Section 7.1.1

The Evolution from Web1 to Web3

Web3 represents the third generation of internet services, characterized by decentralization, blockchain-based infrastructure, and user ownership of data and digital assets. Understanding this evolution is essential for legal professionals advising on emerging digital business models and the regulatory frameworks that will govern the decentralized internet.

Web1: The Read-Only Web (1990-2004)

The first generation of the World Wide Web emerged from Tim Berners-Lee's vision at CERN. Web1 consisted primarily of static HTML pages where users were passive consumers of content created by a relatively small number of publishers. This era established the foundational protocols that still underpin the internet today.

  • Static Content Delivery: Web pages were read-only documents with minimal interactivity. Content was created by webmasters and consumed by users without the ability to contribute or modify information.
  • Centralized Hosting Infrastructure: Websites resided on dedicated web servers controlled by site owners. The concept of cloud computing had not yet emerged, and each organization managed its own physical hardware.
  • Open Protocol Foundation: HTTP, HTML, and email protocols were open standards that anyone could implement. This openness enabled rapid innovation and prevented any single company from controlling the web.
  • Directory-Based Discovery: Yahoo!, AltaVista, and early search engines organized the web through human-curated directories and basic keyword matching, making information discovery significantly more challenging than today.
  • Limited Monetization: Business models were experimental, ranging from banner advertising to early e-commerce. The dot-com bubble of 2000 demonstrated the market's uncertainty about sustainable web business models.

Web2: The Read-Write Web (2004-Present)

Web2 introduced user-generated content, social interaction, and mobile-first experiences. However, this era also brought unprecedented concentration of power among a handful of technology giants who monetized user data and created walled gardens that trapped users within their ecosystems.

  • Platform Economy Emergence: Facebook, Google, Amazon, and Apple became digital gatekeepers controlling access to billions of users. These platforms leveraged network effects to achieve near-monopolistic positions in their respective markets.
  • User-Generated Content Revolution: Social media platforms enabled everyone to become a content creator. YouTube, Twitter, Instagram, and TikTok transformed media production and consumption patterns globally.
  • Data Monetization at Scale: The adage "if the product is free, you are the product" became reality. Platforms collected unprecedented amounts of personal data to fuel targeted advertising worth hundreds of billions annually.
  • API Economy and Developer Ecosystems: Platforms controlled access to user data and networks through APIs, extracting value from developers while maintaining control over user relationships.
  • Network Effects and Winner-Take-All Dynamics: The inherent advantages of scale in digital networks led to market concentration. New competitors faced insurmountable barriers to entry against established platforms.
!
The Web2 Problem

Web2 platforms extract enormous value from user data while users have no ownership stake in the platforms they helped build. Studies estimate that major social platforms hold hundreds of billions in value derived directly from user-generated content and behavioral data, yet users receive none of this value directly. Furthermore, platform decisions can arbitrarily affect users' livelihoods, as demonstrated by algorithm changes that have devastated creator incomes overnight.

Web3: The Read-Write-Own Web (2020-Future)

Web3 represents a paradigm shift that aims to return control, ownership, and economic value to users through decentralization. Built on blockchain technology, Web3 enables permissionless innovation, transparent governance, and new models of digital ownership that were impossible in previous web generations.

Characteristic Web2 Web3
Data Ownership Platforms own and control user data Users own their data through cryptographic keys
Identity Management Platform-specific accounts requiring trust Self-sovereign identity via wallet addresses
Value Capture Advertising-based platform monetization Direct user-to-user value exchange
Governance Model Corporate executive decisions Token-based community governance (DAOs)
Infrastructure Cloud servers (AWS, Azure, GCP) Distributed nodes running blockchain protocols
Trust Model Trust the platform and its operators Verify through cryptographic proof and code
Payment Rails Traditional banking with intermediaries Native cryptocurrency payments

