Dear Elon, This Is How to Decentralize Twitter and Give the Internet Back to Everyone

Dear Elon!

Congratulations on purchasing Twitter! We are watching the process with interest because of all the times you have mentioned the importance of decentralization. It sounds like you and your team have the vision to use this amazing platform as a lever to launch a more mature and self-sovereign web.

With the right design, Decentralized Twitter will enable a new type of Internet that fundamentally changes the relationship between users and platforms. People can own the data they generate through applications on the web.

David Sneider is the co-founder of Lit Protocol, a decentralized cryptography network.

profiles, posts, A look at Twitter’s ( TWTR ) product lines, such as messaging and advertising, can provide insight into what a self-sovereign web will look like and how early adopters will do.


I will tell you as much as I can Your letters Along with former Twitter CEO Jack Dorsey, you seem to believe that Twitter today is below the limits of the usefulness it can provide. To be more useful to users and develop more as a “protocol” than as a company; We can learn a lot from email.

Email is a protocol. You may be using Microsoft Office; Maybe Dorsey is using Proton; I’m using Gmail. We can all easily message each other and stay in the same thread, but view and write our emails through different application interfaces (e.g. Outlook, Gmail).

Also Read :  Dell Has the Only Nintendo Switch OLED Black Friday Deal We've Seen

See also: Why is the development of the Decentralized Web stalling? | opinion

This model is Filecoin, Arweave, It can be extended to social media using systems like Ceramic and Polybase. Users’ connections and posts are not confined to a single “walled garden” like Twitter or Facebook, but live on the open web. This data is encrypted and authenticated (and therefore monetized) via cryptographic access control (like what Lit is building).

decentralized; User sovereignty and privacy-focused social media protocols allow users to consent to which applications and connections can see their content through interface platforms such as email.

getting Started.

One of Web3’s biggest hurdles is the wallet user experience. For some people, Managing the keys yourself is a privilege, but a burden to many more. As a result, interest in multiparty computing (MPC) has surged in the past year.

MPC wallets allow users to log in traditionally; It allows them to access apps with their wallets via PIN and biometrics, or without relying on central control that relies on a key holder.

Public User Data

For parts of public social graphs like Twitter today; There are already several active projects creating open-source infrastructure to help people own their data. Lens Protocol and Orbis, for example, are now live.

Also Read :  Harris to announce over $13 billion in assistance to help cut energy costs this winter

Personal User Data

Yes, Not all social data is public. A person’s connections; profile information; Basic elements of social networking and media, such as posts and messages, are private, meaning that only authorized people can view them. or at least It would be nice to have that option.

At Twitter today, this data is largely locked away within the servers of Twitter and Facebook. Another option would be to store this data encrypted on the open web and give fine-grained access control to the user who can decrypt it.

This is not a new idea in online social networking; This system replicates the Pretty Good Privacy (PGP) encryption program that dates back to the early days of the web and is still widely used. (PGP allows people to post their public key anywhere, and receive messages that only the holder of the private key can read.)

Threshold cryptography enhances these privacy standards by allowing users to create rules around who can view their posts. If decentralized social protocols are widely adopted; This encrypted data can be used on the “open web”.

for example, Alice can make a post with a setting that says “Anyone on my friends list can see this post.” Alice’s friend Bob can decrypt the post on any platform by proving his identity via a signature from his wallet.

Also Read :  Street Fighter 6 second closed beta test set for December 16 to 19


Ads are considered a dirty topic in some Web3 circles, but the reality is that only about 10% of Internet users pay for premium apps and software. This means that most people use software services with ads.

Tracking a “conversion” for a purchase involves some software that a publisher (eg Twitter) runs that points to advertisers (eg an e-commerce store) that a user clicked on. Advertising. When that person makes a purchase, Compensates the publisher.

This can also be decentralized. The above system for user data can also be used for ad placement. After writing the “last click” to a person’s data center (encrypted and stored on the open web) as verifiable proof, the advertiser can get permission to encrypt this data.

See also: Decentralized Mystique

As global regulators continue to crack down on tracking cookies, incorporating the user and his or her consent into tracking ad clicks and conversations offers a long-term path forward for ad-supported publishers.

The next step

Decentralized networks that will provide global scale are still maturing, but there has never been a better time to lay the groundwork. If you’re Elon Musk or any other ambitious developer with an eye on the future of social networking and media; Please get in touch.


Leave a Reply

Your email address will not be published.

Related Articles

Back to top button