DID standards are fragmented. W3C's DID-Core is a specification, not an implementation, leading to incompatible ecosystems from Microsoft ION to Sovrin.
Why Your DID is Trapped in a Wall Garden
A cynical analysis of how decentralized identity protocols, from Ceramic to on-chain attestations, have failed to solve data portability, creating new walled gardens. We map the interoperability landscape and the emerging solutions.
Introduction
Decentralized Identifiers (DIDs) are fragmented across closed ecosystems, preventing true user sovereignty.
Your identity is siloed by design. A Verifiable Credential issued in the Polygon ecosystem is not natively portable to a Base application, creating protocol-specific lock-in.
The cost is user agency. This fragmentation forces developers to build redundant verification logic and users to manage multiple, context-specific identities.
Evidence: The Ethereum Foundation's Sign-In with Ethereum (EIP-4361) demonstrates a functional, chain-agnostic standard, yet adoption remains isolated from other DID stacks.
The Three Layers of the DID Silos
Decentralized Identifiers promise user sovereignty, but current implementations are locked by three interdependent layers of vendor control.
The Protocol Prison
Your DID is anchored to a specific blockchain or consensus mechanism, making it non-portable. This creates protocol-specific identity silos like those on Ethereum (ENS), Solana (Bonfida), or Bitcoin (ION).
- Lock-in Effect: Switching chains requires re-issuance and re-verification.
- Fragmented Utility: DApps on one chain cannot natively verify credentials issued on another.
- Vendor Risk: Your identity's security and liveness depend on the underlying chain's health.
The Issuer Monopoly
Trust is centralized to a handful of credential issuers (KYC providers, universities, DAOs). This recreates Web2's gatekeeper problem within a decentralized shell.
- Centralized Trust Roots: You rely on the issuer's continued operation and honesty.
- Non-Fungible Credentials: Credentials from Issuer A are not interoperable with systems built for Issuer B.
- Revocation Bottleneck: The issuer holds the power to unilaterally revoke your verified status.
The Verifier Wall
Applications and smart contracts (the verifiers) are hardcoded to accept specific credential formats and issuers. This creates application-layer lock-in, stifling composability.
- Integration Friction: Each new verifier requires custom integration work, creating a $50k+ development cost barrier.
- Schema Incompatibility: A credential proving "age > 18" in one schema is meaningless to a verifier using a different standard.
- Market Fragmentation: Prevents the emergence of a liquid, cross-application reputation layer.
From Ceramic to EAS: A Taxonomy of Gardens
Decentralized identity systems are not interoperable by default, creating isolated data silos that contradict the promise of user sovereignty.
Decentralized Identity (DID) standards like W3C DIDs provide a portable identifier, but the attached verifiable credentials and social graphs are not portable. Your identity data is trapped within the issuing protocol's storage and verification logic.
Ceramic and EAS represent distinct garden models. Ceramic is a composable data network where DIDs anchor mutable data streams, creating a flexible but protocol-specific ecosystem. The Ethereum Attestation Service (EAS) binds attestations directly to a blockchain, offering global verifiability but with higher on-chain cost and rigidity.
The garden is defined by the root of trust. A Ceramic DID's data is only as portable as the nodes that replicate its streams. An EAS attestation's validity is universally checkable against its smart contract, but its semantic meaning requires off-chain schemas.
Evidence: The Fractal demonstrates this fragmentation. A Gitcoin Passport aggregates stamps from sources like BrightID and ENS, but the composite score is only valid within the Gitcoin/Grants Stack ecosystem, not a portable credential.
Protocol Silos: A Comparative Analysis
Comparison of dominant identity protocols based on interoperability, user sovereignty, and composability.
| Feature | ENS (Ethereum) | Worldcoin (World ID) | Solana Name Service (SNS) | Unstoppable Domains (Polygon) |
|---|---|---|---|---|
Primary Blockchain | Ethereum L1 | Optimism (Proof of Personhood) | Solana L1 | Polygon (Primary Settlement) |
Cross-Chain Resolution | ||||
Native Multi-Chain Support | EVM Chains via CCIP Read | Optimism, Base, Arbitrum via Bridges | Solana Only | EVM Chains via Partner Bridges |
Decentralized Registry Control | ||||
Annual Renewal Fee | ~$5 - $50+ (ETH Gas) | 0 WLD (Subsidized) | ~$20 (SOL) | $0 (One-time Purchase) |
Developer SDKs & Libraries |
| 1 Official (World ID Kit) | 1-2 Official | 3-4 Official |
Integrations (DeFi, Social, Gaming) |
| <50 (Gitcoin, Auth0, Telegram Bots) | ~100 (Jupiter, Phantom, Dialect) | ~200 (Brave, Shopify, Polygon dApps) |
Data Portability (Can export proof/graph) | Full Self-Custody of .eth NFT | Verified Credential (ZK Proof) Portable | Full Self-Custody of .sol NFT | Domain NFT Portable, Attestations Proprietary |
The Interoperability Frontier
Decentralized Identifiers promise user sovereignty, but current implementations are fragmented and non-portable, creating isolated identity silos.
The Verifier Lock-In Problem
DIDs are only as useful as the verifiers that accept them. Today, a credential from a DAO on Ethereum is useless for a DeFi app on Solana. This forces users to maintain multiple identities, defeating the purpose of a universal DID.
