Trusted Anonymous DAO
The goal of this process is to create a DAO that the public can weakly trust, while protecting DAO participants from wrench attacks by someone looking to takeover the DAO.
- A secret is given out to
npublicly trusted individuals.
- The individual's with secrets are instructed to secretly nominate one person they trust to participate in the DAO.
- The nominated individuals all sign the secret and publish the signature plus the address they signed with publicly (and anonymously).
- Nominated individuals should accept multiple nominations if offered, and not tell anyone they were nominated multiple times.
- Nominated individuals are strongly encouraged to participate, but they should not inform their nominator if they fail to participate.
- After a pre-defined amount of time has passed, all valid signatures (verifiable by anyone who has seen the secret) are collected and the trusted individuals all assert that:
- They agree that the published list includes all valid addresses.
- Their nominee has asserted to them that "if I submitted an address, it has shown up in the valid list".
maddresses are removed from the list via some random game (e.g., commit reveal).
- Whichever nominee had their address removed MUST anonymously publishes their private key.
- Everyone on the internet claims to have been nominated, but also claims they were randomly selected out.
- Someone who was not nominated funds all of the nominated addresses with gas money (so the addresses can remain fully detached).
If any step above fails, start the game over again.
- The second degree trust network (nominees) gives the public a certain amount of trust that the system is being operated by people who are probably "good people", because their first degree trust connections said so.
- Actual signers have plausible deniability as they can claim to either never have been nominated or can claim that they were nominated but selected out.
- Trusted public figures have plausible deniability because they can claim to have nominated someone other than themselves, or can claim that they were randomly selected out.
- By publicizing the private key of the selected out participants, anyone can prove that they joined the pool with that address, since even if compelled to "produce the private key you signed up with" they can produce a private key that was part of the pool.