Decent ID, solves the problem of identity verification and provides a secure and decentralized way for users to verify their identities.
In the real world, identity verification is a common requirement for various services, such as banking, e-commerce, healthcare, and more. However, traditional identity verification methods can be cumbersome, time-consuming, and not always secure. Moreover, centralized identity verification systems are prone to data breaches and cyber attacks, which can compromise users' sensitive information.
DecentID's blockchain-based service provides a secure and decentralized alternative to traditional identity verification methods, reducing the risk of data breaches and cyber attacks. Additionally, DecentID makes the identity verification process fast and convenient, allowing users to easily register and verify their identity using their Metamask wallet.
By solving the problem of identity verification, DecentID enables users to access various services that require verified identities, such as e-commerce and other online platforms. Additionally, DecentID can also be useful in industries that require high levels of identity verification, such as healthcare and banking.
CORS issue while implementing API: When implementing an API, one of the major issues faced is CORS (Cross-Origin Resource Sharing) issue. This occurs when the client (browser) requests data from a different domain or port than the one the API is hosted on. To resolve this issue, you need to configure the server to allow cross-origin requests from your domain.
Finding an official govt API for Aadhaar verification: Another issue faced during the project was finding an official government API for Aadhaar verification. This is a critical component of the project, and finding a reliable source of information was crucial. This issue can be resolved by contacting the concerned authorities and requesting access to the required API.
Choosing a less resource-consuming ML model: Machine Learning (ML) models require a significant amount of computing resources. Choosing a model that is less resource- intensive is essential to ensure the smooth running of the application. This can be achieved by selecting a model that is optimized for resource usage, or by using techniques such as pruning to reduce the size of the model.
Hosting the project: Hosting a project can be challenging due to various issues such as the cost of the service or the time it takes to run. The cost of hosting services can be reduced by using cloud-based services such as AWS or Google Cloud Platform. Additionally, using load balancers and optimizing the code can help reduce the time it takes to run the project.
Ensuring the blockchain contract is fool proof: Blockchain technology is secure but requires careful implementation to ensure its safety. Ensuring that the blockchain contract is fool proof is critical to prevent any potential security breaches. This can be achieved by rigorous testing and auditing of the smart contract code to identify and address any potential vulnerabilities.
Tracks Applied (1)
Polygon Technology
Discussion