Core Web3 Principles

  1. Decentralization: No single point of control or failure exists. Infrastructure, data, and governance are distributed across many participants, making censorship and arbitrary control extremely difficult.
  2. Permissionlessness: Anyone can participate without requiring approval from gatekeepers. Developers can build applications, users can access services, and participants can contribute to networks without corporate permission.
  3. Native Payments: Cryptocurrencies provide a built-in money layer that enables programmable value transfer, micropayments, and novel economic models impossible with traditional payment infrastructure.
  4. Trustlessness: Cryptographic verification replaces institutional trust. Users can verify transactions, ownership, and application logic without trusting any centralized authority.
  5. Self-Sovereignty: Users control their identity, data, and digital assets through private keys. No platform can arbitrarily revoke access or seize assets without the user's consent.
K
Key Concept

The Ownership Economy: Web3 enables users to become stakeholders in the platforms they use. Through token ownership, users can participate in governance, capture value from network growth, and have genuine economic alignment with platform success. This represents a fundamental restructuring of the relationship between platforms and users.

Section 7.1.2

Web3 Technical Architecture

Web3 applications rely on a fundamentally different technical architecture than traditional web applications. Understanding this architecture is crucial for evaluating the capabilities, limitations, and legal implications of decentralized systems.

The Web3 Technology Stack

The Web3 stack consists of multiple layers, each serving distinct functions and operated by different participants in the ecosystem. This layered approach enables modularity and composability while maintaining decentralization guarantees at each level.

Web3 Application Stack
Frontend Layer
React, Vue, User Interface
-->
Web3 Libraries
ethers.js, web3.js, viem
-->
Blockchain Layer
Ethereum, Polygon, Solana

Layer 0: Network Infrastructure

The foundation of Web3 consists of peer-to-peer networking protocols that enable nodes to discover each other, propagate transactions, and synchronize blockchain state without relying on centralized servers. These protocols include libp2p, devp2p, and gossip networks that ensure resilience against node failures and network partitions.

Layer 1: Settlement and Consensus

Base layer blockchains provide the fundamental settlement layer where transactions achieve finality. These networks employ consensus mechanisms to achieve agreement among distributed nodes about the canonical state of the ledger. Key Layer 1 platforms include:

  • Ethereum: The leading smart contract platform with the largest developer ecosystem, transitioning to Proof of Stake for improved scalability and energy efficiency.
  • Bitcoin: The original blockchain providing the most secure and decentralized value transfer network, primarily used for digital gold and store of value applications.
  • Solana: High-performance blockchain achieving thousands of transactions per second through Proof of History consensus, targeting applications requiring high throughput.
  • Avalanche: Multi-chain platform enabling custom blockchain creation with rapid finality through the Avalanche consensus protocol.

Layer 2: Scaling Solutions

Layer 2 protocols build on top of base layer blockchains to increase transaction throughput and reduce costs while inheriting security from the underlying chain. We will explore these in detail in Part 4 of this module.

Middleware Layer: Oracles and Indexing

Middleware services bridge the gap between on-chain and off-chain data, enabling smart contracts to interact with real-world information and making blockchain data queryable for applications.

  • Chainlink: Decentralized oracle network providing price feeds, random number generation, and external API access to smart contracts.
  • The Graph: Decentralized indexing protocol enabling efficient querying of blockchain data through GraphQL APIs.
  • IPFS Gateways: Services that bridge traditional HTTP requests to the InterPlanetary File System for decentralized content retrieval.

Smart Contract Architecture Patterns

Smart contracts are self-executing programs deployed on blockchains that encode business logic and manage digital assets. Understanding common architectural patterns is essential for evaluating the security and functionality of Web3 applications.

Proxy Patterns for Upgradeability

Since deployed smart contracts are immutable, proxy patterns enable logic upgrades while preserving state and contract addresses. This creates important governance considerations regarding who controls upgrade authority and how upgrades are executed.

Multi-Signature and Timelock Controls

Critical protocol operations often require multiple parties to approve transactions and include time delays before execution. These patterns provide security against key compromise and enable community response to malicious proposals.

F
Future Prediction

By 2027, account abstraction will become the standard for Web3 user experience, eliminating the need for users to manage seed phrases while maintaining self-custody guarantees. Smart contract wallets will support social recovery, spending limits, and session keys that make Web3 as accessible as traditional web applications.

