the sense that any Network Proposals made after genesis will most likely increase Entropy.
There will likely become a point where Entropy has reached the point of sufficient decentralisation and that its increase may plateau slightly for technological reasons. The Network SHOULD maintain this high Entropy state.
The Principles listed in this Framework are designed to provide a functional reference point, and act as checks and balances, for cheqd community members and Network Users voting on the Network.
These Principles are specifically designed to govern and ‘on-chain’ governance activities. They should serve as the foundation and baseline for the Network to build upon as it iterates and becomes increasingly decentralised.
Regulating through Principles-based Governance, as explained in , means that these are not hard rules. There is no single entity that can impose a punishment for failure to comply with these Principles. Instead these are suggestions to nudge Users on the Network to act within the best interests of the community, to be inclusive and to keep the Network secure. The Principles can be interpreted broadly, or narrowly, this is up to the discretion of the User and the community.
If the general consensus of the Network believes a Network Proposal is contrary to a Principle, they SHOULD feel inclined to reject or veto such as Proposal. This SHOULD keep the Network in check and within a set of boundaries to keep it developing in a healthy way. A decision by Network consensus MAY also incur a financial penalty on the User acting contrary to a Principle. In this way, the Network regulates behaviour through Principles as well as Economics using the Network's Architecture.
This type of Regulation, through norms and Principles is also flexible and can change quickly, as society and the Network develops. This is Unlike Laws and Guidelines which are far more static.
Updates, amendments or revisions to this Principles list can be made through the process explained in the section .
Familiarise yourself with our set of principles for interacting with the network.
The principle concept of decentralised governance is that no single person, entity or organisation can control the direction of change in a public Network. Instead, the direction of change is agreed by the democratic votes of an ever-growing, diverse collective.
This point is desirable to reach, because it maximises Network security and resilience, creates an environment which is governed by a broad, diverse and multijurisdictional collective, and enables the Network to function purely as a utility, regulating itself through its own architecture.
However, this point is not something that can be reached overnight. There is a transition period between the genesis event of any decentralised Network and the point at which sufficient decentralisation may be claimed.
We want cheqd to achieve sufficient decentralisation, and to dissolve the initial control over the Network that few stakeholders may have. We want decisions to be made by the Network, and not by ourselves, the initial core team.
This is why we have created the concept of Entropy to transparently and effectively achieve sufficient decentralisation, through decentralised governance.
Entropy is broadly defined as the degree of disorder or uncertainty in a system or process of degradation or a trend to disorder, according to the . In Physics, and specifically, the Second Law of Thermodynamics, its function is best explained through a metaphor succinctly delivered by .
Let’s think of a sandcastle sitting in a desert.
The sandcastle in the desert has both order and structure, and there are very few ways to arrange the sand grains to achieve the same structure.
Nearly anything done to the sandcastle will remove some of the order and structure of the sandcastle, gradually eroding the sand away from the familiar and notable structure.
For this reason, the sandcastle can be said to have Low Entropy because it relies on order, structure and design.
Conversely, a pile of sand with roughly the same amount of sand grains as the sandcastle has immeasurably more ways of ordering the sand to look like a pile of sand. This is due to the relative disorder of the sand pile.
For this reason, the pile of sand, with many more ways to arrange it, has High Entropy.
Now imagine that the sandcastle was left in the desert all day. The winds in the desert would blow the sand around, and it would slowly disintegrate and fall to bits.
However, there is nothing fundamental in the laws of physics that says that the wind could not pick up some sand from a pile and deposit it in precisely, the exact shape of a sandcastle.
It is just extremely, extremely unlikely because there are very few ways of ordering the sand so it looks like a sandcastle.
It is overwhelmingly more likely that the wind will take the Low Entropy structure, the sandcastle, and turn it into a High Entropy structure, the sand pile.
In short, physics says that Entropy always increases.
This same pattern and natural law can be seen in the development of decentralised governance. And if modelled correctly, a decentralised Network can be created so that Entropy always increases, gradually making the Network more and more decentralised.
The increasing of Entropy is one of cheqd’s foundational Principles, and we believe we can use it as a tool to achieve sufficient decentralisation efficiently and with transparency.
Like a perfectly formed sandcastle with Low Entropy, any decentralised ecosystem must begin with a structure, set of rules, parameters and default settings which govern the scope, boundaries and objectives of the Network — usually set by a small group of individuals.
For this reason every decentralised Network begins with a Low Entropy genesis event from which point Entropy increases.
This can be thought of like a Big Bang, starting a new system with a set of fundamental rules and boundaries.
Interestingly, the next block, known as Block 1, wasn’t mined until six days after the Genesis Block. This is considered as a very strange occurrence for the protocol, since the general time gap between blocks is intended to be ~10 minutes.
Many have questioned why Satoshi Nakamoto, the infamous pseudonymous creator of Bitcoin, caused the delay. The most likely theory is that Nakamoto spent the first 6 days testing the protocol and its stability, before backdating the timestamp.
Others believe that Nakamoto wanted to play God and recreate the story of the world being created in six days… Just like the Big Bang, Nakamoto had to create a set of default settings and parameters for Bitcoin to develop autonomously.
The point of this elaboration, however, is to highlight that for every Network that eventually reaches a point of sufficient decentralisation and High Entropy, there is a Big Bang event, and a period of tinkering and adjustment, as Low Entropy begins to increase.
And this is where we started at cheqd.
Going forward, we want to clearly lay out how the Network will enable a smooth transition from a Low Entropy genesis event to a High Entropy, sufficiently decentralised structure.
To model Entropy, we wanted to build more visual and accessible than an algorithm or formula; something that could be easily applied to multiple blockchains and utilised by any layperson and diverse audience .
The spider diagram above, the Entropy Scorecard, shows a scale scoring from 1 - 5 which we refer to as Entropy Levels, measuring tangible decentralisation from a genesis state (and Low Entropy) to beyond the point of sufficient decentralisation (and High Entropy).
At each point on the diagram sits a different metric of measurement. It is important to note that we could have selected more, fewer or different metrics to calculate Entropy against. We chose the seven metrics listed below because they provide a very sensible, digestible foundation for a rough calculation of cheqd’s Entropy. These metrics cover each angle of the Network, from security to geography to utility to governance.
We will walk through our reasoning behind each choice:
This is the number of Node Operators on the Network. This is significant because the composition of Node Operators on the Network has a direct relationship with the dilution of voting power. The greater the number of Node Operators, the:
Greater choice the token holders have in who to bond and delegate tokens to for the purpose of Network Governance.
Greater the strength of security on the Network, with fewer points of failure.
This is the number of commits made on the source code after launch via cheqd’s open source repositories. Ideally, we would also be able to measure the amount of commits made by developers outside the core team of cheqd. Commits from developers outside cheqd add healthy randomness to the code and the development of the Network.
This is the number of bonded token holders, meaning the Network Users who have bound a portion of their tokens to a Node Operator in order to participate in Governance.
This is important because the larger the pool of Participants, the more the voting power will become diluted across the Network, since Participants are able to vote unilaterally, regardless of the Node Operator they are bonded to.
Taken from previous work done on blockchain decentralisation, this is the minimum number of Entities in the Network that can pool together to reach 51% stake on the Network. The higher the number here, the more the Network is secure against malicious attacks and undesirable breaking changes.
Exchanges are closely correlated with the accessibility of the token. Being able to buy and sell CHEQ on an exchange will open the token up to a larger range of Users. A higher number of exchanges will lead to a healthier split of stake, with hypothetically, lower volume across each exchange.
The geographical makeup of the Network is important when discussing decentralisation. This is because geographic diversity lends itself to diversity of thought and perspective. Furthermore, a geographically diverse Network increases the security because even if an entire country was to shut its infrastructure down, a multijurisdictional Network would continue resolutely.
Like developer commits, Network Governance Proposals transition the Network away from its genesis state to a more random and disordered Entity. This again is very important in removing the initial control and order that the cheqd core team has implemented into the genesis state of the Network.
The Proposal and Voting process on cheqd is based on a liquid democracy. As a result, the more decisions are made through this process, the more control is taken away from a centralised collective and moved to the consensus of a wide-barrelled and diverse group of Participants.
Having laid out the distinct metrics used to constitute Entropy, it is next important to lay out the values that define each Entropy Level. These values are specific to cheqd and the levels of decentralisation we would like to eventually reach.
These values have been calculated by us looking at our end-goal, taking the point at which we feel we could be maximally or sufficiently decentralised, and scaling backwards.
The values that we have chosen are as follows:
To ‘score’ Entropy, you need to add the total sum of the Entropy Level across each metric.
For example, the highest level of decentralisation a Network could reach according to this model would be Entropy Level 5 in all metrics - totalling a score of 35. Whilst the lowest level a Network could have would be Entropy Level 1 in all metrics - totalling a score of 5.
We would also love to see other Networks applying the same scorecard model of Entropy to exhibit their Network’s level of decentralisation, and whilst slight changes may need to be made to accommodate for nuances in different Networks, the core concept can remain the same.
Over time, we do expect this initial table to be iterated, extended and revised as decentralised ecosystems in general become more mature, more distinct and as opinion from Regulators, such as the Security and Exchange Commission (SEC) becomes more clear.
In this section we want to explain where we are, where we want to get to, and why we want to get there.
Like any other blockchain Network, cheqd began its life cycle with a Low Entropy score. This is absolutely normal for the genesis of a decentralised Network, as the core team will have put in the default parameters, meaning there will be a higher locus of control, and change has not yet been made via the governance framework processes.
At launch our Entropy score was lower than 14.
A low entropy score as such, can be represented by the scorecard below:
This score quickly began to shift after launch as more participants joined from different geographies and stake began to spread more evenly. We will soon be launching a Governance Dashboard which shows where the network is on this scale.
We are aiming for high Entropy for various reasons, because it:
Correlates with higher Network security and resiliency across countries
Means broader contributions to the Network from a multidisciplinary and diverse collective
Enables increased integration capabilities with other technologies to improve the ecosystem as a whole
Increases the democratisation of wealth and dilution of rewards across a larger scope of actors
Dilutes the control from a select group of people, to a genuinely decentralised and diverse collective.
As a benchmark, we want to aim for an Entropy Score greater than 28; and with none of the scores below Entropy Level 3.
This combination is important because it will ensure that there is limited surface area for centralisation or control, as all metrics have progressed beyond a Low Entropy state.
A High Entropy Network would generate a scorecard illustrated by the example below:
At this point of High Entropy, we would hope that we would be considered a Network which is sufficiently decentralised, although of course this is not up for us to decide. Yet, we believe that this progression of Low to High Entropy is an important journey for every decentralised Network to embark on.
To increase Entropy, we have developed a governance framework that champions decentralisation as time progresses.
Achieving high Entropy involves:
Making it easy for Node Operators to onboard in an Open Source way
Having clear and transparent documentation, in multiple languages
Having simple governance processes to evolve the Network baked into the protocol
Incentivising a healthy community, with places to discuss positive and constructive ideas
Enabling all parties to be remunerated for their active contribution and participation
And a combination of the above will increase the Network Entropy in a healthy and natural way, bridging the middleground between Low and High Entropy, as seen below:
As the initial team, we have a responsibility to, as we like to put it, create the first domino and push it over. Or in other terms, we need to take care in setting a strong technical foundation alongside a culture of transparency, inclusivity and open communication to push Entropy in the right direction.
We have introduced and explained the following:
Why decentralisation is an important goal for healthy blockchain Networks;
Why Increasing Entropy is crucial to achieving this goal;
How to model Entropy to achieve greater clarity.
And looking back now, what we want the reader to take away from this is to understand the following:
Decentralised Networks and protocols often leave a lot to be desired, especially when it comes to clearly defined lines.
Through our model of Entropy, we incentivise healthy behaviour, high resiliency, and utility which should be the building blocks for any decentralised Network.
We also want this to move decentralisation towards greater regulatory clarity, rather than towards greater dissonance.
If we want to make self-sovereign identity, rooted on a decentralised Network a reality, we can only do this through being open, creative and inclusive in the way we work. Helping frame decentralised ecosystems in a way which makes sense for laypersons will bolster the chances of SSI and token payment rails being used in regulated industries worldwide.
Our friends at observatory.zone have built a dashboard to monitor cheqd's levels of decentralisation and entropy, below:
Create a much more secure, resilient and decentralised format for storing schemas than
Lay the technical foundations for supporting compatible Verifiable Credentials on cheqd, in addition to support for JSON and JSON-LD
Extend the , enabling DIDs to act as #Web3 hyperlinks for any on (or off) ledger URL, Resource, file, or content
Sub-group | % | # | Immediate liquidity % | Years vesting |
---|---|---|---|---|
Sub-group | % | # | Immediate liquidity % | Years vesting |
---|---|---|---|---|
Name | Total in circulation | Total bonded | Min deposit | Min deposit as a factor of total bonded | Inflation | Project duration |
---|---|---|---|---|---|---|
Transaction | Location | Analogous to | Frequency | Volume |
---|---|---|---|---|
Model | Example |
---|---|
This is John Smith
Financial incentives and payment generally align tightly with motivation and willingness to follow a Governance Framework. For example, fines can deter actions from being taken, whereas, gifts and earnings can bring additional momentum in accordance with the rules. is entirely built around this idea.
Architecture becomes increasingly necessary when there are no jurisdictional borders, such as on the internet, where the law can be easily evaded. For this reason, on the internet, it has been suggested by prominent writers such as , that code is law.
At cheqd, we use these four constituent parts of Governance to explain how we regulate our Network to ensure a level of order, without restrictive rules on the Network, explained below in the section: ?
Through this notion, accountability for decisions on the Network cannot be attributed to a specific person; and importantly, this means that no single Node Operator or voter on the network can be held directly accountable in the eyes of the law, in line with .
The objective of this Governance Framework is to provide a set of default settings, Principles and Policies for the Network to follow. Through compliance with this Governance Framework, will continue to increase, until the point of sufficient decentralisation is reached.
This transition from default settings, form, structure and legal accountability and relative centralisation - to sufficient decentralisation, wide-barrel consensus and accountability dilution is crucial to get right. This will be further elaborated on in the .
cheqd SHALL NOT require reliance on a centralized system to represent, control, or manage the Network’s governance. Instead, the decisions on the Network should be made by a diverse collective, in line with the , ensuring there is no single point of failure.
Bright University issues a to Jane through this peer-to-peer encrypted channel. The has the following claims:
Jane receives the to her digital identity wallet and this entire data flow takes place off-ledger. This is important because it keeps all of Jane's personal information private, and only with her.
