Demos Global
Demos GlobalSocial MediaDemos AnalyticsDemos dApps
  • Demos Global
  • Demos Overview
    • Introduction
    • Understanding Sybil Attacks and the Need for Robust Sybil Resistance
    • Biometric Proof of Personhood
  • Token and Community
    • 🏆Leaderboard and Community Engagement
      • Demos Leaderboard
    • 🪙$DEM Token
      • $DEM Overview
      • veDEM Membership System
      • veDEM Mechanics
    • 📖DAO Governance
      • Overview
  • OnlyMeID
    • User Privacy & Safety
      • Understanding User Data
      • User Autonomy and Control
        • How Users Can Initiate the Purge
        • Safeguards to Prevent Misuse
        • Ensuring User Autonomy
      • Future Direction:
    • ⚙️Technical Documentation
      • Biometric Authentication
      • On-Chain Implementation
      • Smart Contract Parameters
      • 🔧UI Release notes
    • 📝Overview
      • Introduction
      • Functionality
      • Use-Cases
      • Unique Selling Points
    • 🛣️Roadmap
  • Appendix
    • Branding Kit
    • Demos Motivation
      • Demos Motivation
    • Proof of Existence
      • Proof of Existence
  • ⚙️How to Section
    • OnlyMeID Enrollment Process
      • Enrollment URL
    • Token Bridge Guide & Add Chains to Wallet
    • Demos dApp Support
    • Demos / Hemi Overview
      • Hemi Support Notes
      • How to connect to Hemi BlockChain
      • 🆘Reported issues & Questions
      • 🔥How to burn/delete enrollment
      • Enrollment Status explained
      • 💲Mint / Verify FAQ
Powered by GitBook
On this page
  1. OnlyMeID
  2. User Privacy & Safety
  3. User Autonomy and Control

Safeguards to Prevent Misuse

  • Minimum Enrollment Time: There's a mandatory minimum enrollment time to deter misuse of the purge feature, such as attempting to bypass Sybil protection by re-enrolling. Users must wait for this period (e.g., one week) after their initial enrollment before they can initiate a purge.

  • Verification Checks: Before the purge is executed, users undergo additional verification checks. This step ensures that the request is legitimate and not the result of a compromised account.

  • Audit Trails: While personal data is purged, an anonymized audit trail is maintained for a limited period. This trail is crucial for maintaining the integrity of the system and for audit purposes, ensuring that the purge process itself cannot be exploited.

PreviousHow Users Can Initiate the PurgeNextEnsuring User Autonomy

Last updated 1 year ago