-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Legion grant application #2729
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Legion grant application #2729
Conversation
Added comprehensive documentation for the Legion project, detailing its passwordless, zero-knowledge authentication features, architecture, technology stack, and development roadmap.
|
CLA Assistant Lite bot All contributors have signed the CLA ✍️ ✅ |
|
I have read and hereby sign the Contributor License Agreement. |
|
Hi @Deadends thanks for the application. This is really cool tech, but my main concern lies around funding. I wouldn't recommend relying on W3F follow-up grants for support, as its not a surefire thing. Can you elaborate on your plans for funding after the grant is completed? |
Hi Keegan, Thanks for raising this it’s a fair concern. I want to be clear that I am not viewing this grant as a bridge to indefinite funding, but rather as targeted funding to deliver a finished public good. A self-contained artifact, not a serviceLegion is intentionally architected as a finished protocol artifact, not a live service. The outcome of this grant is a complete, usable zero-knowledge authentication primitive (circuits, verifier, and SDK) that can be deployed by any parachain or dApp. No recurring costs: Durable utility: Demand-driven future developmentI agree that relying on follow-up W3F grants for basic survival is not a viable strategy. Any post-milestone work would be strictly demand-driven:
SummaryAfter the grant is completed, Legion does not require external funding to remain usable or maintained. The delivered software is a complete protocol artifact, not a service, and can be adopted indefinitely without my ongoing involvement. Any future development would be optional and driven by demonstrated ecosystem demand, rather than being required for the project’s survival. If the ecosystem later requests specific extensions or optimizations, those would be pursued selectively through ecosystem-native mechanisms such as Treasury bounties or targeted grants, but Legion itself does not depend on them. |
Project Abstract
LEGION is a proof of concept for a next-generation zero-knowledge authentication protocol designed to eliminate the weaknesses of conventional identity systems. Instead of relying on passwords, OAuth tokens, or mTLS certificates which can be stolen, forged, or leaked LEGION enables users and services to authenticate through cryptographic proofs that never reveal underlying secrets.
The protocol introduces a lightweight, high-performance Halo2 proof system capable of running in browsers, mobile devices, and distributed microservice environments. Authentication is expressed through challenge-bound ZK proofs, ensuring that each login is verifiable, non-replayable, and mathematically tamper-proof. This allows organisations to adopt a secure-by-design access model while maintaining sub-millisecond latency and horizontal scalability across millions of users.
The first implementation of the protocol consists of a WASM-based client that demonstrates real-time, zero-knowledge proof–based authentication for APIs, applications, and cloud-native services.
Grant level
Application Checklist
project_name.md).@_______:matrix.org(change the homeserver if you use a different one)