The technology company asks for Jane to upload her education records. Rather than filling out the form manually; Jane scans another QR code to create a peer-to-peer encrypted channel with the technology company. Jane sends a containing her claims and the attached proof to those claims, in a few clicks or taps.
If you have any questions regarding the way cheqd's Governance is structured, please reach out to one of our Community leaders in the , ask a question on our , or in our cheqd forum, at:
Entropy is a new concept in this context and is explained here in our .
Even the most high profile blockchains such as began with a notorious ‘genesis block’. Also known as Block 0, the Bitcoin genesis block was the first block created on the Bitcoin ledger, and every single Bitcoin block can have its lineage and ancestry traced back to it.
At its mainnet launch, cheqd defined a set of baseline conditions and parameters for the cheqd Network, using Cosmos’ inbuilt decentralised governance capabilities and .
We would absolutely welcome suggestions and feedback from the community to further refine this list going forward. You can start a thread using our .
The model of Increasing Entropy, as one of , attempts to build greater clarity around the labelling and framing of decentralised ecosystems and DAOs. We hope the community can iterate and build on the work done here and respond with feedback and opinion. This eventually can create an even more robust framework and help make cheqd’s vision of a Web 3.0, the new paradigm for human interaction.
Community & grants
5.5%
55,000,000
10.0%
1
Foundation
29.3%
293,000,000
3.4%
5
Contributors - Team
10.2%
102,000,000
0.0%
4
Contributors - Advisors
5.0%
50,000,000
0.0%
2
Shareholders - Tranche 0
45.4%
454,345,960
9%
2
Shareholders - Tranche 1
1.3%
12,921,477
10%
1
Shareholders - Tranche 2
3.3%
32,732,563
10%
1
Total
100%
1,000,000,000
6.29%
Tranche 0
45.4%
454,345,960
9%
2
Tranche 1
1.3%
12,921,477
10%
1
Tranche 2
3.3%
32,732,563
10%
1
Total
50.0%
500,000,000
29%
2
Osmosis
164,109,266
41,585,288
500 (initially 2500)
83,171 (from 16,634 roughly)
Dynamic
3 months
KAVA
91,443,180
51,696,320
1000
51,696
20%
22 months
Starname
134,963,184
61,556,708
1000
61,557
0%
6 months
Sifchain
172,008,780
28,522,261
10
2,852,226
0%
7 months
IRIS
1,096,877,712
429,756,688
1000
429,757
4%
7 months
Cosmos Hub
278,726,583
189,421,850
64 (initially 512)
2,959,716 (369,965)
7%
30 months
cheqd
Range 361 - 36,070
1-3%
Interpretation:
CoinGecko (CG) & CoinMarketCap (CMC)
Amended CG & CMC - (our preferred approach)
Maximum potential CS plus rewards minus internal account “vested” tokens
Maximum potential circulating supply
Calculation methodology
Total supply minus
Any balances held in following accounts:
Private sale
Ecosystem / Bounty / Marketing / Operations / Airdrops
Masternodes / Staking
Team / Foundation / Treasury / Escrow
CG & CMC methodology plus
Additional purchases, and
Staking rewards minus
Tokens burnt
Maximum potential circulating supply minus
“Vested” tokens in
Foundation
Community & grants
Contributors - Team
Advisors
Number of vested tokens plus
New tokens generated by inflation minus
Vested tokens burnt (if any)
Calculation Date as at 9th Jan 2023
$CHEQ
183,875,880
225,373,025
324,134,725
521,670,980
% of total supply
17.4%
21.4%
30.7%
49.5%
Note
A private investor purchasing additional tokens off secondary markets erroneously reduces CS when it should have no impact.
This calculation fixes the issue created by the blunt approach adopted by CG and CMC.
These are all vested tokens but excluding any accounts that are internal or non-public accounts which are not expected to come onto the circulating supply in the same way as other accounts i.e. treasury, team, and advisors.
This shows the theoretical maximum circulating supply. \ \ For $CHEQ, this calculation works from the vesting schedules published in cheqd’s Tokenomics Part 2, see full breakdown below.
Calculation date: 9 Jan 2023
#
% of current total supply
CG & CMC
183,875,880
17.4%
Amended CG & CMC - (our preferred)
216,977,964
20.6%
Max potential CS plus rewards minus internal account “vested” tokens
324,134,725
30.7%
Maximum potential CS plus rewards
520,797,484
49.4%
Initial supply of $CHEQ
1,000,000,000
#, cheq
Initial inflation rate
1.00%
% decimal
Goal for bonded tokens
60%
% decimal
Maximum inflation
4.00%
% decimal
Minimum inflation
1.00%
% decimal
Maximum rate of inflation change per year
1.50%
% decimal
Blocks per year
5,256,000
6,311,520
#
Minimum deposit for governance proposal
8,000
#, cheq
Time for deposit to reach minimum deposit
604,800 (7 days)
seconds (= 1 week)
Voting period
432,000 (5 days)
604,800 (7 days)
seconds (= 5 days)
Quorum
33.34%
% decimal
Threshold
50.00%
% decimal
Veto
33.34%
% decimal
Unbonding Period
1,209,600
seconds (= 2 weeks)
Signed blocks per window
120,960
Blocks
Minimum signed blocks per window
0.5
Blocks
Slash infraction for a double sign
5.00%
% decimal
Slash infraction for down time
1.00%
% decimal
Downtime jail duration
600
seconds
Fee
0.02
token
Gas
Variable
#, cheq
Gas-prices
Variable
#, cheq
Community tax
10.00%
2.00%
%
Base Proposer Reward
1.00%
%
Bonus Proposer Reward
4.00%
%
Withdraw add enabled
TRUE
bool
Writing public DID to network
On-ledger
Refreshing SSL certificate for website
~once per year
~ <10 per organisation
Issuing Verifiable Credential
Off-ledger
Issuing Passport
~1 per decade / 5 years
>5 million per year
Reading / Verifying Credential
Off-ledger
Reading / checking passport
>30 checks per year*
>15 million per year (using figures above and to left)
Holder pays issuer; Receiver pays holder
Buy your passport from the government (holder pays issuer). E.g. UK passport has a £75.50 charge
Receiver pays issuer
Background checking company paying university for confirmation of applicant's degree. E.g. Imperial College Verification Service has a £12 charge
Tokenomics: Part 1
Learn about cheqd's genesis parameters for the network.
Tokenomics: Part 2
Learn about how $CHEQ was distributed, including vesting schedules.
Tokenomics: Part 3
Learn about how $CHEQ can be used to verify digital credentials.
Tokenomics: Part 4
Learn about the fees and burn mechanisms for identity writes.
Circulating supply explained
Learn about how cheqd's circulating supply figures are calculated.
Network parameters
Understand the technical parameters the comprise the network network and governance framework.
Tokenomics
Understand how $CHEQ works at an economic level.
Identity writes
Learn how $CHEQ can be used to create DIDs and DLRs.
Credential Payments
Undestand how $CHEQ can be used for incentivising credential adoption.
Network Parameters
Understand the technical parameters the comprise the network network and governance framework.
Verifier Pays Issuer
This is cheqd's unique superpower for monetising credential issuance, creating new commercial models for companies engaging in credential ecosystems.
Holder pays Issuer
A more simple payment flow, enabling Holders to pay Issuers directly for "purchasing" credentials from them.
Identity write pricing
Learn about the $CHEQ pricing for writing DIDs and DID-Linked Resources.
Variable | Entropy Level 1 | Entropy Level 2 | Entropy Level 3 | Entropy Level 4 | Entropy Level 5 |
Number of Node Operators (Validators) | 5 | 10 | 25 | 50 | 100 |
Number of commits from outside core team | 5 | 10 | 25 | 50 | 100 |
Number of distinct Participants with bonded tokens | 100 | 500 | 1000 | 5000 | 10,000 |
Number of stakeholders to achieve 51% of Network (Nakamoto coefficient) | 2 | 4 | 8 | 15 | 30 |
Exchanges (CEX and DEX) supported | 1 | 2 | 4 | 6 | 8 |
Country distribution of node operators | 5 | 10 | 20 | 40 | 60 |
Number of accepted Proposals after genesis | 5 | 10 | 20 | 40 | 60 |
A stake is the amount of tokens a Node Operator puts aside and dedicates to a network’s active pool to contribute to governance and earn rewards. Staking is the verb used to describe this contribution. As cheqd is a Proof of Stake (PoS) Network, rewards can be earned in direct correlation with the amount of stake a Node Operator contributes.
Token holders, ‘users’, can delegate their tokens to Node Operators in order to earn rewards and participate in governance. Once a user has delegated tokens to a Node Operator and has tokens added to the active pool, they are known as Participants.
Users can delegate to multiple Node Operators at the same time to essentially diversify their bonded token portfolio.
Bonded tokens are those present in the active pool.
Bonded tokens = staked tokens by Node Operator + delegated tokens by a user.
Users are persons who hold $CHEQ. Users are able to delegate tokens to Node Operators in order to have those tokens bonded and added to the active pool.
Once a User has delegated tokens to a Node Operator and has tokens added to the active pool, they are known as "Participants".
Participants may be eligible for a percentage of the rewards that Node Operators earn during the course of running a node. Node Operators may offer a certain commission for delegating to them. Participants earn rewards on the delegated tokens which are bonded to the Validator.
Therefore, you may want to delegate and stake your tokens for two reasons:
To participate in Network Governance;
To earn rewards proportionate to your stake in the Network.
Choosing your Node Operator or multiple Node Operators is an important decision. There are a few things you can take into consideration:
The incentive for delegating tokens to a Node Operator is that you, as a participant, can earn rewards based on the stake of the Node Operator. Each Node Operator will have a commission rate. This is the percentage of tokens that the Node Operator will take as commission for running the infrastructure — the remaining percentage is distributed to the Participants.
You should be mindful about what reputation the Node Operator has. This is because the Node Operator may use your votes against the best interest of yourself and the community. As cheqd evolves, it is likely that there will become a political spectrum of Node Operators, who will cast their vote in different directions. Some may want to create chaos on the network and vote to disrupt the established paradigms, for example. A chaotic actor may lure users to delegate to them with a favourable commission rate and use the accumulated bonded tokens against the network’s best interests. For this reason, the choice of Node Operator you delegate to is very important.
As the name would suggest, staking is not risk-free. As the word stake literally means “having something to gain or lose by having a form of ownership of something”, individuals should be wary of the risk, as we’ll come on to.
Think of it like this, if someone says to you “what’s at stake?” they are essentially asking: “what am I risking in return for the potential rewards?”
Node Operators might exhibit bad behaviour on the Network and, as a result, have their stake slashed. Slashing means taking the stake away from the Node Operator and adding it to the Community Pool.
Bad behaviour in this context usually means that the Node Operator has not signed a sufficient number of blocks as ‘pre commits’ over a certain period of time. This could be due to inactivity or potential malicious intent.
For example in June 2019, CosmosPool a former Cosmos validator experienced a server outage on their main node; downtime that resulted in its validator being temporarily jailed and its stake being slashed by 0.01%, including that of its delegators. This was what’s call a downtime slashing incident (soft slashing) whereby the validator and delegators were punished for downtime proportionally to their stake on the network. On top of this, further slashing later occurred as evidence was found of double block signing. Both CosmosPool AND the delegators’ stakes were slashed an additional 5% and the validator was permanently removed (‘tombstoned’).
Slashing can therefore certainly affect your delegated and bonded tokens, so it is important to consider your choice.
We currently have the slashing values to:
5% slashed for double signing
1% slashed for downtime (getting jailed)
These values may change over time through proposals that are voted on the network. You can read more about slashing here.
Yes, it is possible to instantly redelegate to a new Node Operator; however, you cannot ‘hop’ between Node Operators quickly. You must complete your redelegation to a Node Operator before moving again. If you want to completely withdraw and unbond your tokens, you need to be mindful that this process takes two weeks for the tokens to become available for use again. This unbonding period is an example of a parameter, which can be adjusted by the Governance Framework process.
It is important to use consistent and plain language, to ensure that there is a clear understanding of this Governance Framework.
For this reason, this Governance Framework will utilise the key words:
"MUST",
"MUST NOT",
"REQUIRED",
"SHALL",
"SHALL NOT",
"SHOULD",
"SHOULD NOT",
"RECOMMENDED",
"MAY", and
"OPTIONAL"
These terms are to be interpreted as described in RFC 2119
Generally, this Governance Framework will use non-prescriptive language, and will focus more on MAY and SHOULD, rather than SHALL and MUST.
The Governance Framework MAY also make use of the terms, conventions and patterns in the ToIP Metamodel. It is desirable to become a ToIP compliant Network.
cheqd-specific Terms SHALL be defined in the Glossary of terms, a Controlled Document of the Governance Framework.
Reference MAY also be made to:
After exploring the options available, we felt the Gravity Bridge was the most suitable and could help us achieve our results in the fastest whilst safest way possible.
One of the key things that attracted us to the Gravity Bridge is the way in which the Ethereum contract has been highly optimised, utilising batches to dramatically reduce the cost of transfers between Cosmos and Ethereum.
We also felt the decentralised running of the network was most in line with our vision at cheqd. As it’s a non-custodial solution, a stake can be slashed for any misbehaviour in accurately bridging assets or secure messages.
In addition, as a native bridge, the value of tokens on the destination chain and the absence of double spending are guaranteed by the same consensus as on the consensus chain. This means all the validators are coming to a consensus that the individual owns the tokens that are registered on both sides (the same amount of tokens has been launched on both sides of the bridge — i.e. on both chains).
Finally, we also saw the bridge as a powerful way to ensure having a token on another chain doesn’t fracture liquidity like wrapped tokens through a custodian would do.
One of the issues that was raised with the Gravity Bridge is down to the upgrade process. Given the team’s warranted focus on simplicity, it has led to the Solidity contract (gravity.sol) being non-upgradeable, whereas the other bridges can be upgraded by multi-sig wallets. This means the validators and their delegators are completely in control of the Gravity Bridge, and no one else can change the code.
Although we recognise this concern, we feel that the validators on the Gravity Bridge chain have a legitimate governance process and have acted in line with our principles to date. We also plan to set up a validator node on the Gravity chain and engage more in the governance and running of the bridge itself.
Users with bonded tokens, Participants, are able to vote on Governance Proposals. The weight of a vote is directly tied to the amount of bonded tokens delegated to Node Operators.
