Fixing Digital Identity: Nuwa’s DID Approach
The Identity Crisis No One Talks About
Earlier this year, over 16 billion account credentials were leaked in one of the largest data breaches in history, reminding us that our digital identities are often only as strong as a reused password.

Source: Cointelegraph
According to Microsoft, 99% of identity attacks stem from passwords. In order to truly secure our digital lives, we must move beyond passwords and embrace decentralized identity solutions.

Web3’s Identity Problem
This wave of credential leaks shows that traditional login systems are dangerously fragile, but Web3 has its own set of identity issues. Today, a crypto wallet acts as your identity. But wallets are anonymous, unlimited, and contextless, making them easy to abuse.
This leads to:
Sybil attacks: where one person uses many wallets to skew DAO votes
Impersonation: fake users hijack airdrops, social forums, and on-chain communities
Bot manipulation: spam wallets distort influencer campaigns or token launches
Lack of trust history: apps can’t distinguish between long-term users and new bots
A 2025 Chainalysis report found:
43.8% of all crypto fund thefts from Jan–Nov 2024 stemmed from private key compromises
Another 6.3% were linked to security vulnerabilities, many tied to poor identity/authentication systems
This data makes one thing clear: Web3 doesn’t just need better wallets, it needs a better identity system.

Source: Chainanalysis
How DID’s Solve this..
Think of a DID (Decentralized Identifier) as a digital passport you fully control. Unlike email logins or KYC records, it isn't issued by a centralized entity.
Here’s how it works:
When you create a DID, it generates a pair of cryptographic keys, a private key (secret, known only to you) and a public key (shared openly).
This public key is stored on a decentralized network in a DID Document, which maps your identifier (your DID) to the public key.
When logging in or verifying identity, you digitally sign a message with your private key.
The receiving app or smart contract checks the signature using your public key, proving the message came from you, without exposing your private key or needing a password.
Each DID has a document that links it to your public key, the system uses that key to verify any message or action you perform.
What does a DID look like? A DID is a simple string made up of three parts: did:example:123456789abcdefghi
did → The URI scheme that indicates it’s a decentralized identifier
example → The DID method: a specific way to generate, update, and resolve the DID
123456789abcdefghi → the method-specific identifier: a unique ID generated by the DID method
Each DID resolves to a DID Document, which includes important identity data such as public keys, verification methods, and service endpoints. This is how decentralized apps (dApps), agents, or services confirm your identity without relying on central servers.
Key Differences Between:
Traditional Password System:
Stores passwords in central databases
Passwords must be remembered and typed
Can be stolen in bulk
Vulnerable to phishing
DID-Based System:
No central password storage
Private keys never leave the device
Each authentication is cryptographic
Resistant to phishing
Real-World Use Cases for DIDs in Web3
DIDs aren’t just theoretical, they are solving real security and trust issues in crypto right now.
Gitcoin’s Use Case of DID
Gitcoin’s launch of Passport during Grants Round 14 led to 22K+ users verifying their identity . By Round 15, verified users grew to 33.5K and $4.9M was fairly distributed, strengthening Sybil resistance and enabling trust-based funding across Web3. A hackathon with 270+ developers also accelerated adoption of DID-based tools.
Use Cases by Governments & Corporations
According to the research paper "[A Survey of Decentralized Identity](https://arxiv.org/html/2402.02455v1#:~:text=SSI is based on the,engagement with the VC issuer.)", major governments and tech players are actively deploying Decentralized Identifiers (DIDs) at scale:
European Union: With eIDAS 2.0 and the EU Digital Identity Wallet, the EU is moving from federated logins to DIDs, giving users full control over their data. Projects like EBSI use DIDs and Verifiable Credentials (VCs) to verify educational records across borders, with universities like Bologna and Leuven already piloting the system.
United States: The Department of Homeland Security (DHS) has provided over $4 million in grants since 2016 to support DID-based solutions. In 2023, DHS sought new privacy-preserving digital credentialing systems for agencies like USCIS and CBP.
China: The RealDID initiative by the Ministry of Public Security and BSN targets 5 million decentralized IDs issued by 2024. China’s WeBank is also developing WeIdentity, a DID and VC-based ecosystem.
Microsoft: Microsoft’s Entra Wallet Library lets apps issue and verify credentials using secure, privacy-focused DIDs, one ID per interaction to protect users.
3. For KYC’s
Users can prove on-chain history (e.g., KYC, event attendance, ownership) without exposing personal data. Deloitte partnered with BOTLabs, the developers of KILT Protocol, to issue reusable digital credentials using DIDs. These credentials simplify KYC/KYB by allowing users to verify once and reuse across banks, DeFi apps, or e-commerce platforms without sharing all their personal information every time.
How Nuwa Implements DID Authentication
NUWA + DIDs: Building Trust in an AI-Powered World
NUWA is creating a marketplace for AI agents just like Amazon, but instead of products, you interact with smart AI services that perform tasks, answer questions, or even collaborate with other agents. But in a world full of AI, how do you know which agents to trust?
That’s where DIDs (Decentralized Identifiers) come in.
What Are DIDs in NUWA?
DIDs are like secure, digital passports for users, AI agents, and service providers. Each one gets a unique cryptographic ID that can’t be faked, copied, or tampered with.
How NUWA Uses DIDs
Digital Identity for Everyone
Every AI agent, user, and service provider is assigned a DID. This DID acts like a digital fingerprint proving their identity without revealing private details.
Proof & Trust at Scale
When an AI says “I’m from Company X” or “I have access to this dataset,” the DID system allows anyone to verify that claim instantly and securely.
Secure Communication
All interactions between agents and users are signed with their unique DIDs. This means messages can’t be spoofed, and every interaction is verifiably authentic.
Technical Breakdown
Unique ID for Everyone: Every user, AI agent, or service gets a Decentralized Identifier (DID).
Built-in Security:
Adds a timestamp + random code to stop message reuse (replay attacks).
Uses a domain tag so signatures can’t be misused elsewhere.
Digital Proof:
Each message is signed with your private key to prove it's really you.
The receiver checks your public key via your DID to instantly verify your identity.
No Middlemen: Everything is secure, verifiable, and doesn’t rely on a central authority.
Nuwa's DID system ensures trust, privacy, and security in every interaction
Conclusion:
From preventing Sybil attacks in Web3 to securing AI-powered interactions in platforms like NUWA, DIDs restore trust where passwords and wallets fall short. As adoption grows across governments, enterprises, and crypto-native apps, it’s clear: the future of identity is decentralized.