Privy Labs Protocol Whitepaper v 1.0
  • Privy Labs Protocol
    • Introduction
      • The paradox of social media
      • The persistence of piracy
      • The bottom line
    • Solution Overview
    • Team
  • Our Philosophy & Values
    • 3 Core Tenets
    • Our Why
    • Why Web3
  • Our Approach
    • Problem-solving at the source
      • Core Primitives
      • Copyright - Originality, Creativity, & Fixation
      • The DMCA
      • Removal
  • The Core Technology
    • Systems Overview
      • Virtual Account System
        • Account Abstraction
        • Privacy
        • Gas
      • Content Certificate & Tracking System
        • Proof of Ownership
        • Watermarking
        • Encryption & Cryptography
        • Storage
        • Publicity & Privacy
      • Content Verification Network
        • Permissioned Approval
        • Takedown
  • Use Cases
    • Use Cases
      • Sensitive content: Adult creators, models, & sex workers
      • Content Creators
      • Digital artists & photographers
      • Journalists
      • Families
      • Celebrities
      • Social media platforms & creative marketplaces
      • Trust & Safety Organizations
  • PrivyCam
  • Governance & Community
    • Privy DAO
  • Tokenomics & Incentives
    • Incentive Model
  • Risks & Mitigants
    • Risks & Mitigants
  • Our Roadmap
    • Our Roadmap
Powered by GitBook
On this page
  1. The Core Technology
  2. Systems Overview
  3. Content Certificate & Tracking System

Proof of Ownership

Fundamentally, a blockchain stands to create associations within and between addresses; these associations are publicly observable and allow a global, single source of truth on computed state. After registering an on-chain presence using VAS, a user can begin to register ownership, storage locations, and allowed hosting domains of any content they own. Each registered piece of content has its own queryable footprint which describes the relationship between users, content, and domains at a given point in time. CCTS operates like a public switchboard, as opposed to a vending machine giving out tokens (as smart contracts are often described); on-chain associations and mappings are created and updated between users, content, and domains, with CCTS as a single source of truth. By establishing a “home” for a file, CCTS explicitly creates an allow-list (inside home domains) and deny-list (outside home domains) which can be modified at any point by a user.

PreviousContent Certificate & Tracking SystemNextWatermarking

Last updated 2 years ago