{"id":546,"date":"2025-07-14T07:22:04","date_gmt":"2025-07-14T07:22:04","guid":{"rendered":"https:\/\/news.ont.io\/?p=546"},"modified":"2025-07-14T07:22:06","modified_gmt":"2025-07-14T07:22:06","slug":"zk-is-the-new-https-ontology-spaces-in-a-nutshell","status":"publish","type":"post","link":"https:\/\/ont.io\/news\/zk-is-the-new-https-ontology-spaces-in-a-nutshell\/","title":{"rendered":"ZK Is the New HTTPS \u2013 Ontology Spaces In a Nutshell"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Intro<\/h2>\n\n\n\n<p>In this special Twitter Space, Ontology explores one of the most promising and misunderstood technologies in Web3: <strong>zero-knowledge proofs (ZKPs)<\/strong>. Joined by leaders from <strong>ZKPass<\/strong>, <strong>Veera<\/strong>, and <strong>Orange Protocol<\/strong>, the conversation dives deep into what ZK really enables\u2014from private onboarding to secure reputation\u2014and why the most powerful cryptographic tools work best when users don\u2019t even notice them.<br>Read the full post @ <a href=\"https:\/\/news.cryptosapiens.xyz\/zk-is-the-new-https\" target=\"_blank\" rel=\"noopener\">CryptoSapiens Newsletter<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83c\udf99\ufe0f Featured Speakers<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a class=\"\" href=\"https:\/\/x.com\/zkPass\">Francis Berwa<\/a> \u2013 ZKPass<\/li>\n\n\n\n<li><a class=\"\" href=\"https:\/\/x.com\/On_Veera\">Sam Noble<\/a> \u2013 CPTO at Veera<\/li>\n\n\n\n<li><a class=\"\" href=\"https:\/\/x.com\/humpty0x\">Humpty Calderon<\/a> \u2013 Ontology<\/li>\n\n\n\n<li>Geoff \u2013 Ontology<\/li>\n\n\n\n<li>Polaris \u2013 Ontology<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Five takeaways<\/h3>\n\n\n\n<p><strong>1. ZK is a \u201cyes-or-no\u201d machine<\/strong><br>Instead of revealing data, ZK lets users answer questions like \u201cAre you over 18?\u201d with a simple yes\u2014without showing ID or personal documents. That\u2019s the core utility: validation without exposure.<\/p>\n\n\n\n<p><strong>2. Sell the benefit, not the cryptography<\/strong><br>Users don\u2019t care about protocols\u2014they care about privacy, speed, and trust. Like SSL in your browser, ZK should work quietly in the background, solving real problems without technical friction.<\/p>\n\n\n\n<p><strong>3. ZK is already in consumer products<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/x.com\/On_Veera\">Veera<\/a><\/strong> uses ZK to reward users without tracking<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/x.com\/zkPass\">ZKPass<\/a><\/strong> enables private eligibility proofs for finance, telecom, and more<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/x.com\/OrangeProtocol\">Orange Protocol<\/a><\/strong> brings privacy-preserving credentials to DAOs and DeFi apps<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Proof replaces access<\/strong><br>The future of verification isn\u2019t about sharing your entire data set\u2014it\u2019s about <strong>attesting to what matters<\/strong>, like income, age, or balance thresholds, without exposing everything else.<\/p>\n\n\n\n<p><strong>5. ZK will soon be boring (and that\u2019s good)<\/strong><br>The most transformative tools\u2014like HTTPS\u2014fade into the background. ZK\u2019s future lies in invisibility: embedded in browsers, dating apps, and onboarding flows where privacy matters most.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Bigger picture<\/h3>\n\n\n\n<p>Zero-knowledge technology isn\u2019t just a blockchain breakthrough\u2014it\u2019s a <strong>universal privacy tool<\/strong> for Web2 and Web3. As data collection and AI surveillance increase, ZKPs offer a safer model: one that puts users in control, builds trust, and quietly rewires how we prove things online.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Where ZK Might Show Up Next<\/h3>\n\n\n\n<p>The panel shared future use cases where ZK could power real-world experiences:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>LinkedIn<\/strong> \u2192 Verify job history without exposing all past roles<\/li>\n\n\n\n<li><strong>Tinder<\/strong> \u2192 Match based on verified traits without revealing full profiles<\/li>\n\n\n\n<li><strong>Airbnb<\/strong> \u2192 Verify hosts\/guests without exposing personal documents<\/li>\n\n\n\n<li><strong>Calendars<\/strong> \u2192 Show availability without leaking event details<\/li>\n\n\n\n<li><strong>Immigration<\/strong> \u2192 Prove income eligibility without full financial access<\/li>\n\n\n\n<li><strong>Gaming<\/strong> \u2192 Cross-game reputation without doxxing behavior<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">TL;D<\/h3>\n\n\n\n<p>Zero-knowledge proofs let you <strong>prove more while revealing less<\/strong>. And that\u2019s exactly why ZK is poised to become the next HTTPS\u2014quiet, powerful, and essential for the next generation of secure digital experiences.<\/p>\n\n\n\n<p>\ud83d\udce3 <strong>Want more like this?<\/strong><br>Follow <a class=\"\" href=\"https:\/\/x.com\/OntologyNetwork\">Ontology<\/a> on X for future conversations on ZK, identity, and privacy.<\/p>\n\n\n\n<p>\ud83d\udc65 Connect with the speakers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a class=\"\" href=\"https:\/\/x.com\/zkPass\">ZKPass<\/a><\/li>\n\n\n\n<li><a class=\"\" href=\"https:\/\/x.com\/On_Veera\">Veera<\/a><\/li>\n\n\n\n<li><a class=\"\" href=\"https:\/\/x.com\/humpty0x\">Humpty Calderon<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udcda Recommended Reading<\/h2>\n\n\n\n<p>Check out the latest updates to <a href=\"https:\/\/ont.io\/news\/category\/did-and-privacy\/\">DID &amp; Privacy<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intro In this special Twitter Space, Ontology explores one of the most promising and misunderstood technologies in Web3: zero-knowledge proofs (ZKPs). Joined by leaders from ZKPass, Veera, and Orange Protocol, the conversation dives deep into what ZK really enables\u2014from private onboarding to secure reputation\u2014and why the most powerful cryptographic tools work best when users don\u2019t<\/p>\n","protected":false},"author":1,"featured_media":573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[17,18,19,20],"class_list":["post-546","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-did-and-privacy","tag-zero-knowledge-zk","tag-zkp-basics","tag-community-updates","tag-reputation"],"_links":{"self":[{"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/posts\/546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/comments?post=546"}],"version-history":[{"count":1,"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/posts\/546\/revisions"}],"predecessor-version":[{"id":574,"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/posts\/546\/revisions\/574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/media\/573"}],"wp:attachment":[{"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/media?parent=546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/categories?post=546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ont.io\/news\/wp-json\/wp\/v2\/tags?post=546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}