The specifics of how a participant can vote on Proposals, or create Proposals, is detailed further in our Governance Framework.
If the User does not want to vote on a Governance Proposal or misses it for any particular reason, the Node Operator will inherit the delegated tokens and can use them to vote with.
Node Operator voting power = initial stake + inherited delegated tokens (if participants do not vote)
Participant voting power = delegated tokens (if a participant chooses to vote)
If you are particularly interested or passionate about a specific governance proposal or do not agree with your bonded Node Operator, it is absolutely possible to vote unilaterally. However, you must still have delegated tokens, bonded with a Node Operator to do so. To do this, follow the instructions in the section Voting on cheqd.
In short, yes. Participants may be eligible for a percentage of the rewards that Node Operators earn during the course of running a node. Node Operators may offer a certain commission for bonding to them. These rewards may come in two forms:
Writes to the cheqd Network incur what is known as a transaction fee, which is calculated based on gas. Gas may be higher when there are high transaction volumes on the Network, and vice versa. Node Operators may also set their own gas prices, above which they are considered in the pool of who creates that transaction block. However, we will not get into the nuances of gas here.
Block rewards depend on inflation. Inflation is the gradual increase in the number of blocks on the Network. A Node Operator may earn block rewards during a period of inflation, which can be disseminated to the Users delegated to the Node Operator. For this reason, it is suggested that token holders bond and delegate their tokens, to create a healthy Network and earn passive income.
These rewards are distributed continuously and instantly. You are able to see your accumulated rewards on our dashboard: cheqd.omniflix.co and can always claim them back into your account.
Every User is encouraged to contribute to the cheqd Network. To make this easy, it is important to explain HOW a User can contribute, and what the best practices are for making changes.
For this reason, it is important to distinguish when a change can be made entirely off-ledger, and when a change is needed to be voted on, and made on-ledger. To do this we must differentiate between minor changes which are able to take place entirely off-ledger and major network changes which need to be formalised on-ledger.
These are changes that are insignificant, and do not affect the way the Network runs overall. Minor Network changes include, but are not limited to:
Textual edits to the Governance Framework or written general documentation;
Sensible additions to general documentation to improve clarity;
Minor code changes;
Finding, reporting and suggesting fixes to bugs;
Translating the cheqd documentation into various languages.
These are changes that have a materially significant effect on the Network. Such changes SHOULD be made via a Proposal, following the steps in the decision tree diagram below.
Major Network changes include, but are not limited to:
Materially significant Architecture Decisions (ADs), such as:
An additional feature to cheqd;
Removal of a feature of cheqd;
Parameter changes for the Network;
Community pool decisions;
Materially significant changes to a cheqd Principle;
Significant connections to other infrastructure.
See more below:
Whenever a major network change takes place on the Network, reference MUST be made to cheqd's Foundational Principles. The Principles should act as a checks and balance against major network changes.
This means, that major network changes should never oppose a Principle, unless it is acting to update or change a Principle.
You do not have to own any CHEQ to participate in our community discussion. You are free to learn about cheqd and participate in our community discussions across multiple platforms and forums.
cheqd will launch with community-spend capabilities, allowing CHEQ Participants to approve spending from the Community Pool. This documentation is in active development, so please seek feedback and take care when using this information.
The community pool value is accumulated over time.
10% of all staking rewards generated (via block rewards & transaction fees) are continually transferred to and accrue within the Community Pool.
You can always see the balance of the cheqd Community Pools on one of our Block Explorers. Our main block explorer is here:
Funds from the cheqd Community Pool may be spent via successful governance proposal.
The prevailing assumption is that funds should be spent in a way that brings value to the cheqd Network. Or alternatively, something which benefits the wider world, such as spending the Pool on Carbon offset and sustainability.
If a community-spend proposal passes successfully, the number of $CHEQ encoded in the proposal will be transferred from the community pool to the address encoded in the proposal, and this will happen immediately after the voting period ends.
Drafting and submitting a proposal is a process that takes time, attention, and involves risk. The objective of this documentation is to make this process easier by preparing participants for what to pay attention to, the information that should be considered in a proposal, and how to reduce the risk of losing deposits. Ideally, a proposal should only fail to pass because the voters:
are aware and engaged
are able to make an informed decision to vote down the proposal.
If you are considering drafting a proposal, you should review the general background on drafting and submitting a proposal:
There are five (5) components:
Title - the distinguishing name of the proposal, typically the way the that explorers list proposals
Description - the body of the proposal that further describes what is being proposed and details surrounding the proposal
Recipient - the cheqd address that will receive funding from the Community Pool
Amount - the amount of funding that the recipient will receive in nanoCHEQ ("nCHEQ")
Deposit - the amount that will be contributed to the deposit in nanoCHEQ ("nCHEQ") from the account submitting the proposal
You should use our forum for Community Spend Proposals to discuss the Proposal with the cheqd community:
In this simple example (below), a network explorer will list the governance proposal as "Community Pool Spend." When an observer selects the proposal, they'll see the description. Not all explorers will show the recipient and amount, so ensure that you verify that the description aligns with the what the governance proposal is programmed to enact. If the description says that a certain address will receive a certain number of CHEQ, it should also be programmed to do that, but it's possible that that's not the case (accidentally or otherwise).
The amount
is 1000000000ncheq
. 1 billion nano-cheq is equal to 1 CHEQ, so recipient
address cheqd1qgfdn8h6fkh0ekt4n4d2c93c5gz3cv5gce783m
will receive 1 CHEQ if this proposal is passed.
The deposit 8000000000000 ncheq
results in 8000 CHEQ being used from the proposal submitter's account. There is a minimum deposit required for a proposal to enter the voting period, and anyone may contribute to this deposit within a 7-day period. If the minimum deposit isn't reach before this time, the deposit amounts will be burned. Deposit amounts will also be burned if quorum isn't met in the vote or if the proposal is vetoed.
The world of Decentralised Finance (DeFi) can be daunting for newcomers. Documentation is littered with words, which mean very little, creating a seemingly large knowledge gap and journey to embark on in order to make informed decisions.
Begin familiarising yourself with some of the language and concepts used in this space, below:
Familiarise yourself with the core network parameters for how governance operates.
Learn ahow to use the cheqd tooling to participate in governance.
In blockchain ecosystems, the Node Operator runs what is called a node. A node can be thought of as a power pylon in the physical world, which helps to distribute electricity around a wide network of users.
Photo credit: Marcus Wong
Without these pylons, electricity would be largely centralised in one location; the pylons help to distribute power to entire wide-scale populations. And if one pylon fails, the grid is set up to circumvent this pylon and re-route the electricity to a different route.
Similarly, in blockchain infrastructure, each node runs an instance of the consensus protocol and helps to create a broad, robust network, with no single point of failure. A node failing will have little impact on the Network as a whole; however, if multiple nodes fail, or disagree with information entered into the transaction, then the block may not be signed, and there are fail-safe measures to notify the rest of the Node Operators of this.
The terms Validator and Node Operator are somewhat synonymous. Validator is the term used more commonly in the Cosmos documentation when referring to a Node Operator that is validating transactions on a blockchain. The only point worth mentioning is you can have a Node Operator that is NOT a Validator. These are known as Observer nodes, which play a more passive role on the network, as they don’t stake on the network or validate transactions, but can observe them.
The Cosmos Hub is based on Tendermint, which relies on a set of validators to secure the network. By ‘secure the network’, this refers to the way in which validators “participate in consensus by broadcasting votes which contain cryptographic signatures signed by their private key”. In English pls…
A cryptographic signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A private key is like a password — a string of letters and numbers — that allows you to access and manage your crypto funds (your mnemonic is a version of this). So, the above is saying validators can broadcast that they agree with transactions in a block, using their password to sign their agreement in a mathematical way which ensures security and privacy.
Set up your node on cheqd and configure it to become a validator node.
These are changes that are insignificant, and do not affect the way the Network runs overall. Minor Network changes include, but are not limited to:
Textual edits to the Governance Framework or written general documentation;
Sensible additions to general documentation to improve clarity;
Minor code changes;
Finding, reporting and suggesting fixes to bugs;
Translating the cheqd documentation into various languages.
To help YOU understand how to make changes on the cheqd Network, the decision tree below visualises how changes should be carried out.
One of the core components of cheqd governance is having both on-chain and off-chain voting mechanisms.
Off-chain voting should be used for Minor Network Changes as well as for more general community polling.
cheqd uses the Governance platform Commonwealth to enable off-chain votes on specific forum discussion topics.
We will point the community to off-chain votes using our Telegram and Discord to keep all of the community in the loop.
You are able to make revisions and amendments to the Wiki and source code without making a formal Proposal.
cheqd is an Open Source project which means that anyone is free to propose or make a revision, addition or amendment.
Changes can be made through two routes:
GitBook is where cheqd's Wiki lives and where YOU can make suggested changes to the written documentation.
We suggest that YOU use our GitBook if you are unfamiliar with GitHub or if you prefer visual editors to code-based editors.
We have a Wiki for:
To make a change on either Wiki, you need to use the link below to become an Open Source Editor on cheqd's GitBook:
Once you have made your account using the link above, you will be classified as a Editor on cheqd's GitBook. This will give you the ability to make edits and submit them to be reviewed by a Reviewer. Reviewers are able to merge submitted changes.
You should follow these instructions to make a edit to any cheqd GitBook content.
Make your edits in the text directly or use comments: Via the link above, you will gain permissions to to read, edit and comment directly to the text. If you are confident with your edits, you can write and amend the text directly. If you are less confident, you can leave comments in the text, which admins will review and make changes from accordingly.
Save your changes as a draft: You can save your changes as a draft and return to your draft later. If you want to remind yourself with the changes you made previously, you should click the Diff view button:
Submit your changes: Once you are happy with your changes in your draft you should click Submit. This will send your changes to one of our Reviewers to be moderated before being pushed onto the documentation. There will be a pop-up asking you to explain the changes you made. Make sure to write a clear sentence summarising your main changes to make it easier for the cheqd reviewers to go through your work.
You should keep your changes in drafts until you are happy with them.
Following this as best practice, avoids the Wiki being misused or flooded with changes from one person.
You may also use GitHub to make changes and amendments to both the source code and the written content in this documentation.
We have multiple GitHub repositories which can all be accessed here.
For instructions about making edits to GitHub repositories, we suggest you follow the instructions here.
Please use clean, concise titles for your pull requests. Assume that the person reading the pull request title is not a programmer, but instead a cheqd Network user or lay-person, and try to describe your change or fix from in plain English. We use commit squashing, so the final commit in the main branch will carry the title of the pull request, and commits from the main branch are fed into the changelog. The changelog is separated into keepachangelog.com categories, and while that spec does not prescribe how the entries ought to be named, for easier sorting, start your pull request titles using one of the verbs "Add", "Change", "Deprecate", "Remove", or "Fix" (present tense).
Example:
It is not always possible to phrase every change in such a manner, but it is desired.
The smaller the set of changes in the pull request is, the quicker it can be reviewed and merged. Splitting tasks into multiple smaller pull requests is often preferable.
Pull requests that do not pass automated checks may not be reviewed.
During the course of cheqd's lifecycle, it is likely that bugs will arise. Reporting these bugs effectively and resolving them promptly will be very important for the smooth running of the Network.
Bugs can be discussed or raised in our Telegram or Discord.
If there is common acknowledgement of the bug, next the bug SHOULD be highlighted as an issue in our forum, at:
Please use the search function to make sure that you are not submitting duplicates, and that a similar report or request has not already been resolved or rejected.
We would greatly appreciate this work from our community to ensure that cheqd reaches a diverse, multijurisdictional and multilingual spread of society.
We are currently working on a simple process for submitting translations through a GitHub branch. Please bear with us until we figure out a simple way to achieve this.
When using the cheqd network, both testnet and mainnet, you will need to hold tokens to pay for the transaction. In this guide we offer options for setting up a wallet and adding cheqd's mainnet and testnet.
To view the active Governance Proposals, click the tab "Proposals" in the top right menu.
You will be able to see all active Governance Proposals. If you click on the specific Proposal, you will be able to easily vote on it.
Select your vote and hit "Confirm"
Learn the basics about using the cheqd ecosystem tooling.
Use our different block explorers to view network transactions, delegations, governance proposals and community pool spends.
When using the cheqd network, both testnet and mainnet, you will need to hold tokens to pay for the transaction. In this guide we offer options for setting up a wallet and adding cheqd's mainnet and testnet.
Set up your node on cheqd and configure it to become a validator node.
When using the cheqd network, both testnet and mainnet, you will need to hold tokens to pay for the transaction. In this guide we offer options for setting up a wallet and adding cheqd's mainnet and testnet.
On the our staking and governance dashboard you can either click "Stake Tokens" or click the tab in the right hand corner called "Stake".
On the dashboard you can either click "Stake Tokens" or click the tab in the right hand corner called "Stake".
You will be able to see a list of all the Validators, their voting power and their associated commission rate.
Press the button "Delegate" on your desired Validating Node Operator.
Enter the amount of tokens you want to delegate.
And voila! You have now delegated to a Node Operator and staked your tokens.
An overview of Automated Market Markers & Liquidity Pools
Liquidity pools are an innovative solution within DeFi to create the mechanics of a market maker in a decentralised fashion. Although often met with confusion, they are simply clusters of tokens with pre-determined weights. A token's weight is how much its value accounts for the total value within the pool. Liquidity Pools are an exciting and equalising tool, which represent the true nature of the Decentralised Finance (DeFi) and Web3.0 movement.
This blog will offer some insight into Liquidity Pools.
Here we’ll explain what a liquidity pool is and why they are needed in decentralised finance (DeFi) but first, like many things in the Web 3.0 and DeFi space, it’s important to understand the existing world of trade finance.
Traditional exchanges, i.e. Nasdaq, London Stock Exchange, STAR, work through an order book model which records the average of the current bid and ask prices being quoted. In this model buyers and sellers come together to trade; buyers simply try to buy at the lowest price possible, and sellers try to sell for the highest price.
For a trade to be completed both parties must agree on a fair price meaning either the buyer comes up or the seller goes down. However, it’s not that simple because finding someone who wants to both buy that specific amount and for the price they are looking to sell for is unlikely.
Let’s use an example.
Photo credit: Skånska Matupplevelser
You’ve just picked 100 apples on a farm but suddenly you have to leave town and need to sell every single one of them. You have to sell them at the market price of $1 in order to have enough to pay the farm their fee. You can’t find anyone willing to pay at this price and you can’t take them with you. You’re stuck. This is where market makers come in handy.