Section 7.1.3

Decentralized Applications (dApps)

Decentralized applications combine smart contract backends with web-based frontends to deliver services without centralized intermediaries. Understanding dApp architecture, categories, and operational patterns is essential for legal professionals advising on Web3 projects.

dApp Architecture Principles

Unlike traditional web applications where a company controls servers, databases, and user accounts, dApps distribute these functions across blockchain networks and decentralized infrastructure. This architectural choice has profound implications for liability, jurisdiction, and regulatory compliance.

  • On-Chain Components: Critical business logic, asset ownership, and governance execute through smart contracts on public blockchains, providing transparency, immutability, and censorship resistance.
  • Off-Chain Components: User interfaces, indexing services, and supplementary data storage typically remain centralized or use decentralized alternatives like IPFS, creating potential points of failure or control.
  • Hybrid Architectures: Most production dApps combine on-chain and off-chain components, optimizing for cost, performance, and user experience while maintaining core decentralization properties for critical functions.

Major dApp Categories

Decentralized Finance (DeFi)

DeFi applications replicate and extend traditional financial services using smart contracts, enabling permissionless access to lending, trading, derivatives, and asset management. The DeFi ecosystem has grown to hold billions in value, demonstrating the viability of decentralized financial infrastructure.

  • Decentralized Exchanges (DEXs): Uniswap, Curve, and similar protocols enable peer-to-peer token trading through automated market makers, eliminating the need for centralized order books and custodians.
  • Lending Protocols: Aave, Compound, and MakerDAO facilitate collateralized borrowing and lending with algorithmically determined interest rates, providing yield opportunities without traditional banking intermediaries.
  • Derivatives Platforms: GMX, dYdX, and Synthetix offer perpetual contracts, options, and synthetic assets, bringing sophisticated financial instruments to permissionless markets.

Social and Content Platforms

Web3 social platforms aim to give creators ownership of their content, audiences, and monetization while enabling portability across applications.

  • Decentralized Social Graphs: Lens Protocol and Farcaster enable users to own their social connections, taking their followers with them across different applications.
  • Creator Economies: Mirror, Paragraph, and similar platforms enable writers to own their subscriber lists and monetize directly through NFTs and subscriptions.
  • Decentralized Video: Livepeer provides decentralized video transcoding infrastructure, enabling censorship-resistant streaming platforms.

Gaming and Metaverse

Blockchain gaming introduces true ownership of in-game assets, interoperability across games, and player-driven economies where participants capture value from their time investment.

Category Example Protocols Key Innovation
DEX Trading Uniswap, Curve, 1inch Automated market making without order books
Lending Aave, Compound, MakerDAO Algorithmic interest rates, flash loans
Social Lens, Farcaster, Mirror Portable social graphs and content ownership
Gaming Axie Infinity, Illuvium, Gods Unchained True asset ownership, play-to-earn
Identity ENS, Worldcoin, Polygon ID Self-sovereign identity and credentials
T
Industry Insight

The most successful dApps achieve "progressive decentralization" - launching with some centralized components for speed and user experience, then gradually decentralizing control as the protocol matures and community governance capabilities develop. This approach balances innovation velocity with long-term decentralization goals.

Section 7.1.4

Decentralized Storage Systems

Decentralized storage networks provide censorship-resistant, highly available data storage without relying on centralized cloud providers. These systems are essential infrastructure for Web3 applications that need to store data too large or expensive for blockchain storage.

The Challenge of Data Permanence

While blockchains excel at storing small amounts of critical data immutably, storing larger files directly on-chain is prohibitively expensive. A single megabyte of data on Ethereum would cost thousands of dollars in gas fees. Decentralized storage networks solve this problem by creating incentive-aligned systems for persistent data storage.

InterPlanetary File System (IPFS)

IPFS is a peer-to-peer hypermedia protocol that addresses content by its cryptographic hash rather than its location. This content-addressing approach fundamentally changes how data is stored and retrieved on the internet.

  • Content Addressing: Files are identified by their cryptographic hash (CID - Content Identifier), ensuring that anyone requesting a specific CID receives the exact original content without modification.
  • Distributed Retrieval: Content can be fetched from any node in the network that holds a copy, providing natural load balancing and resilience against individual node failures.
  • Deduplication: Identical files share the same CID regardless of who uploaded them, automatically eliminating duplicate storage across the network.
  • Merkle DAG Structure: Large files are broken into chunks organized in a directed acyclic graph, enabling efficient verification and partial file retrieval.

