Introducing Proven (dot lol)
Proven is a new omg.lol service, available today in beta. Proven gives you a way to demonstrate that you own or control things on the internet. If you’ve ever used Keybase, you’ll be familiar with the general idea: you claim that something (a web page, for example) belongs to you, and then you prove it by doing something that can only be done by someone who really does control that item (add specific content to the page, or add a DNS record). The end result is a confirmation that the thing in question is, in fact, bound to you.
Unlike Keybase, Proven doesn’t use cryptography, nor does it require you to maintain your proof indefinitely. Instead, your proofs are tied to the timestamp of when the evidence was captured. This means that you’re proving that you had control over a specific resource at a certain date and time, as opposed to continuous ownership. Because of this, you can add a verification snippet to something, prove it, and then remove the snippet if you’d like. (Though leaving it in place is a nice way to show an ongoing connection to the proof.)
I’m not going to beat around the bush here—this service is meant to be fun and convenient, but it’s not government-level verification or anything remotely close to that. If you’re looking for something more serious, Keyoxide is worth looking into for sure.
When you check a proof, three different things are checked (in this order):
- The headers. If the remote resource emits a header that contains the proof snippet, it’ll be verified and the header will be retained as evidence. (Example)
- DNS TXT records. If the remote resource has a TXT record that contains the proof snippet, it’ll be verified and the DNS record will be retained as evidence. (Example)
- Content. If the remote resource includes the proof snippet in its content, it’ll be verified and the content will be retained as evidence. (Example)
Soon, for proofs that can’t be verified automatically due to some of the page-checking issues shared above, there will be a way to request manual validation. Also coming soon: negative assertions (a way to say “you won’t find me on Twitter!”) and proofs for other types of internet resources (such as email addresses).