A comprehensive look at the past, present, and future of Web 3.0
Original: Web3 Foundation
Source: Polkadot Chinese Platform
Origins and Definition of Web 3.0
The term "web" has been widely used for 32 years, but few people know its definition and origin. In 1989, British scientist Tim Berners-Lee shared his vision of a "collaborative medium" at the European Organization for Nuclear Research (CERN), allowing researchers at CERN to share and update scientific research and information. Four years later, in 1993, he created the World Wide Web, ushering in a revolutionary era of the internet.
Web 1.0: Users as Content "Consumers"
Millions of people joined the ranks of scientists, quickly benefiting from interconnected computer systems; the number of people going online for information and entertainment surged. Service providers like AOL, Yahoo, and Google monetized advertising and became the ultimate profiteers during this period, which later came to be known as Web 1.0 (1991 to 2004). According to Graham Cormode and Balachander Krishnamurthy (https://firstmonday.org/article/view/2125/1972), "Content creators were few… the vast majority of users merely acted as consumers of content."
Web 2.0: Everyone as a "Content Creator"
The term Web 1.0 only emerged with the realization of Web 2.0 to provide a clear retrospective distinction between the two periods. Web 2.0 was coined by Darcy DiNucci and only gained widespread acceptance after Tim O'Reilly and Dale Dougherty promoted it at the O'Reilly Media Web 2.0 conference in 2004. Web 2.0 allowed any web user to participate in content creation. For example, they interact with friends on Facebook, post on blogs, and share videos and images on YouTube or Instagram.
This exciting trend of user interaction has rendered less adaptive internet companies obsolete. This phenomenon is similar to users searching for specific topics on social media platforms like YouTube and Twitter, rather than passively reading articles on AOL and Yahoo.
While Web 2.0 did not replace Web 1.0 (they are not simply a binary division) — the latter is still widely used and characterized by "read-only" — Web 2.0 provided interactivity and remains mainstream. Web 2.0 has sparked rich imaginations about Web 3.0.
Mapping Web 3.0
Artificial intelligence has matured and is now embedded in every user interaction on the web. Algorithms analyze and infer data generated from user interactions, recommending additional articles or products based on user preferences. Tim Berners-Lee envisioned the semantic web as Web 3.0, where machines would ultimately process information like the human brain. In short, messages can be understood contextually and conceptually.
Thus, Web 3.0 is predicted to be: machines that understand all data (semantic web) will optimize problem-solving through machine learning (artificial intelligence), providing an ideal premise for a digital ecosystem where data can be shared across devices (Internet of Things). However, the direction of Web 3.0 changed after the advent of blockchain technology.
Web 3.0 After the Emergence of Blockchain Technology
Before blockchain, all speculations about Web 3.0 were dashed due to overestimations of machine learning and a lack of practical implementations. Blockchain, with its original technology, will continue to realize the integrity and value of the internet while providing a new perspective for Web 3.0.
Meanwhile, a decisive event occurred in the summer of 2013 in the United States. Edward Snowden revealed highly classified information about the global surveillance program (PRISM) implemented by the National Security Agency (NSA) to The Guardian and The Washington Post. Snowden immediately flew to Hong Kong and sought asylum in Russia. Shortly after his arrival, he disclosed more details about the UK surveillance program.
The "PRISM" incident exposed the harsh reality of mass surveillance of citizens' communications by the US and UK through unconstitutional means, secretly infringing on citizens' privacy. The vulnerability of strictly relying on governments or corporations to protect user privacy proved the foresight of the cyberpunk movement (a group of individuals voluntarily advocating for cryptography and privacy-enhancing technologies).
Gavin Wood, founder of Polkadot and co-founder of Ethereum, recognized the flaws in the current internet environment and introduced his vision of Web 3.0 while building Ethereum:
"Web 3.0 is a set of compatible protocols that provide building blocks for application developers. These building blocks replace traditional web technologies like HTTP, AJAX, and MySQL, but offer a whole new way to create applications. These technologies provide users with strong, verifiable guarantees about the information they receive, the information they provide, the information they pay for, and the returns they receive. By empowering users to act for themselves in low-barrier markets, we can ensure a reduction in opportunities for censorship and monopolization. Web 3.0 can be seen as an executable charter — it is the foundation for individuals to stand against authoritarian power."
In summary, Wood's perspective addresses all issues related to the flaws of Web 2.0 and the problems exposed by the PRISM scandal — including centralization, data privacy, and the monopolization by tech giants. He defines Web 3.0 as a series of scalable technological frameworks that provide unprecedented methods for building new applications. These solutions ensure a transparent network through data decentralization, enabling individuals to regain control over their digital identities, assets, and data privacy. Therefore, Gavin Wood also describes Web 3.0 as "the web of the post-Snowden era."