Filecoin: Incentivized Storage

While IPFS provides the protocol for content-addressed storage, it does not guarantee data persistence. Filecoin adds an economic layer that incentivizes storage providers to reliably store data over time.

  • Storage Markets: Users pay storage providers in FIL tokens to store their data for specified durations. Market dynamics determine pricing based on supply and demand.
  • Proof of Replication: Storage providers must prove they are storing unique copies of data, preventing them from claiming to store data they can simply re-derive.
  • Proof of Spacetime: Ongoing proofs demonstrate that data remains stored over time, with automatic penalties for providers who lose or fail to prove storage.
  • Retrieval Markets: Separate markets enable fast data retrieval, with providers competing on latency and bandwidth.

Arweave: Permanent Storage

Arweave takes a different approach by enabling one-time payment for permanent data storage. The protocol uses a novel blockweave structure and economic model designed to ensure data persistence over centuries.

  • Endowment Model: Users pay once, and a portion of the payment goes into an endowment that earns interest to fund storage perpetually as costs decline over time.
  • Succinct Random Proofs: Miners must prove they can access random historical data, incentivizing them to store the full archive.
  • Permaweb: A layer built on Arweave enables permanent websites and applications that cannot be taken down or modified.
Feature IPFS Filecoin Arweave
Storage Model Content-addressed P2P Incentivized contracts Permanent endowment
Payment None (voluntary pinning) Recurring time-based One-time payment
Persistence Not guaranteed Contract duration Designed for permanence
Best For Dynamic content, CDN Large datasets, archives Permanent records, history
K
Key Concept

The NFT Metadata Problem: Many NFTs store only a small amount of data on-chain (token ID, owner address), with the actual image and metadata stored on centralized servers or IPFS without guaranteed pinning. This creates a risk that NFT content could disappear if the hosting service fails. Best practices involve using Arweave or Filecoin with adequate storage deals to ensure NFT content permanence.

Section 7.1.5

Self-Sovereign Identity

Self-sovereign identity (SSI) enables individuals to own, control, and share their digital identity without depending on centralized authorities. This represents a fundamental shift from the current model where platforms control user accounts and can arbitrarily revoke access.

The Problem with Digital Identity Today

Current digital identity systems suffer from fragmentation, privacy violations, and lack of user control. Users maintain dozens of separate accounts across platforms, each requiring password management and exposing personal data to potential breaches. Platforms can suspend accounts without recourse, and users cannot easily move their reputation or credentials between services.

Wallet-Based Identity

In Web3, a cryptographic wallet serves as the foundation for digital identity. The wallet address becomes a universal identifier that works across all blockchain applications without requiring registration or permission.

  • Public-Private Key Pairs: Users control their identity through private keys that can sign transactions and messages, proving ownership without revealing sensitive information.
  • Pseudonymous by Default: Wallet addresses do not inherently contain personal information, enabling users to interact with applications while maintaining privacy.
  • Portable Reputation: On-chain activity builds a verifiable history that travels with the user across applications, creating portable reputation systems.
  • Permission-Based Disclosure: Users can selectively reveal information through signed messages or zero-knowledge proofs without exposing their full identity.

Ethereum Name Service (ENS)

ENS provides human-readable names for blockchain addresses, transforming complex hexadecimal strings into memorable identifiers like "vitalik.eth". This naming system has become the de facto standard for Web3 identity.

  • Universal Addressing: ENS names can resolve to Ethereum addresses, other cryptocurrency addresses, content hashes, and traditional DNS records.
  • Profile Data: ENS supports text records enabling users to attach social profiles, email addresses, and other metadata to their names.
  • Subdomains: Organizations can create subdomains for members, enabling hierarchical identity structures like "alice.company.eth".
  • Decentralized Governance: The ENS DAO governs protocol development and treasury allocation through community voting.

Verifiable Credentials and DIDs

W3C standards for Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) enable interoperable, privacy-preserving identity attestations that work across different systems and jurisdictions.

Soul-Bound Tokens (SBTs)

Soul-bound tokens are non-transferable NFTs that represent credentials, achievements, or affiliations. Unlike regular NFTs that can be bought and sold, SBTs are permanently associated with a wallet, making them suitable for representing earned credentials.

