Tech Deep Dive
Karat aims to a new web3 standard of authentication and authorization called W3Auth. This new standard allows users to sign in with Ethereum, host their data on Karat Network, and maintain complete ownership and control over their data.
In the web2 world, we have OAuth 2.0 almost in every application. is an open standard protocol used for authorization and delegated access control. It allows a client application to access a user's resources on a separate web application, without the need for the user's credentials to be shared with the client application. OAuth 2.0 is widely used by web and mobile applications to access resources hosted on third-party web applications. Whenever you see login with Gmail, Facebook, or Twitter, oAuth 2.0 is used under the hood.
Auth in Web3
Compared to the traditional oAuth 2.0 flow, the W3Auth flow implemented by Karat Network is completely on-chain, providing greater transparency and control over user data. While oAuth 2.0 relies on a centralized authorization server to grant access to resources on behalf of the user, the W3Auth flow utilizes decentralized identity standards and smart contracts to ensure that user data is owned and controlled by the user. This eliminates the need for a trusted third party and creates a trustless environment where users can confidently authorize access to their data. Additionally, Karat Network's approach incentivizes users to participate in the network by earning rewards for providing access to their data, creating a more collaborative and beneficial ecosystem.
The W3Auth flow typically involves the following steps:
- User Authentication: The user authenticates their identity by signing in with their Ethereum wallet, such as MetaMask or WalletConnect. The user's wallet address serves as their unique identifier.
- Upload your data to Karat Network: Your data will be encrypted using MPC technology and uploaded to decentralized storage solutions such as Ceramic. The smart contract on Karat Network controls access to the user's data based on the permission granted by the user.
- Data Authorization: When a user visits a dApp, the dApp can request access to the user's data.The user authorizes access to their data by providing permission to the requesting party. This permission is stored on the blockchain and is transparent and auditable.
- Rewards: Users can earn rewards for participating in the network by providing access to their data. These rewards can be in the form of Karat tokens or other incentives.
Become a validator to be eligible for requesting users’ data.