Reasons for Focusing on Web 3.0 After the Emergence of Blockchain
As mentioned earlier, the semantic web version of Web 3.0 describes a bright future for the internet but does not address the existing issues of Web 2.0. Web 3.0, using blockchain technology (as Wood suggested), will alleviate the shortcomings of the current internet while being compatible with the semantic web.
Web 1.0 and Web 2.0 have already been defined, while Web 3.0 is still in the process of being defined. It serves as a lighthouse guiding the future of the internet. In addition to Ethereum and Polkadot, many projects utilizing blockchain technology, such as Filecoin and Blockstack, have emerged since Wood conceptualized Web 3.0. Annual Web 3.0 events are also becoming increasingly popular.
Why We Need Web 3.0
Recognizing what is missing in the modern digital world, certain illusions in cyberspace are cognitively necessary. The transition from Web 1.0 to Web 2.0 embodies the infinite possibilities in cyberspace, where users can choose to be both content consumers and content creators. This collective exchange of content exposes our inner imperfections, and it is these imperfections that inspire our pursuit of a "perfect internet."
Inherent Flaws of Web 2.0
The most significant achievement of Web 2.0 is the transfer of most tasks from the real world to the internet. This concept has helped achieve substantial transformations in the internet, making our society more efficient and interconnected. However, the social structure of the global economy remains unchanged online; the unfair distribution of wealth and power persists. The issue of centralization remains unresolved; instead, it has worsened as the amount of data generated daily increases. The mismanagement of user data by large tech companies has led to the abuse of this data by illicit entities. Therefore, data security and privacy protection have become urgent issues that need to be addressed.
What Web 3.0 Can Bring Us
As Wood mentioned, the distinction between Web 2.0 and 3.0 is subtle from the user's perspective in its early stages. Web browsers may look the same but will be referred to by different names, such as "wallet" and "key repository." These new web aspects will serve as our online IDs with our asset information. They can conveniently identify individuals, facilitate fund transfers, asset exchanges, and payments over the internet without involving other identity services. In this open and transparent new market, trusted groups, insurance institutions, and backup services will compete globally. Users will not be deceived by prices or rent-seeking, nor will their data be leaked.
Web 3.0 will redefine the "digital age." We do not yet know how incredibly the new internet world will develop. Nevertheless, we firmly believe it will lead us toward an internet characterized by efficiency, fairness, integrity, and value. It also prompts us to ask questions like, "What will the subsequent development of Web 3.0 be?" and "What new forms will Web 3.0 take?" These questions require us to think at a higher level.
Current Status and Development Path of Web 3.0
As blockchain technology inevitably becomes the focal point, Web 3.0 also aims at decentralization, integrity, and tamper-proofing. In the new generation of internet technologies, everyone focuses on their data, identity, and destiny. Besides blockchain, there are artificial intelligence, decentralized data storage protocols, and highly secure cryptography, all illuminating the path toward the blueprint of Web 3.0.
On this path to the blueprint, the first obstacle is issues related to data storage and transmission, which are foundational to Web 3.0. These two practices are also the basic framework for some blockchain applications. The second obstacle to consider is the feasibility of embedding digital identities into these applications. Finally, we need to present web browsers and user interfaces in a way that the public is familiar with.
Zero/Low Trust Interaction Protocols (Blockchain)
Blockchain technology confirms the value of products and the integrity of all parties, which is a key feature for realizing Web 3.0. However, Web 3.0 lacks reliable, decentralized interaction protocols to communicate internal functions. Therefore, many industry professionals are building fundamental underlying protocols to support Web 3.0 to fill this gap, with Polkadot being the solution built by Wood.
Decentralized Storage
We have mentioned the importance of data on different occasions. Many countries have implemented internet data privacy laws, raising awareness of data security. Attempting to protect data usage and its storage security within the current internet system without legal regulation will be futile. This situation has sparked breakthroughs in several decentralized data storage technologies, including IPFS. It is still uncertain whether IPFS will be widely used, but at least we have realized that using centralized servers may pose data leakage vulnerabilities. The significant data breach incident at Facebook further confirms this potential crisis.
Decentralized Communication and Computing
Polkadot aims to become the primary platform for data transmission and asset exchange in Web 3.0. To achieve this, Polkadot needs to develop a user-friendly model as a foundation. The foundation will support efficient blockchain development tools (Substrate: https://www.substrate.io/) and accommodate multiple economies by facilitating all transactions within the ecosystem.
Only when such a decentralized framework is assembled can we further consider the realization of decentralized communication and computing. After all, without a solid foundation, even the best ideas are worthless. This applies to projects like Polkadot and Ethereum as well.
Decentralized Applications
When it comes to applications, data protection and data privacy are widely discussed topics, especially as some mobile applications use unauthorized data collection. These issues arise from the dichotomy between systems and software, making decentralized applications (dapps) a solution to this inherent systemic flaw.
