Hub
Hub
Token: HUB


Human Trust Protocol

ICO dates
Start date:
End date:

Registrated in: USA

Platform: Ethereum
Type: ERC20

PREMIUM ICO

Hub categories
Communication Cryptocurrency Platform
Hub whitepaper
Video
Hub token sale
KYC passing required No | Whitelist No | Restriction for countries No
Hub news, social
Hub search trends in Google
Random whitepaper excerpts

1. PROBLEMS.................................................................................................................................4
1.1. D
UNBAR
N
UMBER AND
T
RUST
-A
T
-A-D
ISTANCE
....................................................................................4
1.2. B
AD
I
NFORMATION
, T
OO
M
UCH
I
NFORMATION
....................................................................................5
1.3. T
RANSACTIONS
A
T
R
ISK
.....................................................................................................................5
1.4. C
ENTRALIZED
O
WNERS
, P
ARTIAL
D
ATA
, L
ACK OF
P
ORTABILITY
.................................................................5
1.5. D
IRECT
L
EARNINGS FROM
L
INKED
I
...

11.2.
11.3.
11.4.
11.5.
M
ESSAGING
...................................................................................................................................24
T
RANSACTIONS
............................................................................................................................... 24
S
ECURITY AND
P
RIVACY
....................................................................................................................24
I
NTEGRATION OF
HTP I
NTO THE
H
UB
A
PP
..........................................................................................25
12. DECENTRALIZED TRUST NETWORK DEFINITION.....................................................................26
12.1. D
ATA
S
TRUCTURE
...........................................................................................................................26
13. TASK TEMPLATE DEFINITI...

1. Problems
The rapid and massive consolidation of centralized platforms for social applications and peer-
to-peer marketplaces has led to several common problems of trust between strangers who are
engaged in both interactions and transactions. Interactions between strangers already number
in the hundreds of billions every day. In terms of transactions, it is estimated that by 2020 the
number of transactions on the Internet will reach 450 billion per day [3]. Scenarios where trust
cannot be assumed result in lost opportunities for these interactions and transactions, increase
the incidence of bad outcomes, and drive up cost and process friction. The challenges from the
lack of trust will only get worse as people increasingly turn to the Internet for more
interactions.
1.1. Dunbar Number and Trust-At-A-Distance
A convenient way to understand the problem is a proposed cognitive limit on stable
relationships known as the Dunbar number [4]. Anthropologist Robin Dunbar [5] theorized that
the aver...

1.2. Bad Information, Too Much Information
Many interactions on the Internet begin with people sharing information with others. Decisions
are made with the help of information, but bad content from potentially malicious sources
leads to faulty decisions. Consider the impact of social networks on political movements and
their recent role in electoral processes. Social systems are filled with “free
-
riders” including
spammers who offer low-quality information in the form of scams, fake news and fake ads.
Email is the largest messaging platform with 3.7 billion users [7] and 226 billion messages per
day [8], yet it is the one most notably absent of any facilitation of trust between users. As a
result, half
of today’s
email traffic is spam [9]

the flood of unwanted, unsolicited messages that
has become possible only because of the incredibly low costs of message creation and
transmission. Spam itself has created an opportunity for spam filter software and mailbo...

1.5. Direct Learnings from LinkedIn
Our direct experience from co-founding LinkedIn [11]
, the world’s most successful professional
social network with more than 500 million users, shows that despite a relatively dense web-of-
trust social network, a lack of trust still prevents large classes of interactions from effectively
occurring on the application. For instance, consider the falsification of professional profiles,
such as job titles, expertise employment length, university degrees, and so on [12] [13] [14]. In
addition, high incidents of spam InMail messages from strangers and self-promoting posts in
groups also permit some users to abuse the rest of their community. In retrospect, we still
could not design out significant instances of malicious user activity and untrustworthy use
cases. While these shortcomings serve to decrease trust among individual professionals, they
are also ironically detrimental to the business itself, limiting the effectiveness of ad targeting
and identification of...

adjudicated by participants, an arbitrator or oracle, or via some algorithmic means. Outcomes
are naturally task-dependent and can be expressed in the form of an acceptance or rejection of
a task, a rating, or a review. It is left to the definition of the specific task to represent outcomes
in their most appropriate manner.
The objective of the Protocol is to capture rich and raw reputation data by which Client
applications can enable users to make the best interpretation of trustworthiness.
2.2. Identity
Trust is assessed on individual identities and is a necessary foundation for the Protocol. Work
on decentralized, more secure,
self-sovereign identities
(SSIs) [19] are beginning with the
advent of distributed ledger technology in addition to established centralized platforms offering
identity services. The work on identity systems remains a competitive and evolving space
where new and improved standards will emerge. (For example, see [20].) Today, identity
systems also support mul...

