Components and Flow

Understanding how D‑Scope works means following the real journey of a user — from their first interaction to the final aggregation of data. Below is a walk-through of the key components that make up this process:

  1. User Onboarding: Entering the D‑Scope Portal Upon visiting a survey or being invited to participate, a user connects their wallet — but without exposing any identity data. Instead of relying on KYC or email, D‑Scope uses ZK-based uniqueness verification to ensure the user is real and singular.

Think of it as proving “I’m a unique human” — without saying who you are.

  1. Identity Binding: Soulbound Profile Once uniqueness is confirmed, the user links to a soulbound profile — an identity bound to the user but not transferable. This identity includes cryptographic markers that allow trust-building over time (e.g., survey history, participation reputation), but no private data is stored or revealed.

  2. Survey Submission: Encrypted Input Users respond to surveys directly via a secure interface. Each response is encrypted locally, and tied to the soulbound ID. This prevents tampering, ensures origin authenticity, and supports future verifiability.

  3. Onchain Verification Once submitted, the encrypted response is verified onchain via ZK proofs. This step certifies:

the answer came from a unique verified user,

the user didn’t respond multiple times,

the data is trustworthy without revealing content.

No raw answers are stored onchain — only cryptographic proofs and references.

  1. Aggregation & Analytics Verified answers are aggregated off-chain, then visualized in dashboards. Because of the cryptographic binding to unique users, the resulting statistics are:

tamper-resistant

Sybil-resistant

demographically segmentable

This ensures research-level data quality without compromising user privacy.

Last updated