The second-quarter report shows that there are over 2,400 dapps on Ethereum, which is currently the most widespread dapp network. While it cannot compare to the number of applications on the current internet, it is sufficient to show the trend of blockchain technology gradually maturing. We are one step closer to the future, and our vision for the new network is feasible; applications will no longer use data collection and usage that allows unauthorized access.
Decentralized Identity
When we use a new application on a Web 2.0 mobile device, the process of data collection occurs. In a centralized internet network, companies can unintentionally disclose user data to third parties through unconscious data leaks, whether voluntarily or involuntarily. Even one of the tech giants known for its strong data protection protocols, Facebook, has not been able to avoid being a victim of multiple significant data breaches. With users' rights continually being infringed upon, it is essential to ensure the security of users' digital identities and information.
Decentralized Identity (DID) is the method Web 3.0 uses to address this issue. DID is a set of fully decentralized identities that allows individuals or entities to fully own their digital identity and related data. Simply put, we have absolute ownership of our digital identity. When users register applications using DID, they can use these applications while protecting their data privacy without interference from central entities.
The two mainstream standards for DID are set by the World Wide Web Consortium (W3C) and the Decentralized Identity Foundation (DIF). In addition to these two standards, Software, ArcBlock, uPort, lifeID, Sovrin, Blockstack, and several other companies have their own definitions and protocols for DID.
User Interface Optimization
Another important project in Web 3.0, Blockstack, is a blockchain browser application that integrates decentralized data, decentralized applications, and user data. In a decentralized internet, users have various identities, related data streams, and proprietary data. Users can store data on their devices or in the cloud, independent of third-party entities. Meanwhile, developers can build locally running decentralized applications using users' APIs (application programming interfaces). This allows users to access their information without worrying about data storage issues.
Users retrieve their data ownership from Blockstack using this technology. This blockchain application guarantees the security of users' data. Users can then freely transfer their proprietary data in any form they like, without being restricted by the platform.
Many similar platforms and applications are also rapidly developing. This includes the Metamask plugin on Ethereum, which allows users to directly use their wallets on PC browsers and even access dapps. Last year, the number of active users on Metamask exceeded 1 million. Meanwhile, the popularity of DAOs (Decentralized Autonomous Organizations) and Web 3.0 further drives user engagement.
Future Roadmap
The characteristic of blockchain is to digitize various aspects of daily life through its unique technology. This transformation is inevitable, prompting us to wonder what the future digital world will look like. Imagine a future where both the real world and the digital world are equally important to us — when all users register to enter the digital realm, a checkpoint will be needed to verify them.
Our interactions in the future digital world will no longer be limited to two-dimensional methods such as QR codes, text, sound, or video. Users will be able to explore a three-dimensional digital world in the form of avatars. These users will be able to log into applications, participate anonymously in online social activities, and attend gatherings with hidden identities (unless they introduce themselves). Users will transact as they do in real life without having to disclose their identity or asset information.
Anonymity will no longer be a breeding ground for crime — instead, it will protect users' privacy. For example, when malicious activities are detected, the system can assess all activities that may affect the user's credit score, as identities will be paired with the credit system. Those with low credit scores will be banned from using the application. Users can remedy their credit scores through measures such as paying fines, but negative credit records cannot be tampered with and can be viewed at any time. Anonymous identities will correspond to digital identities and real identities in decentralized KYC (Know Your Customer) standards to prevent any potential malicious behavior.
In addition to having virtual identities in the digital world, we can also own our digital assets, such as "user-owned tools" or real estate in games. The usage rights and value of houses are verified through decentralized storage and decentralized computing. Blockchain technology ensures that these digital assets are decentralized. Algorithms combined with decentralized governance can protect buyers' ownership of properties.
Conclusion
The internet has undergone tremendous changes over the past 30 years. This development has provided a perfect stage for the rise of tech giants like Google, Amazon, Facebook, Tencent, and Alibaba. Whether the internet can maintain this momentum before the public loses trust in online security remains to be seen.
Silicon Valley legend Tim O'Reilly (a leader in the open-source movement and Web 2.0) mentioned in his book, "Compared to complex and centralized systems, simple and decentralized systems are more likely to foster new possibilities because they can evolve faster." Within the framework of simple rules, each decentralized component can find its adaptive pattern. Higher-performing underlying protocols will be upgraded, while lower-performing protocols will be phased out."
The prospect of the new internet will be an adventurous journey filled with thrills. The future internet will be fundamentally transformed by blockchain, artificial intelligence, or other unknown technologies, while also bringing more value to Web 3.0. We do not know whether the upcoming changes will be a cognitive awakening or merely an unstoppable advancement of the current internet — but a new movement is beginning to stir beneath the calm surface.