In this example, the market maker would be an individual or company who is permanently on hand to purchase the apples at the market price of $1. When you place a market order to sell your apples, the market maker will buy them from you even if it doesn’t have a buyer lined up. Likewise, the reverse is also true; a buyer can purchase the apples even if a seller isn’t lined up.
Market makers in return earn a profit through the spread between the bid and offer price as they bear the risk of covering the apple which may drop below the market price. Without them, it would take considerably longer for buyers and sellers to be matched up, which in turn would reduce liquidity, making it more difficult to enter or exit positions (or leave town). They also track the current price of assets by changing their prices — hence they ‘make’ the market. This is the same method that Centralised Exchanges, such as Coinbase and Binance, work, however, it is not truly decentralised whilst you have a market maker acting as an intermediary to exchange.
That said, although it is valuable to buyers and sellers alike, as market makers perform this delicate balancing act, they command a disproportionate amount of power over the market and ultimately act as an intermediary… a big no in the decentralised vision.
Where traditional finance requires expensive and centralised intermediaries which have a level of power to manipulate prices, AMMs allow digital assets to be traded in a permissionless and automatic way.
This both embodies the ideals of blockchain and decentralisation generally and offers users and companies unique opportunities to trade more efficiently and cheaply whilst having total trust in the system makes it so. Before they arrived on the scene, liquidity, i.e. how easy it is for one asset to be converted into another, often fiat currency without affecting its market price, was difficult for DEXs.
AMMs offer a solution to scarce liquidity through liquidity pools; a shared pot of tokens that users can trade against. Users can create a liquidity pool and others can supply tokens to it. In return, like with traditional market makers, those that are willing to take on the risk of providing liquidity to the pool earn fees and other rewards. An explanation specific to Osmosis can be found here. At the time of writing Osmosis’ liquidity pools contain about $544 million in total value locked (TVL).
These are changes that have a materially significant effect on the Network. Such changes SHOULD be made via a Proposal, following the steps in the decision tree diagram below.
Major Network changes include, but are not limited to:
Materially significant Architecture Decisions (ADs), such as:
An additional feature to cheqd;
Removal of a feature of cheqd;
Parameter changes for the Network;
Community pool decisions;
Materially significant changes to a cheqd Principle;
Partnerships or connections to other infrastructure.
To help YOU understand how to make changes on the cheqd Network, the decision tree below visualises how changes should be carried out.
One of the most important questions in this Governance Framework is explaining how any User or Participant can make a proposal or voice their opinion on the Network.
There are two ways of doing this:
Informal ‘off-chain’ proposal
Formal ‘on-chain’ proposal’
These will be discussed in turn.
Rather than making a proposal directly to the Network, proposals SHOULD first be made off-chain.
Off-chain governance is vital for building a healthy and active governance community.
cheqd's off-chain forum is on Commonwealth:
You SHOULD gain feedback on you proposal on Commonwealth before posting any proposal to the cheqd mainnet. Off-chain proposals give the User proposing the Proposal can have more confidence that a Proposal will reach minimum deposit and be approved on-chain.
Before you make a Network Proposal, you should engage people (ideally experts) informally about your idea. You should consider:
Does it make sense?
Are there critical flaws?
Does it need to be reconsidered?
Governance proposals potentially impact many stakeholders. Introduce your idea with known members of the community before investing resources into drafting a formal proposal. Don't let negative feedback dissuade you from exploring your idea if you think that it's still important.
If you know people who are very involved with cheqd, send them a private message with a concise overview of what you think will result from your idea or proposed changes.
You could ask a simple question or present an idea on our Commonwealth, for example:
You may also want to rationalise your idea, or ask your question to the wider community, in:
Engagement is likely to be critical to the success of a proposal. The degree to which you engage with the cheqd community should be relative to the potential impact that your proposal may have on the Network.
Great! However, we still recommend that you introduce your idea with members of the community before investing resources into drafting a proposal on-ledger. At this point you should seek out and carefully consider critical feedback in order to protect yourself from confirmation bias. This is the ideal time to see a critical flaw, because submitting a flawed proposal will waste resources.
If you've considered feedback from broad perspectives and think that what you're doing is valuable and that your strategy should work, and you believe that others feel this way as well, it's likely worth drafting a proposal.
Engage the community with your draft proposal
Post a draft of your proposal as a thread in cheqd Proposal Discussion forum
Post a link to the proposal in the cheqd Discord Proposal channel
Directly engage key members of the community for feedback. These could be large contributors, those likely to be most impacted by the proposal, and entities with high stake-backing (eg. high-ranked Node Operators; large stakers).
Target members of the community in a semi-public way before bringing the draft to a full public audience.
Alert the community to the draft proposal via:
Twitter, tagging accounts such as the cheqd account
Once you have sensibly tested your Proposal and bounced your ideas around the community, you are ready to submit a Proposal on-chain.
There are two ways to submit a Proposal on chain, a technical and a non-technical way.
You are able to connect the cheqd Commonwealth forum to your Keplr wallet.
Once you have connected your Keplr wallet, you can create an On-Chain proposal directly through the interface.
You will need a minimum amount of 8000 $CHEQ in order to make a Governance Proposal using Commonwealth. This is important to reduce spam Proposals on the Network.
Currently, on Commonwealth, there is only a Text-Based Proposal and a Community-Spend Proposal option. Parameter Changes and Software Upgrade proposals must be made through the Command Line Interface, below.
If you are using the cheqd Command Line Interface, you must follow the instructions below.
Prior to sending the transaction that submits your Proposal on-chain, you must create a JSON file. This file will contain the information that will be stored on-chain as the governance Proposal. Begin by creating a new text (.txt) file to enter this information. Use these best practices as a guide for the contents of your proposal. When you're done, save the file as a .json file. See the examples that follow to help format your proposal.
Each Proposal type is unique in how the .json should be formatted:
To create a new Proposal type, you can propose a ParameterChangeProposal with a custom handler, to perform another type of state change.
Once on-chain, most people will rely upon Block Explorers to interpret this information with a Graphical User Interface (GUI).
cheqd noded is the Command-Line Interface (CLI) client that is used to send transactions and query the cheqd testnet or mainnet;
tx gov submit-proposal
and --type="Text"
indicates that the transaction is submitting a text proposal;
--from
is the account key that pays the transaction fee and deposit amount;
--gas
the maximum amount of gas you accept may be used to process the transaction:
The more content there is in the description of your proposal, the more gas your transaction will consume;
If this number isn't high enough and there isn't enough gas to process your transaction, the transaction will fail;
The transaction will only use the amount of gas needed to process the transaction.
--gas-prices
is a flat-rate incentive for a Node Operator to process your transaction:
The cheqd Network accepts zero fees, but many nodes will not transmit your transaction to the network without a minimum fee;
Many nodes use a minimum fee to disincentivize transaction spamming;
This can also be set to "auto"
--gas-adjustment
is the range of gas prices that will still enable the transaction to go through. We recommend "1.2" or "1.3"
--chain-id
is relevant chain ID, e.g., cheqd-mainnet-1
To prevent spam, Proposals must be submitted with a deposit in the coins defined in the MinDeposit param. The voting period will not start until the Proposal's deposit equals MinDeposit.
When a Proposal is submitted, it has to be accompanied by a deposit that must be strictly positive, but can be inferior to MinDeposit. The submitter doesn't need to pay for the entire deposit on their own. If a Proposal's deposit is inferior to MinDeposit, other token holders can increase the Proposal's deposit by sending a Deposit transaction.
The deposit is kept in an escrow in the governance ModuleAccount until the proposal is finalized (passed or rejected).
Once the proposal's deposit reaches MinDeposit, it enters the voting period. If a proposal's deposit does not reach MinDeposit before MaxDepositPeriod, the proposal closes and nobody can deposit on it anymore.
In this scenario, the tokens spent on the Deposit which did not reach the MinDeposit will be burnt, meaning that they will be removed from the active pool of tokens and put beyond use.
The minimum deposit for cheqd will initially be 8,000 CHEQ.
The MaxDepositPeriod will be 1 week.
When a proposal is finalized, the coins from the deposit are either refunded or burned, according to the final tally of the proposal:
If a proposal does not reach MinDeposit, the CHEQ in the governance ModuleAccount will be burnt, which means that they will be put beyond use and removed from the ecosystem.
If the proposal reaches MinDeposit and is approved or rejected but not vetoed, deposits will automatically be refunded to their respective depositor (transferred from the governance ModuleAccount).
If the proposal is approved, but the minimum quorum (33.34%) is not reached for the vote, deposits will be burned from the governance ModuleAccount.
When the proposal is vetoed by 33.34%, deposits will be burned from the governance ModuleAccount.
After posting your transaction, your command line interface will provide you with the transaction's hash, which you can query using the cheqd Block Explorer below:
There are a number of reasons why a transaction may fail. Here are two examples:
Running out of gas - The more data there is in a transaction, the more gas it will need to be processed. If you don't specify enough gas, the transaction will fail and your gas will be consumed by the network.
Incorrect denomination - You may have specified an amount in 'nanocheq' or 'microcheq' instead of 'ncheq', causing the transaction to fail.
If you encounter a problem, try to troubleshoot it first, and then ask for help. We also encourage you to propose edits to this document as the Network progresses so that it can improve for future use.
Whilst beginning our investigation into bridges, we came across varying bridging techniques available, mainly in the Cosmos ecosystem, although these remain much the same across protocols.
Although many of the wrapped tokens available require a custodian to manage this minting and burning (aka. centralised or trusted bridges), the more innovative bridges that now exist (aka. noncustodial, decentralised or trustless bridges) do this through automated methods using contracts on either side of the bridge, as we’ll come on to.
As mentioned, our initial priority with a bridge is for ease of accessing stablecoins for settling payments for trusted data that will be facilitated on the cheqd network. With this in mind, our bridging requirements at this stage are less complex than they might be in the future (for example, we aren’t necessarily in need of a fully-fledged solution that allows the bridging of smart contracts across protocols like EVMos will in time enable).
If you’re a project looking at bridging, we’d recommend you put together on bridges by Ken Timsit from Cronos (Cronos also plan to use the Gravity Bridge, launching in Q2)
Evmos is a Secondary Bridge leveraging a third party — the Connext Peer-to-Peer Bridge. Connext acts as an intermediary to provide liquidity on both sides by locking up purchased tokens and adding these
Essentially when using EVmos you don’t have an Ethereum contract (like Gravity does with Gravity.sol), but it uses the existing contracts of the tokens that exist on the other side. Therefore, given other third parties provide the liquidity, we felt this would be a greater overhead for our team compared to Gravity and more centralised.
That said, we are excited by EVMos and the great team working on this project, who look to have an exciting year ahead with four different DEXs, lending protocol, two perpetual platforms and at least three NFT collections for the NFT marketplaces.
is a peer-to-peer bridge / cross-chain swap. It uses a similar method to the Hashed Timelock Contract, a transactional agreement used on the Bitcoin network to produce conditional payments wherein the receiver or the beneficiary must acknowledge the receipt of payment before a predetermined time or a preset deadline.
Basically, when you want to transfer tokens, there is one router which will be assigned and takes the responsibility of fronting the liquidity. In exchange, they will wait to get paid after the transaction is completed on Ethereum with the same amount of tokens.
Connext’s network utilises , a lightweight protocol for generalised cross-chain transfers. Nxtp is made up of a simple contract that uses a locking pattern (mentioned above) to prepare and fulfil transactions, a network of off-chain routers that participate in pricing auctions and pass calldata between chains and a user-side SDK that finds routes and prompts on-chain transactions.
A summary of the how liquidity pools work
In order for liquidity pools to function in the way that leads to the outcomes laid out in the previous page, i.e. greater decentralisation of projects and increasing liquidity, there are a number of key aspects worth understanding:
token weighting;
pricing;
market-making functions;
LP tokens.
(much of the following is taken from the official documentation from ).
Liquidity pools are simply clusters of tokens with pre-determined weights. A token's weight is how much its value accounts for the total value within the pool.
For example, Uniswap pools involve two tokens with 50-50 weights. The total value of Asset A must remain equal to the total value of Asset B. Other token weights are possible, such as 90-10.
With fixed predetermined token weights, it is possible for AMMs to achieve deterministic pricing, i.e. outcomes are precisely determined through known relationships among states and events, without any room for random variation. As a result, tokens in LPs maintain their value relative to one another, even as the number of tokens within the pool changes. Prices adjust so that the relative value between tokens remains equal.
For example, in a pool with 50-50 weights between Asset A and Asset B, a large buy of Asset A results in fewer Asset A tokens in the pool. There are now more Asset B tokens in the pool than before. The price of Asset A increases so that the remaining Asset A tokens remain equal in value to the total number of Asset B tokens in the pool.
Consequently, the cost of each trade is based on how much it disrupts the ratio of assets within the pool. Traders prefer deep liquid pools because each order tends to involve only a small percentage of assets within the pool. In small pools, a single order can cause dramatic price swings; it is much more difficult to purchase say 1,000 ATOMs from a liquidity pool with 2,000 ATOMs than a pool with 2,000,000 ATOMs.
AMMs leverage a formula that decides how assets will be priced in the pool. Many AMMs utilise the Constant Product Market Maker model (x * y = k). This design requires that the total amount of liquidity (k) within the pool remains constant. Liquidity equals the total value of Asset A (x) multiplied by the value of Asset B (y).
Other market-making functions also exist, you can find out more about these here.
When a user deposits assets into a Liquidity Pool, they receive LP tokens. These represent their share of the total pool.
For example, if Pool #1 is the OSMO<>ATOM pool, users can deposit OSMO and ATOM tokens into the pool and receive back Pool1 share tokens. These tokens do not correspond to an exact quantity of tokens, but rather the proportional ownership of the pool. When users remove their liquidity from the pool, they get back the percentage of liquidity that their LP tokens represent.
The collection of the mechanisms above is used to ensure liquidity pools are able to maintain a stable price and ultimately work as a traditional market maker would do.
However, in order to achieve their ultimate goals, encouraging token holders to provide liquidity to pools is required.
The aspects in place to do so is what is known as ‘liquidity mining’ or ‘yield farming’. Contributing to a pool makes an individual a liquidity provider (LPs).
Liquidity providers earn through fees and special pool rewards. LP rewards come from swaps that occur in the pool and are distributed among the LPs in proportion to their shares of the pool’s total liquidity. So where do the rewards themselves come from?