- Fragmented Reputation: Social graph and on-chain history are trapped per-chain.
- Vendor Capture: Platforms like ENS or SpruceID become de facto gatekeepers.
- No Network Effects: Value accrues to the verifying app, not the user's portable identity.
Solution: Aggregated Attestation Layers
Protocols like Ethereum Attestation Service (EAS) and Verax create a canonical, chain-agnostic registry for claims. By separating the issuance and storage of credentials from their verification, they enable portable trust.
- Sovereign Proofs: Credentials are stored off-chain (e.g., IPFS) with on-chain proof anchors.
- Universal Verification: Any app on any chain can verify the attestation's validity via a light client or oracle.
- Composable Identity: Credentials from Gitcoin Passport, Worldcoin, and DAOs can be aggregated into a single, portable profile.
Solution: Intent-Centric Identity Routing
Applying UniswapX's intent paradigm to identity. Instead of managing credentials, users express an intent ("prove I'm a accredited investor"). Specialized solvers (Rhinestone, Disco) compete to fulfill it using the most efficient credential mix across chains.
- User Abstraction: No need to know which chain your credential lives on.
- Solver Competition: Drives down cost and latency of proof aggregation.
- Cross-Domain Proofs: Leverages ZK proofs from Polygon ID or Sismo to create minimal, verifiable packets.
The Interoperability Mandate: W3C vs. Reality
The W3C DID standard is chain-agnostic, but implementations are not. ION (Bitcoin) doesn't talk to did:ethr (Ethereum). True interoperability requires a shared resolution layer that treats blockchains as dumb storage, not sovereign kingdoms.
- Standard Fragmentation: did:key, did:web, did:polygonid are all incompatible by default.
- Universal Resolver: Projects like DIF's Universal Resolver aim to be the DNS for DIDs, but lack economic incentives for adoption.
- The Endgame: Interoperability will be won by who provides the cheapest, fastest bridge for verifiable data, not the most ideologically pure spec.
The Steelman: Are Silos Inevitable?
Decentralized identity (DID) systems are structurally incentivized to become walled gardens, not open protocols.
Protocols become products. A DID standard like W3C Verifiable Credentials is a protocol. Its implementation by a company like SpruceID or Microsoft Entra becomes a product. The product's success depends on user lock-in, not protocol interoperability.
Data gravity creates moats. The DID issuer controls the credential revocation list and attestation service. This creates data gravity that pulls all subsequent verification and user activity into its orbit, mirroring the network effects of Facebook Login.
Interoperability is a tax. True cross-DID verification requires complex, stateful bridges between disparate systems. This adds latency, cost, and trust assumptions, a tax most applications will not pay. Projects like Polygon ID and ION prioritize their own ecosystem growth.
Evidence: Ethereum Name Service (ENS) demonstrates this. While a public good, its utility and value are trapped on Ethereum L1/L2s. Cross-chain ENS resolution via LayerZero or CCIP exists but is an afterthought, not a primary design goal, proving the silo incentive.
TL;DR for Builders and Investors
Decentralized Identifiers (DIDs) promise user sovereignty, but are trapped by fragmented infrastructure and competing standards.
The Interoperability Lie
W3C standards like did:ethr and did:key are just specs, not implementations. Each issuer (e.g., Coinbase Verifications, Gitcoin Passport) creates its own siloed credential format and verification logic.\n- Result: A credential from Protocol A is useless in Protocol B.\n- Cost: Developers must integrate dozens of bespoke SDKs, fragmenting user bases.
The Verifier's Dilemma
Every application must run its own trust framework and credential verification, a massive overhead. This centralizes risk and creates single points of failure.\n- Problem: Replicating KYC/AML checks for each dApp.\n- Solution Needed: Shared, decentralized verification layers like Ethereum Attestation Service (EAS) or Verax to separate issuance from trust.
The Data Locality Trap
Most DIDs store verifiable credentials on centralized HTTP endpoints or mutable smart contracts, breaking the core promise of user-owned data.\n- Risk: Issuer can revoke or alter credentials unilaterally.\n- Opportunity: Truly decentralized storage via IPFS, Arweave, or Ceramic Network is required for credible neutrality.
The VC Format War
The battle between W3C Verifiable Credentials (VCs) and Ethereum-centric Signed Statements (like EAS schemas) creates needless complexity.\n- Consequence: Builders must choose a camp, limiting their addressable market.\n- Emerging Solution: Cross-format bridges and abstraction layers (e.g., Disco's Data Backpack, SpruceID's Kepler) that translate between ecosystems.
The Sybil Resistance Fallacy
DIDs are often reduced to a Sybil-resistance tool for airdrops and governance, creating perverse incentives. Projects like Worldcoin or BrightID become centralized gatekeepers.\n- Outcome: Identity is commoditized, not empowered.\n- Real Need: Frameworks for selective disclosure and reputation portability across chains.
The Wallet Lock-In
Your DID is only as portable as your wallet's support. MetaMask Snaps, Rainbow, and Coinbase Wallet each have different, non-compatible identity stacks.\n- Barrier: Users cannot migrate identities without losing their social graph.\n- Path Forward: Standardized Sign-In with Ethereum (SIWE) extensions and ERC-4337 account abstraction to decouple identity from a single key pair.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.