FAQ

How do you plan to motivate participants to engage with D‑Scope?

D‑Scope uses a system of incentive pools, which can be created by curators — such as researchers, protocols, or DAOs. These rewards are not for random clicks, but for meaningful and verified contributions. The goal is to value quality over quantity, while preserving full user privacy.

How do you prevent Sybil attacks without KYC or identity verification?

We use Soulbound Tokens (SBTs) as non-transferable, cryptographic identity markers. They prove uniqueness and eligibility without revealing any personal information. Curators can define access criteria, ensuring the system remains Sybil-resistant and audience-specific.

Why not just use other traditional or centralized survey platforms?

Unlike centralized platforms, D‑Scope offers trustworthy data without sacrificing anonymity. Each participant is cryptographically verified, ensuring results are tamper-resistant, Sybil-resistant, and demographically filterable — without storing private data or exposing users. And unlike typical tools, D‑Scope is decentralized by design.

If users are anonymous, how do you prevent toxic or harmful content?

D‑Scope restricts the use of external links or manipulative prompts in surveys. Additionally, the protocol includes a dynamic reputation model, which filters out bad actors and restricts curator privileges based on behavior over time. Anonymity does not mean immunity — trust is earned through actions.

Can we use D‑Scope within our own protocol or platform?

Absolutely. D‑Scope is designed to be modular and integratable across DAO tools, DePINs, GameFi apps, or any frontend. It supports frontend widgets, API connections, and on-chain interactions via smart contracts.

What guarantees do users have that their data won't be leaked or sold?

With D‑Scope, raw data is never collected or stored. We rely on zk‑proofs to validate participation without knowing the identity or the content of the response. Soulbound profiles only confirm that the user meets the survey criteria — and even that information is invisible to everyone but the user.

Last updated