Liquidity rewards are derived from the parameters laid out in the genesis of the AMM, in the case of the Cosmos Ecosystem this is Osmosis. For Osmosis, each day, 45% of released tokens go towards liquidity mining incentives.
When a liquidity provider bonds their tokens they become eligible for the OSMO rewards. On top of this, the Osmosis community decides on the allocation of rewards to a specific bonded liquidity gauge through a governance vote.
Bonded Liquidity Gauges are mechanisms for distributing liquidity incentives to LP tokens that have been bonded for a minimum amount of time. For instance, a Pool 1 LP share, 1-week gauge would distribute rewards to users who have bonded Pool1 LP tokens for one week or longer. The amount that each user receives is in proportion to the number of their bonded tokens.
The rewards earned from liquidity mining are not subject to unbonding. Rewards are liquid and transferable immediately. Only the principal bonded shares are subject to the unbonding period.
However, as with any opportunity for gain, there is of course some degree of risk; i.e. an individual could be better off holding the tokens rather than supplying them.
This outcome is called impermanent loss and essentially describes the difference in net worth between HODLing and LPing (more here). Liquidity mining mentioned above helps to offset impermanent loss for LPs. There are also other initiatives within the Osmosis ecosystem and beyond exploring other mechanisms to reduce impermanent loss.
At the time of writing CHEQ is currently only available for liquidity providing on the Osmosis DEX.
The CHEQ token is available in two pools:
Once you’ve agreed to terms and you’re ‘in the lab’ you’ll see some trading pairs and a button to connect your wallet (bottom left of the dashboard).
Note: if you already hold OSMO in your Keplr wallet you won’t be required to deposit.
Once you have deposited enough tokens for both sides of the pools (i.e. ensure that if the pool is setup as 50:50, you must have the equivalent amount is USD on both sides)
Next, find your pool and select ‘Add/ Remove Liquidity’.
Here you’ll be able to add tokens on both sides of the pool.
On selecting ‘Add Liquidity’ you’ll then be directed back to Keplr to approve the transaction (a small fee is required).
Once you have added liquidity to the pool, you’ll receive your LP tokens (a token representing your share of the total pool). Now it’s time to start ‘Liquidity Mining’.
You’ll now be able to see your total Available LP tokens. Below this you’ll see an option to Start Earning.
Once here you’ll see a few options for your unbonding period (i.e. the amount of days it takes to remove your tokens from the pool if you decide to withdraw). The longer you choose to bond your tokens, the higher the rewards you’ll be eligible to earn.
Next select the amount of your LP tokens you’d like to contribute to the pool and finally hit ‘Bond’ (this will kick off another approval through a Keplr pop-up).
You’ll now see your total bonded tokens. Each day rewards will then be distributed. When you decide to withdraw from the pool you’ll simply need to select ‘Remove Liquidity’ and select the amount you’d like to withdraw.
Overall, Liquidity Pools are an incredibly exciting and equalising tool, which represent the true nature of the DeFi and Web3.0 movement. Where for many years engaging in and benefiting from such financial systems was reserved solely for the wealthiest individuals and large organisations, now anyone can gain access and start contributing to their favourite projects, voting on their future direction and earning from the part they play.
As we build payment rails for trusted data (more on that below), we want to offer issuers, verifiers (the receivers of trusted data), and holders a choice on the means of settlement. We expect a preference for to eliminate the volatility in either pricing or settling payments for trusted data.
Whilst the Cosmos ecosystem has these, they aren’t as widely adopted yet as either or , both of which are within the Ethereum ecosystem. Furthermore, as we want to work with fiat on and off-ramps to remove the need for end customers to worry about crypto, there are currently more of these available in the Ethereum ecosystem, although we’re sure the Cosmos ecosystem will catch up with new companies joining the likes of .
A nice byproduct of this is providing easier access to CHEQ, whether you’re building upon the network, seeking to secure the network through staking or liquidity mining.
Ethereum was the first ecosystem we bridged to but it certainly won’t be the last.
To create an ERC20 representation of the Cosmos based CHEQ token we’ve used a bridge. A blockchain bridge or ‘cross-chain bridge’ enables users to transfer assets or any form of data seamlessly from one entirely separate protocol or ecosystem to another (i.e. Solana to Ethereum, or in our case Cosmos to Ethereum and vice versa).
Bridges generally use some kind of mint-and-burn function to keep token supply constant across all platforms. When the token leaves one blockchain, it is burned or locked, and an equivalent token is minted on the opposite blockchain. Conversely, the equivalent token is burned or locked when the token moves back to its original network. This equivalent token is known as a ‘wrapped token’ because the original asset is put in a wrapper, a kind of digital vault that allows the wrapped version to be created on another blockchain.
The (you can also add it to your MetaMask wallet through this link — go to profile summary > click ‘more’ > ‘add token to MetaMask’ )
The Gravity Bridge is a trustless, neutral bridge between the Ethereum and Cosmos ecosystems built by the team. Built using the Cosmos SDK, it uses the validator set to sign transactions instead of a multi-sig or permissioned set of actors.
The neutrality here implies that the entire focus of the Gravity community is on providing the most effective and secure bridge possible instead of on a DeFi application on the local chain. This neutrality aggregates volume from a number of blockchains and sources, increasing efficiency and lowering costs. All control over the bridge is handled entirely by the Gravity Bridge validator set.
The Gravity Bridge has two defined components:
The way Gravity Bridge works is similar to how all cross-chain bridges work, i.e. locking up a native token on one side of the bridge and minting a representation of that token on the other. The user then uses this representation before it is returned to the bridge and redeemed for the native asset on the other chain.
The most critical component for bridges to and from Ethereum is the Solidity contract. It holds the native assets being sent across the bridge.
Not ideal | Better |
---|---|
is a blockchain protocol built on that aims to “make all of crypto liquid”. It seeks to do this by enabling the trading of non-native crypto assets, such as trading Bitcoin for Ethereum, but in a completely decentralised way. In essence, it does much of what Coinbase and Binance do — but without a third party ever taking control of the funds.
The Thorchain protocol also powers a decentralised exchange () by the same name. Like or, the Thorchain DEX allows anyone to trade or lend their crypto assets by providing liquidity to an asset pool and, in exchange, earn a return (or “yield”) on those assets. With 1.5 million transactions to date and >80 validators, it is a leading solution, however, for our use case, it just didn’t offer the simplicity and ease of enabling a $CHEQ token on Ethereum.
Since we completed our investigation, Osmosis has also spent some time exploring how they plan to bridge their DEX’s requirements. Axelar, Wormhole and Nomad were also discussed here — all options we came across but did less investigating at the time. You can also find the RFPs for these Bridge proposals links: , , ,
A brilliant panel with some of the bridge providers can be found here, and the The Osmosis Discord has had perhaps the most lively debate since created a , and representatives from the various teams have been quite responsive there.
First, head to and click enter the lab.
You can then select Keplr wallet which will automatically connect to your if you’ve already set it up as a Browser extension.
Next, you’ll need to deposit the assets you would like to contribute towards a Liquidity Pool. You can see the available Liquidity Pools under ‘’. For example, if you would like to contribute to the Pool #602 : CHEQ / OSMO, you will need to deposit both of these tokens.
To do so, select ‘’ and find the tokens you would like to deposit to contribute to the pool.
A
A on the Gravity Bridge blockchain
, the Solidity contract developed by the team, holds funds for Gravity Bridge on Ethereum. In contrast to the prevailing trend in other bridge designs, at a mere 580 lines of code, Gravity.sol is compact and easy to review.
It has been audited by three independent teams (, , and ), and it is not upgradable, meaning that auditors found it cannot be tampered with by any malicious actor and does not contain any trusted parties of any kind.
To interact with Gravity Bridge, head to (supported by ), where you can connect your and.
If you want to learn more, hear from the or head over to the .
Fixed NoMethodError in RemovalWorker
Fix nil error when removing statuses caused by race condition
Staking
Learn what terms such as delegation and stake mean.
Slashing
Learn about the infractions that may result in a slash to your stake.
Validating
Learn about what validating is and how to set up a validator.
Voting
Learn what voting is and how it is used on the network.
Community Pool
Learn about the community pool and how to propose funds be spent.
Core concepts
Learn about the core concepts regarding how the $CHEQ token is utilised in governance.
Terminology
Learn about the terminology that is applied to this governance framework.
Glossary
Discover sector-specific words and language to guide your learning journey,
Network Parameters
Understand the technical parameters the comprise the network network and governance framework.
How to Participate
Learn how to stake, vote and conduct other operations on the cheqd network as an active participant.
Set up your Validator
Learn how to become a node operator and configure a validator node.
Set up your Validator
Learn how to become a node operator and configure a validator node.
Get $CHEQ
Start your journey of acquiring CHEQ. Head to our website to learn about the places you can get CHEQ.
$CHEQ Tokenomics
Learn about the tokenomics of CHEQ, such as distribution, vesting and identity costs.
Minor Network Changes
Understand how to make minor tweaks and changes to the network without an on-ledger vote.
Major Network Changes
Understand what comprises a major network change and when this will require an on-ledger vote.
Foundational Principles
Learn about the three Foundational Principles guiding the cheqd governance framework.
General Principles
Learn about the ten General Principles accompanying the Foundational Principles.
What is a Liquidity Pool
Understand the basics of LPs and how AMMs work.
CHEQ-ERC20 wrapped token
Learn about how to bridge CHEQ across into the Ethereum ecosystem.
The following instructions will be lighter weight as much of the general process of sending CHEQ tokens to Ethereum via Gravity Bridge has been explained separately.
Go to SpaceStation and select the respective chains. Your Source chain should be Ethereum, and your Destination chain Gravity Bridge.
Initiate Transfer by selecting the token you wish to transfer and the amount, hit transfer and confirm.
A MetaMask pop-up will appear. Check the transaction fees and approve the transfers (again, the high transfer fees are on the Ethereum side, not Cosmos.
Fortunately these fees will reduce based on the volumes of transfers on the Gravity Bridge thanks to the Batching mechanism designed as part of the bridge).
Finally, transfer the tokens from the Gravity Bridge chain to your final destination chain (the cheqd network).
If at any point you want to check the transfer, you can enter your Gravity address into MintScan using G-Bridge.
And that’s it, your tokens are now available in your Keplr wallet and can be used once again for all things Cosmos!
The information appearing in any CHEQD FOUNDATION LIMITED (cheqd) documentation, including blog posts, website material, webinars, events, videos or other graphics (the “Information Material”) has been prepared for informational purposes only and may be amended, superseded or replaced.
The Information Material is subject to update and does not constitute a prospectus or offer document, invitation or offer to buy any instrument of any sort.
If any of the Information Material is updated with a new version after you accessed or received an older version, YOU are solely responsible for accessing or receiving the most up-to-date version.
The Information Material relates primarily to the intended development and use of the cheqd Network by various Participants, Node Operators and Users. Some of the Information Material relates to the acquisition of cryptographic tokens to be used in the cheqd Network (“CHEQ”).
There will not be, and has not been, any Initial Coin Offering (ICO) or Initial Token Offering involving CHEQ.
No regulatory authority in Singapore, including the Monetary Authority of Singapore, has reviewed or approved the CHEQ tokens or any of the Information Material. The acquisition of tokens is subject to a potential acquirer's compliance with the laws and regulations in the jurisdiction they reside in.
The Information Material does not constitute either an offer or solicitation of securities or any other regulated product and is neither a promotion, invitation nor solicitation for investment purposes. The CHEQ tokens do not represent equity, shares, units, royalties or rights to capital, profit, returns or income in the cheqd Network or any other company or intellectual property associated with the cheqd ecosystem, or any other public or private enterprise, corporation, foundation or other entity in any jurisdiction. The CHEQ Tokens are not intended to represent a security or similar legal interest.
No information or opinion presented herein is intended as specific recommendations or to form the basis for any purchase or investment decision. Accordingly, the Information Material does not constitute investment advice or counsel or a solicitation for investment in any token or instrument. Prospective acquirers should consult with their professional advisors and advisors as needed prior to coming to their own conclusion on whether to acquire the CHEQ Tokens in their own jurisdiction.
The acquisition of CHEQ Tokens carries with it significant risks and is inherently speculative in nature. Prospective acquirers should carefully assess and take into account such risks prior to acquiring CHEQ Tokens. cheqd's initial core team and all of their collective past, present or future officers, directors, managers, employees, agents, advisors or consultants, or any other person (collectively, “cheqd”), expressly disclaims any and all responsibility for any direct or consequential loss or damage of any kind whatsoever arising directly or indirectly from: (a) reliance on any information contained in the Information Material; (b) any error, omission or inaccuracy in any such information; and (c) any action resulting therefrom. cheqd does not guarantee the accuracy of the statements made or conclusions reached in the Information Material and does not make, and expressly disclaims, all representations and warranties (whether express or implied by statute or otherwise). The Information Material does not constitute advice, nor any recommendations, by cheqd or any of its affiliates and all of their collective past, present or future officers, directors, managers, employees, agents, advisors or consultants, or any other person, to any recipient of the Information Material.
No regulatory authority has examined or approved any information set forth in the Information Material. No such action has been or will be taken under the laws, regulatory requirements or rules of any jurisdiction. The publication, distribution or dissemination of the Information Material does not imply that applicable laws, regulatory requirements or rules have been complied with.
The distribution or dissemination of the Information Material or any part thereof may be prohibited or restricted by the laws, regulatory requirements and rules of any jurisdiction. Persons to whom a copy of the Information Material has been distributed or disseminated or provided access to, or who otherwise have the Information Material in their possession, shall not circulate to any other persons, reproduce or otherwise distribute the Information Material or any information contained herein for any purpose whatsoever nor permit or cause the same to occur.
References in the Information Material to specific companies are for reference purposes only. The use of any company(ies) or product name(s) and/or trademark(s) does not imply any affiliation with, or endorsement by, any of those parties.
Certain statements in the Information Material may constitute “forward-looking information” under various securities laws. In some cases, these forward-looking statements can be identified by words or phrases such as “may,” “will,” “expect,” “anticipate,” “aim,” “estimate,” “intend,” “plan,” “seek,” “believe,” “potential,” “continue,” “is/are likely to” or the negative of such terms, or other similar expressions intended to identify forward-looking statements. Forward looking statements are provided to allow acquirers of the CHEQ Tokens the opportunity to understand cheqd's initial beliefs and opinions in respect of the potential future, including forward-looking statements related to the proposed operating model for cheqd, which should not be construed as a forecast, projection or prediction of future results of cheqd operations.
