Fixing Digital Identity: Nuwa’s DID Approach

Arpit

Jul 16, 2025

Arpit

Jul 16, 2025

Arpit

Jul 16, 2025

The Identity Crisis No One Talks About

Earlier this year, over 16 billion account credentials were leaked in one of the largest data breaches in history, reminding us that our digital identities are often only as strong as a reused password.

Source: Cointelegraph

According to Microsoft, 99% of identity attacks stem from passwords. In order to truly secure our digital lives, we must move beyond passwords and embrace decentralized identity solutions.

Web3’s Identity Problem

This wave of credential leaks shows that traditional login systems are dangerously fragile, but Web3 has its own set of identity issues. Today, a crypto wallet acts as your identity. But wallets are anonymous, unlimited, and contextless, making them easy to abuse.

This leads to:

  • Sybil attacks: where one person uses many wallets to skew DAO votes

  • Impersonation: fake users hijack airdrops, social forums, and on-chain communities

  • Bot manipulation: spam wallets distort influencer campaigns or token launches

  • Lack of trust history: apps can’t distinguish between long-term users and new bots

A 2025 Chainalysis report found:

  • 43.8% of all crypto fund thefts from Jan–Nov 2024 stemmed from private key compromises

  • Another 6.3% were linked to security vulnerabilities, many tied to poor identity/authentication systems

This data makes one thing clear: Web3 doesn’t just need better wallets, it needs a better identity system.

Source: Chainanalysis

How DID’s Solve this..

Think of a DID (Decentralized Identifier) as a digital passport you fully control. Unlike email logins or KYC records, it isn't issued by a centralized entity.

Here’s how it works:

  • When you create a DID, it generates a pair of cryptographic keys, a private key (secret, known only to you) and a public key (shared openly).

  • This public key is stored on a decentralized network in a DID Document, which maps your identifier (your DID) to the public key.

  • When logging in or verifying identity, you digitally sign a message with your private key.

  • The receiving app or smart contract checks the signature using your public key, proving the message came from you, without exposing your private key or needing a password.

Each DID has a document that links it to your public key, the system uses that key to verify any message or action you perform.

What does a DID look like? A DID is a simple string made up of three parts: did:example:123456789abcdefghi

  • did → The URI scheme that indicates it’s a decentralized identifier

  • example → The DID method: a specific way to generate, update, and resolve the DID

  • 123456789abcdefghi → the method-specific identifier: a unique ID generated by the DID method

Each DID resolves to a DID Document, which includes important identity data such as public keys, verification methods, and service endpoints. This is how decentralized apps (dApps), agents, or services confirm your identity without relying on central servers.

Key Differences Between:

Traditional Password System:

  • Stores passwords in central databases

  • Passwords must be remembered and typed

  • Can be stolen in bulk

  • Vulnerable to phishing

DID-Based System:

  • No central password storage

  • Private keys never leave the device

  • Each authentication is cryptographic

  • Resistant to phishing

Real-World Use Cases for DIDs in Web3

DIDs aren’t just theoretical, they are solving real security and trust issues in crypto right now.

  1. Gitcoin’s Use Case of DID

Gitcoin’s launch of Passport during Grants Round 14 led to 22K+ users verifying their identity . By Round 15, verified users grew to 33.5K and $4.9M was fairly distributed, strengthening Sybil resistance and enabling trust-based funding across Web3. A hackathon with 270+ developers also accelerated adoption of DID-based tools.

  1. Use Cases by Governments & Corporations

According to the research paper "[A Survey of Decentralized Identity](https://arxiv.org/html/2402.02455v1#:~:text=SSI is based on the,engagement with the VC issuer.)", major governments and tech players are actively deploying Decentralized Identifiers (DIDs) at scale:

  • European Union: With eIDAS 2.0 and the EU Digital Identity Wallet, the EU is moving from federated logins to DIDs, giving users full control over their data. Projects like EBSI use DIDs and Verifiable Credentials (VCs) to verify educational records across borders, with universities like Bologna and Leuven already piloting the system.

  • United States: The Department of Homeland Security (DHS) has provided over $4 million in grants since 2016 to support DID-based solutions. In 2023, DHS sought new privacy-preserving digital credentialing systems for agencies like USCIS and CBP.

  • China: The RealDID initiative by the Ministry of Public Security and BSN targets 5 million decentralized IDs issued by 2024. China’s WeBank is also developing WeIdentity, a DID and VC-based ecosystem.

  • Microsoft: Microsoft’s Entra Wallet Library lets apps issue and verify credentials using secure, privacy-focused DIDs, one ID per interaction to protect users.

3. For KYC’s

Users can prove on-chain history (e.g., KYC, event attendance, ownership) without exposing personal data. Deloitte partnered with BOTLabs, the developers of KILT Protocol, to issue reusable digital credentials using DIDs. These credentials simplify KYC/KYB by allowing users to verify once and reuse across banks, DeFi apps, or e-commerce platforms without sharing all their personal information every time.

How Nuwa Implements DID Authentication

NUWA + DIDs: Building Trust in an AI-Powered World

NUWA is creating a marketplace for AI agents just like Amazon, but instead of products, you interact with smart AI services that perform tasks, answer questions, or even collaborate with other agents. But in a world full of AI, how do you know which agents to trust?

That’s where DIDs (Decentralized Identifiers) come in.

What Are DIDs in NUWA?

DIDs are like secure, digital passports for users, AI agents, and service providers. Each one gets a unique cryptographic ID that can’t be faked, copied, or tampered with.

How NUWA Uses DIDs

  1. Digital Identity for Everyone

    Every AI agent, user, and service provider is assigned a DID. This DID acts like a digital fingerprint proving their identity without revealing private details.

  2. Proof & Trust at Scale

    When an AI says “I’m from Company X” or “I have access to this dataset,” the DID system allows anyone to verify that claim instantly and securely.

  3. Secure Communication

    All interactions between agents and users are signed with their unique DIDs. This means messages can’t be spoofed, and every interaction is verifiably authentic.

Technical Breakdown

  • Unique ID for Everyone: Every user, AI agent, or service gets a Decentralized Identifier (DID).

  • Built-in Security:

    • Adds a timestamp + random code to stop message reuse (replay attacks).

    • Uses a domain tag so signatures can’t be misused elsewhere.

  • Digital Proof:

    • Each message is signed with your private key to prove it's really you.

    • The receiver checks your public key via your DID to instantly verify your identity.

  • No Middlemen: Everything is secure, verifiable, and doesn’t rely on a central authority.

Nuwa's DID system ensures trust, privacy, and security in every interaction

Conclusion:

From preventing Sybil attacks in Web3 to securing AI-powered interactions in platforms like NUWA, DIDs restore trust where passwords and wallets fall short. As adoption grows across governments, enterprises, and crypto-native apps, it’s clear: the future of identity is decentralized.

©Nuwa AI 2025 - All rights reserved.

©Nuwa AI 2025 - All rights reserved.