  • Educational Credentials: Universities can issue SBT diplomas that are verifiable on-chain and cannot be fraudulently transferred.
  • Professional Certifications: Industry certifications can be represented as SBTs, enabling instant verification of qualifications.
  • Community Membership: DAOs can issue SBTs to represent membership status, voting rights, or contribution history.
  • Reputation Scores: Aggregated reputation from various activities can be represented as SBTs, creating portable professional reputation.
F
Future Prediction

By 2030, self-sovereign identity will become the default for digital interactions, with government-issued digital IDs interoperating with blockchain-based credentials. Zero-knowledge proofs will enable age verification, credit checks, and identity verification without revealing underlying personal data, dramatically improving privacy while reducing fraud.

Section 7.1.6

DAOs and Decentralized Governance

Decentralized Autonomous Organizations (DAOs) represent a new paradigm for collective coordination and governance. By encoding rules in smart contracts and enabling token-based voting, DAOs can manage billions in assets and coordinate thousands of participants without traditional corporate structures.

Understanding DAOs

A DAO is an organization represented by rules encoded as a computer program that is transparent, controlled by organization members rather than a central authority, and operates autonomously based on its programmed logic. DAOs have become the governance standard for DeFi protocols, NFT communities, and Web3 infrastructure.

  • On-Chain Governance: Proposals, voting, and execution happen transparently on the blockchain, creating immutable records of all governance decisions.
  • Token-Based Voting: Governance tokens grant voting power proportional to holdings, aligning incentives between stakeholders and the protocol.
  • Programmatic Execution: Approved proposals can automatically execute through smart contracts, reducing reliance on trusted intermediaries.
  • Global Participation: Anyone with governance tokens can participate regardless of geographic location, creating truly global organizations.

DAO Governance Models

Token Voting

The most common model where voting power corresponds directly to token holdings. While simple and transparent, this approach can lead to plutocracy where wealthy participants dominate decision-making.

Quadratic Voting

Voting power increases with the square root of tokens committed, giving smaller holders proportionally more influence. This approach aims to balance the interests of large and small stakeholders.

Conviction Voting

Voting power accumulates over time, rewarding long-term commitment to proposals over flash votes. This model favors patient, considered governance over rapid decision-making.

Delegation

Token holders can delegate their voting power to trusted representatives, enabling expert participation while maintaining decentralization of control.

DAO Treasury Management

Many DAOs manage substantial treasuries that fund development, grants, and operations. Effective treasury management requires balancing short-term needs with long-term sustainability.

  • Multi-Signature Controls: Treasury transactions require approval from multiple designated signers, preventing unilateral fund access.
  • Timelocks: Large transactions include time delays allowing community review and potential intervention.
  • Diversification: Prudent treasuries diversify holdings across stablecoins, native tokens, and other assets to manage volatility.
  • Grant Programs: Structured grant programs fund ecosystem development while maintaining accountability.
!
Legal Considerations

The legal status of DAOs remains uncertain in most jurisdictions. Questions around liability, taxation, and regulatory compliance are actively being addressed through legislation in states like Wyoming and countries like Switzerland. Legal practitioners should carefully evaluate DAO participation and structure to manage regulatory risk.

"DAOs are not just about decentralizing control - they're about creating new forms of human coordination that were previously impossible, enabling global communities to pool resources and make collective decisions at scale." Vitalik Buterin, Ethereum Co-Founder

Key Takeaways

  • Web3 fundamentally shifts the internet from platform ownership to user ownership of data, identity, and digital assets through blockchain technology.
  • The Web3 stack includes multiple layers from base blockchains through middleware to frontend applications, each with distinct functions and decentralization properties.
  • Decentralized applications combine on-chain smart contracts with off-chain components, creating hybrid architectures that balance decentralization with user experience.
  • Decentralized storage through IPFS, Filecoin, and Arweave ensures data persistence without relying on centralized cloud providers.
  • Self-sovereign identity enables users to control their digital identity through cryptographic keys, with verifiable credentials providing privacy-preserving attestations.
  • DAOs represent new organizational structures that enable global coordination through transparent, programmable governance mechanisms.