This is also because cheqd will be taken forward through a decentralised governance process, whereby the consensus of the Network will make decisions on the direction of the Network.
The forward-looking statements are not guarantees of future performance, and undue reliance should not be placed on them. Forward-looking statements are based on certain assumptions and analysis based on current estimates, assumptions, conditions and expected future developments and other factors cheqd initially believes are appropriate.
The cheqd Network will be taken forward and developed through a decentralised governance process, whereby the consensus of the Network will make decisions on the direction of the Network.
As such, these forward-looking statements involve known and unknown risks, uncertainties and other factors that may cause the actual future success of cheqd, the CHEQ token or its performance to be materially different from any future results, performance or achievements expected, expressed or implied by such forward-looking statements.
These factors include, but are not limited to, risks associated with:
cheqd's ability to launch and develop the cheqd Network or ecosystem;
cheqd's businesses and operations;
CHEQ Token’s volatility and price points;
Unfavourable legal or regulatory actions;
Tax treatment of CHEQ Tokens;
A restriction of transfer of CHEQ Tokens;
A user’s inability to access wallets containing CHEQ;
The compromise of a user’s credentials;
Insufficient interest in the cheqd Network, ecosystem or blockchain technologies;
cheqd's ability to continuously adapt its business model to meet market needs;
Competitive technologies;
Security weaknesses;
cheqd's ability to effectively protect its intellectual property;
Meeting regulatory obligations in the countries in which cheqd intends to operate; and
Meeting users’ expectations regarding the functionality of the cheqd Network and ecosystem.
The distribution or dissemination of the Information Material or CHEQ Tokens may be prohibited or restricted by the laws, regulatory requirements and rules of any jurisdiction. In the case where any restriction applies, you must inform yourself about, and observe, any restrictions that are applicable to your possession of the Information Material or CHEQ Tokens or any part thereof at your own expense and without liability to cheqd. The Information Material may not be redistributed, reproduced, published or passed on to any other person, in part or in whole, for any purpose, without the express prior written consent of cheqd.
This notice is written in English language and may be translated into other languages. In the event of any inconsistency between the English version and the translated version of this notice, the English version shall prevail.
The rights of members in a Decentralized Autonomous Organization (DAO) may differ materially from the rights of members in other limited liability companies. Members should familiarise themselves with this Information Material and wider documentation regarding the legal classification of DAOs before participating in the cheqd Network.
By exercising the Licensed Rights (defined below), You accept and agree to be bound by the terms and conditions of this Creative Commons Attribution-ShareAlike 4.0 International Public License ("Public License"). To the extent this Public License may be interpreted as a contract, You are granted the Licensed Rights in consideration of Your acceptance of these terms and conditions, and the Licensor grants You such rights in consideration of benefits the Licensor receives from making the Licensed Material available under these terms and conditions.
a. Adapted Material means material subject to Copyright and Similar Rights that is derived from or based upon the Licensed Material and in which the Licensed Material is translated, altered, arranged, transformed, or otherwise modified in a manner requiring permission under the Copyright and Similar Rights held by the Licensor. For purposes of this Public License, where the Licensed Material is a musical work, performance, or sound recording, Adapted Material is always produced where the Licensed Material is synched in timed relation with a moving image.
b. Adapter's License means the license You apply to Your Copyright and Similar Rights in Your contributions to Adapted Material in accordance with the terms and conditions of this Public License.
c. BY-SA Compatible License means a license listed at creativecommons.org/compatiblelicenses, approved by Creative Commons as essentially the equivalent of this Public License.
d. Copyright and Similar Rights means copyright and/or similar rights closely related to copyright including, without limitation, performance, broadcast, sound recording, and Sui Generis Database Rights, without regard to how the rights are labeled or categorized. For purposes of this Public License, the rights specified in Section 2(b)(1)-(2) are not Copyright and Similar Rights.
e. Effective Technological Measures means those measures that, in the absence of proper authority, may not be circumvented under laws fulfilling obligations under Article 11 of the WIPO Copyright Treaty adopted on December 20, 1996, and/or similar international agreements.
f. Exceptions and Limitations means fair use, fair dealing, and/or any other exception or limitation to Copyright and Similar Rights that applies to Your use of the Licensed Material.
g. License Elements means the license attributes listed in the name of a Creative Commons Public License. The License Elements of this Public License are Attribution and ShareAlike.
h. Licensed Material means the artistic or literary work, database, or other material to which the Licensor applied this Public License.
i. Licensed Rights means the rights granted to You subject to the terms and conditions of this Public License, which are limited to all Copyright and Similar Rights that apply to Your use of the Licensed Material and that the Licensor has authority to license.
j. Licensor means the individual(s) or entity(ies) granting rights under this Public License.
k. Share means to provide material to the public by any means or process that requires permission under the Licensed Rights, such as reproduction, public display, public performance, distribution, dissemination, communication, or importation, and to make material available to the public including in ways that members of the public may access the material from a place and at a time individually chosen by them.
l. Sui Generis Database Rights means rights other than copyright resulting from Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases, as amended and/or succeeded, as well as other essentially equivalent rights anywhere in the world.
m. You means the individual or entity exercising the Licensed Rights under this Public License. Your has a corresponding meaning.
a. License grant.
Subject to the terms and conditions of this Public License, the Licensor hereby grants You a worldwide, royalty-free, non-sublicensable, non-exclusive, irrevocable license to exercise the Licensed Rights in the Licensed Material to:
A. reproduce and Share the Licensed Material, in whole or in part; and
B. produce, reproduce, and Share Adapted Material.
Exceptions and Limitations. For the avoidance of doubt, where Exceptions and Limitations apply to Your use, this Public License does not apply, and You do not need to comply with its terms and conditions.
Term. The term of this Public License is specified in Section 6(a).
Media and formats; technical modifications allowed. The Licensor authorizes You to exercise the Licensed Rights in all media and formats whether now known or hereafter created, and to make technical modifications necessary to do so. The Licensor waives and/or agrees not to assert any right or authority to forbid You from making technical modifications necessary to exercise the Licensed Rights, including technical modifications necessary to circumvent Effective Technological Measures. For purposes of this Public License, simply making modifications authorized by this Section 2(a)(4) never produces Adapted Material.
Downstream recipients.
A. Offer from the Licensor – Licensed Material. Every recipient of the Licensed Material automatically receives an offer from the Licensor to exercise the Licensed Rights under the terms and conditions of this Public License.
B. Additional offer from the Licensor – Adapted Material. Every recipient of Adapted Material from You automatically receives an offer from the Licensor to exercise the Licensed Rights in the Adapted Material under the conditions of the Adapter’s License You apply.
C. No downstream restrictions. You may not offer or impose any additional or different terms or conditions on, or apply any Effective Technological Measures to, the Licensed Material if doing so restricts exercise of the Licensed Rights by any recipient of the Licensed Material.
No endorsement. Nothing in this Public License constitutes or may be construed as permission to assert or imply that You are, or that Your use of the Licensed Material is, connected with, or sponsored, endorsed, or granted official status by, the Licensor or others designated to receive attribution as provided in Section 3(a)(1)(A)(i).
b. Other rights.
Moral rights, such as the right of integrity, are not licensed under this Public License, nor are publicity, privacy, and/or other similar personality rights; however, to the extent possible, the Licensor waives and/or agrees not to assert any such rights held by the Licensor to the limited extent necessary to allow You to exercise the Licensed Rights, but not otherwise.
Patent and trademark rights are not licensed under this Public License.
To the extent possible, the Licensor waives any right to collect royalties from You for the exercise of the Licensed Rights, whether directly or through a collecting society under any voluntary or waivable statutory or compulsory licensing scheme. In all other cases the Licensor expressly reserves any right to collect such royalties.
Your exercise of the Licensed Rights is expressly made subject to the following conditions.
a. Attribution.
If You Share the Licensed Material (including in modified form), You must:
A. retain the following if it is supplied by the Licensor with the Licensed Material:
i. identification of the creator(s) of the Licensed Material and any others designated to receive attribution, in any reasonable manner requested by the Licensor (including by pseudonym if designated);
ii. a copyright notice;
iii. a notice that refers to this Public License;
iv. a notice that refers to the disclaimer of warranties;
v. a URI or hyperlink to the Licensed Material to the extent reasonably practicable;
B. indicate if You modified the Licensed Material and retain an indication of any previous modifications; and
C. indicate the Licensed Material is licensed under this Public License, and include the text of, or the URI or hyperlink to, this Public License.
You may satisfy the conditions in Section 3(a)(1) in any reasonable manner based on the medium, means, and context in which You Share the Licensed Material. For example, it may be reasonable to satisfy the conditions by providing a URI or hyperlink to a resource that includes the required information.
If requested by the Licensor, You must remove any of the information required by Section 3(a)(1)(A) to the extent reasonably practicable.
b. ShareAlike.
In addition to the conditions in Section 3(a), if You Share Adapted Material You produce, the following conditions also apply.
The Adapter’s License You apply must be a Creative Commons license with the same License Elements, this version or later, or a BY-SA Compatible License.
You must include the text of, or the URI or hyperlink to, the Adapter's License You apply. You may satisfy this condition in any reasonable manner based on the medium, means, and context in which You Share Adapted Material.
You may not offer or impose any additional or different terms or conditions on, or apply any Effective Technological Measures to, Adapted Material that restrict exercise of the rights granted under the Adapter's License You apply.
Where the Licensed Rights include Sui Generis Database Rights that apply to Your use of the Licensed Material:
a. for the avoidance of doubt, Section 2(a)(1) grants You the right to extract, reuse, reproduce, and Share all or a substantial portion of the contents of the database;
b. if You include all or a substantial portion of the database contents in a database in which You have Sui Generis Database Rights, then the database in which You have Sui Generis Database Rights (but not its individual contents) is Adapted Material, including for purposes of Section 3(b); and
c. You must comply with the conditions in Section 3(a) if You Share all or a substantial portion of the contents of the database.
For the avoidance of doubt, this Section 4 supplements and does not replace Your obligations under this Public License where the Licensed Rights include other Copyright and Similar Rights.
a. Unless otherwise separately undertaken by the Licensor, to the extent possible, the Licensor offers the Licensed Material as-is and as-available, and makes no representations or warranties of any kind concerning the Licensed Material, whether express, implied, statutory, or other. This includes, without limitation, warranties of title, merchantability, fitness for a particular purpose, non-infringement, absence of latent or other defects, accuracy, or the presence or absence of errors, whether or not known or discoverable. Where disclaimers of warranties are not allowed in full or in part, this disclaimer may not apply to You.
b. To the extent possible, in no event will the Licensor be liable to You on any legal theory (including, without limitation, negligence) or otherwise for any direct, special, indirect, incidental, consequential, punitive, exemplary, or other losses, costs, expenses, or damages arising out of this Public License or use of the Licensed Material, even if the Licensor has been advised of the possibility of such losses, costs, expenses, or damages. Where a limitation of liability is not allowed in full or in part, this limitation may not apply to You.
c. The disclaimer of warranties and limitation of liability provided above shall be interpreted in a manner that, to the extent possible, most closely approximates an absolute disclaimer and waiver of all liability.
a. This Public License applies for the term of the Copyright and Similar Rights licensed here. However, if You fail to comply with this Public License, then Your rights under this Public License terminate automatically.
b. Where Your right to use the Licensed Material has terminated under Section 6(a), it reinstates:
automatically as of the date the violation is cured, provided it is cured within 30 days of Your discovery of the violation; or
upon express reinstatement by the Licensor.
For the avoidance of doubt, this Section 6(b) does not affect any right the Licensor may have to seek remedies for Your violations of this Public License.
c. For the avoidance of doubt, the Licensor may also offer the Licensed Material under separate terms or conditions or stop distributing the Licensed Material at any time; however, doing so will not terminate this Public License.
d. Sections 1, 5, 6, 7, and 8 survive termination of this Public License.
a. The Licensor shall not be bound by any additional or different terms or conditions communicated by You unless expressly agreed.
b. Any arrangements, understandings, or agreements regarding the Licensed Material not stated herein are separate from and independent of the terms and conditions of this Public License.
a. For the avoidance of doubt, this Public License does not, and shall not be interpreted to, reduce, limit, restrict, or impose conditions on any use of the Licensed Material that could lawfully be made without permission under this Public License.
b. To the extent possible, if any provision of this Public License is deemed unenforceable, it shall be automatically reformed to the minimum extent necessary to make it enforceable. If the provision cannot be reformed, it shall be severed from this Public License without affecting the enforceability of the remaining terms and conditions.
c. No term or condition of this Public License will be waived and no failure to comply consented to unless expressly agreed to by the Licensor.
d. Nothing in this Public License constitutes or may be interpreted as a limitation upon, or waiver of, any privileges and immunities that apply to the Licensor or You, including from the legal processes of any jurisdiction or authority.
Creative Commons is not a party to its public licenses. Notwithstanding, Creative Commons may elect to apply one of its public licenses to material it publishes and in those instances will be considered the “Licensor.” The text of the Creative Commons public licenses is dedicated to the public domain under the CC0 Public Domain Dedication. Except for the limited purpose of indicating that material is shared under a Creative Commons public license or as otherwise permitted by the Creative Commons policies published at creativecommons.org/policies, Creative Commons does not authorize the use of the trademark “Creative Commons” or any other trademark or logo of Creative Commons without its prior written consent including, without limitation, in connection with any unauthorized modifications to any of its public licenses or any other arrangements, understandings, or agreements concerning use of licensed material. For the avoidance of doubt, this paragraph does not form part of the public licenses.
Creative Commons may be contacted at creativecommons.org
We as members, contributors, and leaders pledge to make participation in the cheqd community a harassment-free experience for everyone, regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, level of experience, education, socio-economic status, nationality, country of origin, personal appearance, race, religion, or sexual identity and orientation.
We pledge to act and interact in ways that contribute to an open, welcoming, diverse, inclusive, and healthy community.
Examples of behaviour that contributes to a positive environment for our community include:
Demonstrating empathy and kindness toward other people
Being respectful of differing opinions, viewpoints, and experiences
Giving and gracefully accepting constructive feedback
Accepting responsibility and apologizing to those affected by our mistakes, and learning from the experience
Focusing on what is best not just for us as individuals, but for the overall community
Examples of unacceptable behaviour include:
The use of sexualized language or imagery, and sexual attention or advances of any kind
Use of inappropriate or non-inclusive language or other behaviour deemed unprofessional or unwelcome in the community
Trolling, insulting or derogatory comments, and personal or political attacks
Public or private harassment
Publishing others' private information, such as a physical or email address, without their explicit permission
Other conduct which could reasonably be considered inappropriate in a professional setting
Community leaders are responsible for clarifying and enforcing our standards of acceptable behaviour and will take appropriate and fair corrective action in response to any behaviour that they deem inappropriate, threatening, offensive, or harmful.