We use the above concepts to motivate our solution, in which we construct a
decentralized
trust network
brought to life by a protocol. The network itself can be considered a
decentralized prediction market for future human behavior
. As Augur authors have suggested,
the value in decentralizing

in this case with human behavior

is to similarly revolutionize the
way people receive and verify trust with others [26].
3. Objectives for the Human Trust Protocol
Envision a world in which interactions and transactions between Internet strangers are
supported by a new trust layer on the Internet enabled by the Human Trust Protocol.
Reputation becomes self-sovereign under the control of users. With appropriate permissions,
anyone will be able to assess the relevant trustworthiness of anyone else with whom they are
about to engage, and users can transfer their trust from one community to any other. In short,
there is an opportunity to rework the underlying in...

3.2. Trust Should Be Verifiable
Verifiability means radically greater trust is possible because users can verify trust based on
reliable source information. Trust should be verifiable in two ways: (1) the fine-grain
interactions that lead to trust can be made available for inspection by other users, assuming
permission for disclosure has been given; (2) the outcomes of interactions have been validated
(and digitally signed) by participants of the activity and are
immutable. They haven’
t been
merely claimed (or modified) by the user.
3.3. Trust Should be Portable
A user’s trust should be
portable from one application to another. The interactions that
represent their trust should be usable across multiple applications. If users build trust via one
application, they should be able to use their trust on other applications. This portability offers
users the ability to leverage the trust they have developed and extend it to new applications. It
offers them the widest possible ...
Eric Ly
Eric Ly Founder, CEO

Kyle Wang
Kyle Wang Head of Business Development

Henry Yan
Henry Yan Head of Product

Mike Prince
Mike Prince Software Developer

Miko Matsumura
Miko Matsumura Marketing Advisor

Nikolai Oreshkin
Nikolai Oreshkin Chief Advisor

Josh Elman
Advisors Josh Elman Vice President, Robinhood, Partner, Greylock Partners, LinkedIn, Facebook, Twitter

Bo Shen
Advisors Bo Shen Founder, Fenbushi Capital & GF Network

Keith Teare
Advisors Keith Teare TechCrunch founding team, Founder & Executive Chairman, Accelerated Digital Ventures

Will O'Brien
Advisors Will O'Brien CEO & Co-Founder, BitGo, LP & Senior Strategic Advisor, Blockchain Capital

Howie Xu
Advisors Howie Xu CEO/Co-founder TrustPath, EIR of Greylock Partners, VP of BSN, Cisco, VMware, Stanford

Samuel Smith
Advisors Samuel Smith Chief Architect, ConsenSys Reputation AI Systems, Reputation Spoke Founder & Board Member, Sovrin

Kyle Wang
Kyle Wang
Head of Business Development
Senior Consultantat IBM Global Business Services
Senior Consultant IBM Cleveland, USA
Development and Industry
Miko Matsumura
Miko Matsumura
Marketing Advisor
Limited Partner Pantera Capital
PANTERA CAPITAL
Co-founder at Evercoin
Pantera Capital LP and founder of Evercoin Exchange
ADVISOR AT LCX THOUGHT LEADER
Bo Shen
Bo Shen
Founder, Fenbushi Capital & GF Network
Fenbushi Capital
Genaro
Fenbushi Capital - ?????, Founding/Managing Partner
General Partner of Fenbushi Capital
Senior Advisor
Investor & Strategic Advisor Founder, Fenbushi Capital
Strategy
FenBuShi Capital, Founding Partner
Founding Partner of Fenbushi Capital
Fenbushi Capital - 分布式资本, Founding/Managing Partner
BO SHEN
BO SHEN
Founding Partner of Fenbushi and BlockAsset
Keith Teare
Keith Teare
TechCrunch founding team, Founder & Executive Chairman, Accelerated Digital Ventures
Executive Chair at Accelerated Digital Ventures
Advisor
CO-FOUNDER OF TECHCRUNCH
Executive Chair of UK venture company Accelerated Digital Ventures
COFOUNDER OF TECHCRUNCH
The co-founder of TechCrunch
Technology Entrepreneur
Adviser
Founder and Executive Chairman of Accelerated Digital Ventures
Will O'Brien
Will O'Brien
CEO & Co-Founder, BitGo, LP & Senior Strategic Advisor, Blockchain Capital
Crypto Expert/High Growth Tech Executive /Angel Investor