Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
  79. 79. Typical vulnerabilities and bridge security in blockchain technology
  80. 80. JumpNet - Ethereum's new sidechain
Lesson 22 of 80
In Progress

22. New identity system – Polygon ID

In March 2022 Polygon launched a new service in its ecosystem. We are talking about a new type identity system, Zero-knowledge proof (ZKP). The solution is named Polygon ID and enables users of the ecosystem to verify their resources i identity without the need to disclose personal data.

One of the goals of the service is to stay ahead of regulationKYC (Know Your Customer), which will soon be an indispensable element of every company dealing with cryptocurrencies.

Polygon ID – what is it, and how does it work?

Polygon is a decentralized application layer (dApp) for Ethereum. In March 2022, the network launched Polygon ID, i.e. fully decentralized and private identity which works on blockchain technology.

Polygon ID protects users’ digital identity and gives them complete control over it, keeping virtually all information private. Generates something like an avatar of the user’s personal information without showing it confidential data. In this way, it enables free access to Web3 and the use of its resources.

This innovative technology is the first to be evidence-based Zero Knowledge (ZKP). In its operation, it uses the Iden3 protocol and the Circom ZK toolkit, which provides users with a decentralized and self-sufficient platform.

As Polygon co-founder Mihailo Bejlic said:Polygon ID is private by default. Offers on-chain verification and permissionless credentials. Within digital identities, there is now nothing that connects all these fields. It’s also a great demonstration of how zero-knowledge proofs can help us create a better world.” It’s hard to disagree with him. We wrote about zero-knowledge proofs here.

Bringing Polygon ID to market is done with affordable consumer tools. We are talking about native applications, SDK and white-label solutions.

The private chain will be verified with zkProof Request Language. It’s a protocol that defines the private attributes (e.g. voice) that the user must prove to Polygon. Products that will be equipped with this application include: Polygon ID Wallet, Polygon ID Platform and Polygon ID Connect.

The Polygon ID solution is a great tool for building identity and trust services, i.e. dAccess-as-a-Services, KYC, KYB, a new decision-making and management model, censorship-resistant P2P communication or building an extraordinary player profile in Web3.

Fun fact: Solutions based on a zero-knowledge proof are often very complicated, which is not conducive to their widespread adoption. Polygon successfully dealt with this problem by using Circom 2.0, streamlining the entire process while making it less complicated and accessible.

Polygon ID, as a decentralized competition for KYC

The foundation of the culture of the Web3 ecosystem is privacy and anonymity. No wonder that the rapid development of this industry has attracted the watchful eye of regulators. As a result, this translates into very strict KYC requirements for companies that operate in the Web3 and crypto area.

KYC requires potential users to provide confidential information. We are talking here about identity cards, passports or other documents issued by the government. This carries a massive risk of data leakage and violation of privacy that is so valuable to us.

Given these concerns, Polygon went into action by launching its new ID solution. Throughout the verification process, it removes the middlemen from this process and creates a fully decentralized way for KYC. The end user will create their digital identity, which will confirm his right to access, without having to disclose confidential data.


In the new generation Internet, we can’t do anything without our digital identity.

Polygon ID provides us with its complete hiding, while maintaining the benefits of the network. We do not have to worry that it will be stolen or fall into the wrong hands. This is a perfect example of how identity moves from the service provider to the user.

Polygon ID assumes a revolution in the Web3 market, and this is also the goal of the network. At the same time, it is a good impulse for people who avoided the world of cryptocurrencies, fearing for KYC verification.


And what about all this with the MATIC cryptocurrency? We can only speculate. Will its value increase with the popularity of Polygon ID, as predicted by analysts and investors? All we have to do is follow the cryptocurrency market and the quotations of this cryptocurrency.


Polygon ID is a new look at identity in the Web3 space. It is entirely based on zero-knowledge evidence and solves KYC issues on the next-generation internet. Of course, Polygon ID appeared first, but it probably won’t be the only tool of this type in the near future.