Community leaders have the right and responsibility to remove, edit, or reject comments, commits, messages, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, and will communicate reasons for moderation decisions when appropriate.
This Code of Conduct applies within all community spaces, and also applies when an individual is officially representing the community in public spaces. Examples of representing our community include using an official e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event.
Instances of abusive, harassing, or otherwise unacceptable behaviour may be reported to the community leaders responsible for enforcement at support-github@cheqd.io. All complaints will be reviewed and investigated promptly and fairly.
All community leaders are obligated to respect the privacy and security of the reporter of any incident.
Community leaders will follow these Community Impact Guidelines in determining the consequences for any action they deem in violation of this Code of Conduct:
Community Impact: Use of inappropriate language or other behaviour deemed unprofessional or unwelcome in the community.
Consequence: A private, written warning from community leaders, providing clarity around the nature of the violation and an explanation of why the behaviour was inappropriate. A public apology may be requested.
Community Impact: A violation through a single incident or series of actions. Any Community Impact assessment should take into account:
The severity and/or number of incidents/actions
Non-compliance with previous private warnings from community leaders (if applicable)
Consequence: A warning with consequences for continued behaviour. No interaction with the people involved, including unsolicited interaction with those enforcing the Code of Conduct, for a specified period of time. This includes avoiding interactions in community spaces as well as external channels like social media. Violating these terms may lead to a temporary or permanent ban.
Community Impact: A serious violation of community standards, including sustained inappropriate behaviour.
Consequence: A temporary ban from any sort of interaction or public communication with the community for a specified period of time. No public or private interaction with the people involved, including unsolicited interaction with those enforcing the Code of Conduct, is allowed during this period. Violating these terms may lead to a permanent ban.
Community Impact: Demonstrating a pattern of violation of community standards, including sustained inappropriate behaviour, harassment of an individual, or aggression toward or disparagement of classes of individuals.
Consequence: A permanent ban from any sort of public interaction within the community.
This Code of Conduct is adapted from the Contributor Covenant, version 2.0, available at https://www.contributor-covenant.org/version/2/0/code_of_conduct.html.
Community Impact Guidelines were inspired by Mozilla's code of conduct enforcement ladder.
For answers to common questions about this code of conduct, see the FAQ at https://www.contributor-covenant.org/faq. Translations are available at https://www.contributor-covenant.org/translations.
If you think you have discovered a security issue in any of cheqd projects, we'd love to hear from you.
We take all security bugs seriously. If confirmed upon investigation, we will patch it within a reasonable amount of time and release a public security bulletin discussing the impact and credit the discoverer.
There are two ways to report a security bug:
Email us at security-github@cheqd.io
Join our cheqd Community Slack and post a message on the #security channel
This guide will provide the information you’ll need to make a transfer of tokens native to Cosmos, across to Ethereum and ultimately onto a Decentralised Exchange (DEX).
It has been constructed using another Cosmos project (StarGaze) as the token that is being transferred across using the Gravity Bridge.
The process follows 3 distinct parts:
In order to transfer tokens from Cosmos to Ethereum, the Gravity Bridge chain is required to hold the tokens you wish to transfer. Therefore, the first step is to send the tokens from the chain you are transferring from on Cosmos, to the Gravity Bridge, via IBC.
The Gravity Bridge then will be able to transfer the tokens across the bridge, locking them up on the Cosmos side, and minting them on the Ethereum side
Finally, if you'd like to interact with DEX's such as UniSwap you will be required to add the token to your MetaMask using a ‘Contract Address’, and then connect this to your UniSwap account.
The final section of the guide will provide instructions on how to complete this process in reverse (i.e. transferring tokens from Ethereum to Cosmos).
Let’s do it…
The following instructions for this part use Spacestation itself for the IBC transfer of CHEQ tokens to the Gravity chain. You can however also do a direct IBC transfer within Keplr itself.
Go to Spacestation on your browser which you use to access you MetaMask andKeplr wallets.
Connect your Keplr wallet containing the tokens you which to transfer.
This will take you through the login process using the browser extensions for both wallets (don’t worry about which side if on Source and which Destination at this stage).
Select the cheqd as the 'Source' chain
Select the destination chain - this MUST be the Gravity Bridge chain.
Select the token you wish to transfer and enter the amount noting you'll need an additional amount to pay for gas fees.
A pop-up will appear which you'll need to approve for the transaction to go through.
Select Gravity Bridge as the Source, and Ethereum as the Destination.
Login to your MetaMask wallet using the browser extension and connect.
The token you have sent to Gravity Bridge will now appear on the list within Gravity Bridge with the available amount listed. Enter the amount you wish to transfer.
Note: The transaction fees are high due to the costs of transactions on the Ethereum side. You can select either a day, an hour or instant, at increasing costs.
Once you have completed the transfer you will need to wait for duration you have selected.
During this time you can get started with adding CHEQ to your MetaMask wallet.
Open your MetaMask wallet and select ‘import tokens’ at the bottom of the window
Select ‘Custom Token’ and enter the CHEQ 'Token Contract Address'.
CHEQ**:** 0x70EDF1c215D0ce69E7F16FD4E6276ba0d99d4de7
Here are a selection of other Cosmos chains available thanks to the Gravity Bridge
ATOM: 0xdaf0b40b961CA51Fc914fbabdA8E779619576caD
STARS: 0x4547254E6E3195cE57Bc50352193A25c2F4B8FCf
HUAHUA: 0x7bE48633D86AA9821284B01030b8a3F9B06eA876
NYM: 0x525A8F6F3Ba4752868cde25164382BfbaE3990e1
NYMT: 0xE8883BAeF3869e14E4823F46662e81D4F7d2A81F
PLA: 0xa752Ef191E8b103150D5FE4a6639A598Ede5a50F
When entered this will automatically retrive the CHEQ token symbol and denomination (10^9 for CHEQ). CHEQ will now appear in your list of assets on the MetaMask homepage.
Now you can wait for CHEQ tokens that have been sent via Gravity Bridge to appear in your MetaMask wallet.
How to stake
Learn how to stake practically using cheqd's tooling.
How to vote
Learn how to vote practically using cheqd's tooling.
Making Network Changes
Learn how to make both major and minor network changes.
Now that you have CHEQ-ERC20 tokens you can engage with DeFi activities within the Ethereum ecosystem.
Within UniSwap you can either Swap tokens, or add them to a Liquidity Pool.
To find out more about Liquidity Pools, head to What is a Liquidity Pool?
As a pool has been created on UniSwap these instructions offer insight into how to use UniSwap, however other options exists and CHEQ will likely appear on them in the near future.
Head to the CHEQ:USDT pool.
Select ‘Add liquidity’ which will take you to the UniSwap app.
On the app, enter the amount of tokens you’d like to deposit and hit ‘Preview’
Select ‘Add’ which will initiate the transaction.
Check the gas fees and confirm the transaction. I
If you'd like to reduce the transaction fee you can select a lower one using the updated MetaMask. To turn this on, go to your settings in MetaMask and select 'Experimental' and toggle the 'Enable Enhance Gas Fee UI' to ON
Once the transaction has completed you'll see your positions appear on your UniSwap account.
Learn about how Decentralised Identifiers function.
In order to explain the concept of DIDs, we have put together a simple explanation using an analogy of a car and its license plate.
More more of a detailed and deeper understanding, we suggest starting with these external resources.
For creating DIDs on cheqd, you can get started using our identity documentation below.
DID Core Spec
Dive into the W3C DID Core Recommendation to fully grasp the power of DIDs.
DID Resolution Spec
Learn about how DIDs can be resolved or dereferenced from the W3C DID Resolution Spec.
DID Spec Registries
Explore the different DID methods registered within the DID Spec Registries.
cheqd DID Method
Learn specifically about cheqd's DID Method and how it works on the cheqd Network.
Create DIDs
Create an Issuer DID using the did:cheqd DID method.
This glossary lays out all of the key terms you may come across while using cheqd.
Term
Definition
Agency
A service provider that hosts Cloud Agents and may provision Edge Agents on behalf of Entities. Agencies may be Unaccredited, Self-Certified, or Accredited.
Agent
A software program or process used by or acting on behalf of an Entity to interact with other Agents or with the cheqd Network or other distributed ledgers. Agents are of two types: Edge Agents run at the edge of the network on a local device; Cloud Agents run remotely on a server or cloud hosting service. Agents require access to a Wallet in order to perform cryptographic operations on behalf of the Entity they represent.
Agent-to-Agent (A2A) Protocol
A protocol for communicating between Agents to form Connections, exchange Credentials, and have other secure private Interactions. A less technical synonym is DID Communication (DIDComm).
Agent-to-Agent (A2A) Protocol Layer
The technical stack 'Layer' for peer-to-peer Connections and Interactions over the Agent-to-Agent Protocol.
Anonym
A DID used exactly once, so it cannot be contextualized or correlated beyond that single usage. See also Pseudonym and Verinym.
Anywise
A non-reciprocal relationship rooted in the Identity of one party, where the other party is the public (a faceless “other” that can be instantiated without bound). For an Organization to issue publicly Verifiable Credentials, its Issuer DID must be on a public ledger such as cheqd. It is thus an Anywise DID—a DID to which any other Entity may refer without coordination. The term “public DID” is sometimes used as a casual synonym for “Anywise DID”. However, “public DID” is deprecated because it is ambiguous, i.e., it may refer to a DID that is world-visible but usable only in pairwise mode, or to a DID that is not published in a central location but nonetheless used in many contexts, or to a DID that is both publicly visible and used in Anywise mode. Compare N-wise and Pairwise.
ATOM
The exchange token that runs and transacts natively on the Cosmos ledger.
Attribute
An Identity trait, property, or quality of an Entity.
Authentic data
A relatively new term, intended to replace 'Self-sovereign identity'. It relates to signed, verifiable and cryptographically resolvable data using the W3C Verifiable Credential data model.
Bitcoin
A type of cryptocurrency, famously created by pseudonymous Satoshi Nakamoto, using a Proof-of-Work (PoW) consensus model to mine blocks.
Blocks
A set of transaction data, forming part of a Blockchain.
Blockchain
A system in which a record of transactions are maintained across several computers that are linked in a distributed, peer-to-peer network.
Bonding
Attaching tokens to a specific Node Operator, to participate in cheqd Network Governance and delegate unused votes to that specific Node Operator.
CHEQ
The native medium of exchange, governance and transaction fees on the cheqd Network.
cheqd Network
The blockchain, built on the Cosmos SDK, that cheqd uses for transactions, governance and identity interactions.
Claim
An assertion about an Attribute of a Subject. Examples of a Claim include date of birth, height, government ID number, or postal address—all of which are possible Attributes of an Individual. A Credential is comprised of a set of Claims. (Note: Early in the development of Self-Sovereign Identity technology, this term was used the same way it was used in the early W3C Verifiable Claims Working Group specifications—as a synonym for what is now a Credential. That usage is now deprecated.)
Cloud Agent
An Agent that is hosted in the cloud. It typically operates on a computing device over which the Identity Owner does not have direct physical control or access. Mutually exclusive with Edge Agent. A Cloud Agent requires a Wallet and typically has a Service Endpoint. Cloud agents may be hosted by an Agency.
Coin
A coin operates on its own independent blockchain and acts like a native currency within a specific financial system.
Connection
A cryptographically verifiable communications channel established using an Agent-to-Agent Protocol between two DIDs representing two Entities and their associated Agents. Connections may be Edge-to-Edge Connections or Cloud-to-Cloud Connections. Connections may be used to exchange Verifiable Credentials or for any other communications purpose. Connections may be encrypted and decrypted using the Public Keys and Private Keys for each DID. A Connection may be temporary or it may last as long as the two Entities desire to keep it. Two Entities may have multiple Connections between them, however each Connection must be between a unique pair of DIDs. A relationship between more than two Entities may be modeled either as Pairwise connections between all of the Entities (Peering) or each Entity can form a Connection with an Entity representing a Group.
Connection Invitation
An Agent-to-Agent Protocol message type sent from one Entity to a second Entity to invite the second Entity to send a Connection Request.
Controlled Document
A subdocument of a Governance Framework as a normative component of the framework. These are often referred to in the Trust over IP metamodel, which cheqd intends to comply with.
Controller
An Entity that has the Private Keys and responsibility to take actions on behalf of another Entity.
Cosmos
The distributed ledger, with the coin ATOM, which cheqd is building its infrastructure on top of.
Cosmos SDK
The development kit that cheqd is using to build its infrastructure.
Core Principles
The Principles published in this Governance Framework that seek to govern the behaviour of participants in the cheqd Network.
Credential
A digital assertion containing a set of Claims made by an Entity about itself or another Entity. Credentials are a subset of Identity Data. A Credential is based on a Credential Definition.
The Entity described by the Claims is called the Subject of the Credential.
The Entity creating the Credential is called the Issuer.
The Entity holding the issued Credential is called the Holder.
The Entity to whom a Credential is presented is generally called the Relying Party, and specifically called the Verifier if the Credential is a Verifiable Credential.
Once issued, a Credential is typically stored by an Agent. (In cheqd's infrastructure, Credentials are never stored on the Ledger.) Credentials are very broad in their potential use: Examples of Credentials include college transcripts, driver licenses, health insurance cards, and building permits. See also Verifiable Credential.
Credential Definition (CredDef)
A machine-readable definition of the semantic structure of a Credential based on one or more Schemas. Credential Definitions are stored on the cheqd Network. Credential Definitions must include an Issuer Public Key. Credential Definitions facilitate interoperability of Credentials and Proofs across multiple Issuers, Holders, and Verifiers.
Credential Exchange
A set of Interaction Patterns within an Agent-to-Agent Protocol for exchange of Credentials between Entities acting in Credential Exchange Roles.
Credential Exchange Layer
The technical infrastructure Layer for Credential Exchange.
Credential Offer
An Agent-to-Agent Protocol message type sent from an Issuer to a Holder to invite the Holder to send a Credential Request to the Issuer.
Credential Registry
An Entity that serves as a Holder of Credentials issued by Trust Community Members in order to provide a cryptographically verifiable directory service to the Trust Community or to the public. The term also refers to the actual repository of Credentials maintained by this Entity. An informal Credential Registry may accept Credentials from participants whose purpose is to cross-certify each other’s roles in the Trust Community. A formal Credential Registry may be authorized directly by a Governance Authority or Accredited by an authorized Auditor for the relevant Governance Framework.
Credential Request
An Agent-to-Agent Protocol message type sent from a Holder to an Issuer to request the issuance of a Credential to that Holder.
Cryptocurrency
A digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.
Cryptographic Trust
Trust bestowed in a set of machines (Man-Made Things) that are operating a set of cryptographic algorithms will behave as expected. This form of trust is based in mathematics and computer hardware/software engineering. Compare with Human Trust.
Data Controller
As defined by the EU General Data Protection Regulation (GDPR), the natural or legal person, public authority, agency, or other body which, alone or jointly with others, determines the purposes and means of the processing of Personal Data.
Data Processor
As defined by the EU General Data Protection Regulation (GDPR), a natural or legal person, public authority, agency, or other body which processes Personal Data on behalf of a Data Controller.
Data Protection by Design
A widely recognized set of principles for protecting Personal Data. Specific cheqd Data Protection by Design principles are a subset of the General Principles in the cheqd Governance Framework.
Data Subject
As defined by the EU General Data Protection Regulation (GDPR), any person whose Personal Data is being collected, held, or processed. In the cheqd Governance Framework, a Data Subject is referred to as an Individual.
Decentralised identity
Synonymous with Self-Sovereign Identity, decentralised identity refers to the control and management of identity Credentials, Claims and Attributes by an Entity which the data contained in the Credentials, Claims and Attributes is about.
Decentralised Identifier (DID)
A globally unique identifier developed specifically for decentralized systems as defined by the W3C DID specification. DIDs enable interoperable decentralized Self-Sovereign Identity management. A DID is associated with exactly one DID Document.
Delegate
This term has two meanings in different contexts. Firstly, it can mean an Identity Controller that acts on behalf of another Identity Controller to assist or manage Credentials, Claims or Attributes on behalf of that secondary Identity Controller.
Delegate
Secondly, it can mean delegating tokens for the purpose of participating in cheqd on-chain Governance. Delegating tokens means bonding tokens to a specific Node Operator.
DID
Acronym for Decentralized Identifier.
DID Communication
Synonym for Agent-to-Agent Protocol.
DID Document
The machine-readable document to which a DID points as defined by the W3C DID specification. A DID document describes the Public Keys, Service Endpoints, and other metadata associated with a DID. A DID Document is associated with exactly one DID.
DID Method
A specification that defines a particular type of DID conforming to the W3C DID specification. A DID Method specifies both the format of the particular type of DID as well as the set of operations for creating, reading, updating, and deleting (revoking) it.
DID Resolver
A software module that takes a DID as input and returns a DID document by invoking the DID Method used by that particular DID. Analogous to the function of a DNS resolver.
DID Subject
The Entity identified by a DID.
DKMS
Decentralized Key Management System, an emerging standard for interoperable cryptographic key management based on DIDs.
DKMS Protocol
A subset of the Agent-to-Agent Protocol that enables Agents to perform DKMS functions for interoperable digital Wallet management, e.g., key exchange, automated backup, offline recovery, social recovery, etc.
Edge Agent
An Agent that operates at the edge of the network on a local device, such as a smartphone, tablet, laptop, automotive computer, etc. The device owner usually has local access to the device and can exert control over its use and authorization. Mutually exclusive with Cloud Agent. An Edge Agent may be an app used directly by an Identity Owner, or it may be an operating system module or background process called by other apps. Edge Agents typically do not have a publicly exposed Service Endpoint in a DID Document, but do have access to a Wallet. Note that the local device may itself be an Active Thing with its own Agent, and for which the Identity Owner is the Thing Controller.
Edge-to-Edge Connection
A Connection that forms and/or communicates directly between two Edge Agents.
Entity
As used in IETF RFC 3986, Uniform Resource Identifier (URI), a resource of any kind that can be uniquely and independently identified.
Entropy
The determinate and irreversible transition of the cheqd Network’s application of Governance from centralisation to decentralisation.
Fee
A proportion of Network transaction costs that is taken used to remunerate Network participants or the Community Pool.
Gas
Gas refers to the fee, or pricing value, required to successfully conduct a transaction or execute a contract on a blockchain.
Genesis Parameters
The initial Network parameters governing how cheqd works at an architectural level.
Governance
Governance is a way of regulating behaviour and ensuring order in a given system. We think of it as a melting pot with Principles, Laws, Economics and System Design as the ingredients.
Governance Authority (GA)
The Entity (typically an Organization) governing and making decisions related to a particular Governance Framework. cheqd does not have a Governance Authority in its traditional sense, its governance is conducted by the distributed consensus of the Network itself.
Guardian
An Identity Controller who administers Identity Data, Wallets, and/or Agents on behalf of a Dependent. A Guardian is different than a Delegate—in Delegation, the Identity Controller still retains control of one or more Wallets. With Guardianship, an Identity Controller is wholly dependent on the Guardian to manage the Identity Controllers' Wallet.
Holder
A role played by an Entity when it is issued a Credential by an Issuer. The Holder may or may not be the Subject of the Credential. (There are many use cases in which the Holder is not the Subject, e.g., a birth certificate where the Subject is a baby and both the mother and father may be Holders.) Holders are also those who own and hold CHEQ.
Hyperledger
An initiative of the Linux Foundation to develop open source distributed ledger and blockchain technology. The Hyperledger home page is https://wiki.hyperledger.org/.
Hyperledger Aries
Provides a shared, reusable, interoperable tool kit designed for initiatives and solutions focused on creating, transmitting and storing verifiable digital credentials. It is infrastructure for blockchain-rooted, peer-to-peer interactions.
Hyperledger Indy
An open source project under the Hyperledger umbrella for decentralized Self-Sovereign Identity. The source code for Hyperledger Indy was originally contributed to the Linux Foundation by the Sovrin Foundation. cheqd does not use Hyperledger Indy for its Network, instead it uses Cosmos.
Hyperledger Ursa
A shared cryptographic library that would enable people (and projects) to avoid duplicating other cryptographic work and hopefully increase security in the process.
Identifier
A text string or other atomic data structure used to provide a base level of Identity for an Entity in a specific context. In Self-Sovereign Identity systems, Decentralized Identifiers (DIDs) are the standard Identifier.
Identity Data
The set of data associated with an Identity that permits identification of the underlying Entity.
Identity Controller
The person, organisation, group or thing that retains control over the Private Key(s) relating to specific identity data.
Interaction
A set of messages exchanged over a Connection using an Agent-to-Agent Protocol.
Issuer
The Entity that issues a Credential to a Holder. Based on the definition provided by the W3C Verifiable Claims Working Group.
JSON
Open standard data format used for some Verifiable Credentials
JSON-LD
Open standard data format used for some Verifiable Credentials, specifically for linking data to other datasets.
Key Recovery
The process of recovering access to and control of a set of Private Keys—or an entire Wallet—after loss or compromise. Key Recovery is a major focus of the emerging DKMS standard for cryptographic key management.
Layer 1
The core, foundational infrastructure that an SSI ecosystem is built upon. In cheqd's case, the cheqd Network is Layer 1.
Layer 2
Within blockchains a Layer 2 is a separate ledger running adjacent to the Layer 1. Layer 2 Networks are used for efficiency and scaling. The outcome of Layer 2 transactions and interactions are recorded periodically back into Layer 1.
Level of Assurance (LOA)
A measure, usually numeric, of the Trust Assurance that one Entity has in another Entity based on a defined set of criteria that establish the amount of reliance the first Entity may accept from the second Entity in the performance of the criteria. LOAs are often defined in or referenced by Governance Frameworks.
Liquidity pool
Pools of tokens locked in smart contracts that provide liquidity in decentralized exchanges in an attempt to attenuate the problems caused by the illiquidity typical of such systems.
Main net
cheqd's Network has both a test net and a main net. The main net is the Network where live and public transactions will take place after launch.
Minumum deposit
The minimum amount of tokens needed for a governance proposal to reach the stage where it is voted upon.
Mint
Minting a token simply means creating a token on-ledger
Node
A computer network server running an instance of the code necessary to operate a distributed ledger or blockchain. In cheqd Infrastructure, a Node is operated by a Node Operator running an instance of the cheqd Open Source Code.
Node Operator
The Entity responsible for running a node.
Open Governance
A governance model in which the Governance Authority is open to public participation, operates with full transparency, and does not favor any particular contributor or constituency.
Open Source License
Any form of intellectual property license approved and published by the Open Source Initiative.
Open Standards
Technical standards that are developed under an Open Governance process; are publicly available for anyone to use; and which do not lock in users of the standard to a specific vendor or implementation. Open Standards facilitate interoperability and data exchange among different products or services and are intended for widespread adoption. Many Open Standards have implementations that are available under an Open Source License.
Organization
A legal Entity that is not a natural person (i.e., not an Individual). Examples of Organizations include a Group, sole proprietorship, partnership, corporation, LLC, association, NGO, cooperative, government, etc. Mutually exclusive with Individual.
Overlay
A data structure that provides an extra layer of contextual and/or conditional information to a Schema. This extra context can be used by an Agent to transform how information is displayed to a viewer or to guide the Agent in how to apply a custom process to Schema data.
Pairwise
A direct relationship between exactly two Entities. Most relationships in the cheqd ecosystem will be likely Pairwise, even when one or both Entities are not Individuals. For example, business-to-business relationships are pairwise by default. A DID or a Public Key or a Service Endpoint is Pairwise if it is used exclusively in a Pairwise relationship. Pairwise relationships can exist entirely off-ledger.
Payment
A transfer of CHEQ or other cryptographically verifiable units of value from one Entity to another Entity.
Payment Address
The address of a Payment Transaction on the cheqd Network.
Permissionless
Permissionless blockchains are blockchains that require no permission to join and interact with.
Personal Data
As defined by the EU General Data Protection Regulation (GDPR), any information relating to an identified or identifiable natural person. In the GDPR, this natural person is called the Data Subject. Personal data SHOULD never be written to the cheqd Network.
Privacy by Design
A set of seven foundational principles for taking privacy into account throughout the entire design and engineering of a system, product, or service. Originally defined by the Information and Privacy Commissioner of Ontario, Canada.
Private Key
The half of a cryptographic key pair designed to be kept as the Private Data of an Entity. In elliptic curve cryptography, a Private Key is called a signing key.
Proof
Cryptographic verification of a Claim or a Credential. A digital signature is a simple form of Proof. A cryptographic hash is also a form of Proof. Zero Knowledge Proofs enable selective disclosure of the information in a Credential.
Proof request
The data structure sent by a Verifier to a Holder that describes the Proof required by the Verifier.
Pseudonym
A DID used to prevent correlation outside of a specific context. A Pseudonym may be Pairwise, N-wise, or Anywise.
Public Key
The half of a cryptographic key pair designed to be shared with other parties in order to decrypt or verify encrypted communications from an Entity. In digital signature schemes, a Public Key is also called a verification key. A Public Key may be either Public Data or Private Data depending on the policies of the Entity.
Quorum
The minimum number of participants in the Network who need to vote on a governance proposal for the vote to be valid.
Recovery Key
A special Private Key used for purposes of recovering a Wallet after loss or compromise. In the DKMS key management protocol, a Recovery Key may be cryptographically sharded for secret sharing.
Recovery Key Trustee
A Trustee trusted by another Identity Controller to authorise sharing back a Recovery Key for purposes of restoring a Wallet after loss or compromise.
Relying Party
An Entity that consumes Identity Data and accepts some Level of Assurance from another Entity for some purpose. Verifiers are one type of Relying Party.
Resolver
A software module that accepts an Identifier as input, looks up the Identifier in a database or ledger, and returns metadata describing the identified Entity. The Domain Name System (DNS) uses a DNS resolver. Self-Sovereign Identity uses a DID Resolver.
Revocation
The act of an Issuer revoking the validity of a Claim or a Credential.
Revocation Registry
An online repository of data needed for Revocation. In cheqd's Network Infrastructure, a Revocation Registry is a privacy-respecting cryptographic data structure maintained on the Ledger by an Issuer in order to support Revocation of a Credential.
Schema
A machine-readable definition of the semantics of a data structure. Schemas are used to define the Attributes used in one or more Credential Definitions.
Security by Design
A widely recognized set of principles for building security into systems, products, and services from the very start.
Selective Disclosure
A Privacy by Design principle of revealing only the subset of the data described in a Claim, Credential, or other set of Private Data that is required by a Verifier.
Self-Sovereign Identity (SSI)
An identity system architecture based on the core principle that individual Identity Controllers have the right to permanently control one or more Identifiers together with the usage of the associated Identity Data.
Service Endpoint
An addressable network location offering a service operated on behalf of an Entity. As defined in the DID specification, a Service Endpoint is expressed as a URI (Uniform Resource Identifier).
Slashing
The potential deduction of tokens for bad behaviour on the Network.
SSI Stack
A general representation of different technological functions and protocols that provide different functions on top of each other. The most common SSI stack is the Trust over IP stack.
Staking
In order to participate in cheqd Network governance, participants must allocate a proportion of their tokens to float on the Network. Staking is required to validate transactions and earn Staking rewards.
Sufficient decentralisation
The point at which the cheqd Network is spread amongst enough nodes that no one node is directly accountable for decisions on the Network. This is reached through the increasing of Entropy.
Token
A medium of interaction, either for pure utility or for payment transactions.
Tokenomics
The fundamental code and parameters that determines how the Network architecture runs.
Tombstone
A mark associated with a Transaction to suggest that the Transaction should no longer be returned in response to requests for read access.
Transaction
A record of any type written to the cheqd Network.
Verifiable Credential
A Credential that includes a Proof from the Issuer. Typically this proof is in the form of a digital signature.
Verifier
An Entity who requests a Credential or Proof from a Holder and verifies it in order to make a trust decision about an Entity.
Verinym
A DID that it is directly or indirectly associated with the Legal Identity of the Identity Controller.
Wallet
A software module, and optionally an associated hardware module, for securely storing and accessing Private Keys other sensitive cryptographic key material, and other Private Data used by an Entity. A Wallet is accessed by an Agent.
Zero Knowledge Proof
A Proof that uses cryptography to support Selective Disclosure of information about a set of Claims from a set of Credentials. A Zero Knowledge Proof provides cryptographic proof about some or all of the data in a set of Credentials without revealing the actual data or any additional information, including the Identity of the Holder.