
The Overlooked Role of Decentralized Identity in Enhancing Web3 Privacy and Security
Share
Part 1 – Introducing the Problem
The Overlooked Role of Decentralized Identity in Enhancing Web3 Privacy and Security
Part 1 – Introducing the Problem
Despite the crypto industry’s obsession with decentralization, one foundational layer remains stubbornly centralized: identity. Ironically, as blockchains evolved to eliminate trusted intermediaries in finance, governance, and data storage, identity solutions in DeFi, gaming, DAOs, and even most layer-1 ecosystems remain tethered to centralized systems—OAuth logins, email verifications, or wallet-based pseudonyms with unclear provenance. This paradox not only compromises user privacy but also introduces structural attack surfaces that undermine the very security decentralization promises.
The fragmented and opaque nature of Web3 identity systems presents a silent but material risk. In the current paradigm, a wallet address serves as the closest proxy to user identity, yet it carries little real trust or context. Anyone who’s spun up a new MetaMask address minutes before voting in a DAO governance proposal or interacting with airdrop contracts understands the shallowness of this identity layer. This makes sybil resistance nearly impossible to scale without reintroducing centralized KYC mechanisms—defeating the purpose of decentralization. Worse yet, identity bridges that rely on off-chain verification or zero-knowledge wrappers exist in legal gray zones, frequently sparking questions around accountability and compliance.
The reluctance to push forward decentralized identity stems from multiple tensions: technical complexity, unclear value capture, protocol liability, and a lack of economic incentives. As a result, decentralized identity has been sidelined, seen as a "nice-to-have" rather than a foundational building block. Projects allocate extensive resources to architecture upgrades or cross-chain bridging, yet delegate identity to third-party OAuth providers or assume wallets are trustworthy by default. Even privacy-oriented chains that tout anonymity treat identity as a peripheral concern, ultimately leaving users exposed to behavioral analysis, correlation de-anonymization, and civil attacks.
Historically, identity has been relegated to siloed communities—Sovrin, uPort, Ceramic, or ENS—making little headway in integrating with core dApps or DeFi infrastructure. The fragmentation mirrors that seen in fan engagement tokens like Chiliz. While Chiliz Criticisms Unpacking Blockchains Fan Engagement Flaws highlights the dangers of disconnected user frameworks, similar issues plague identity scaling across broader Web3 projects.
Understanding why decentralized identity has lagged and what systemic vulnerabilities it introduces is key. It’s not merely an authentication layer—it determines who you are, who can trust you, and how decisions are made across protocols. With the increasing sophistication of on-chain governance, sybil vectors, and regulatory tension points, the absence of robust self-sovereign identity could become Web3’s Achilles heel.
Part 2 – Exploring Potential Solutions
Decentralized Identity Technologies Reshaping Privacy in Web3
Decentralized Identity (DID) systems are gaining traction as foundational primitives to address privacy, control, and data security in Web3. Several frameworks and protocol-level innovations have emerged, each offering distinct trade-offs. While theoretical in some aspects, their implications are critical to the privacy architecture of decentralized ecosystems.
W3C-Compliant DIDs and Verifiable Credentials
The backbone of many DID systems lies in W3C specifications—flexible enough to support diverse implementations across chains. Projects like Sovrin and KILT exemplify infrastructure focused on credential issuance and selective disclosure. Selective disclosure remains a pivotal strength, allowing users to prove attributes (e.g., age verification) without revealing sensitive information. However, privacy is only as strong as the storage method: many of these systems anchor identifiers on public ledgers, risking correlation attacks unless supported by zero-knowledge tools.
Zero-Knowledge Proofs: zk-SNARKs and zk-STARKs
ZKPs bring enhanced privacy by enabling users to prove statements without revealing the data itself. Integrating ZKPs into DID frameworks—such as via zkLogin or Semaphore—can decouple authentication from persistent identifiers. Yet, these systems bear a high computational cost and require trusted setup (in the case of zk-SNARKs), sparking centralization concerns. zk-STARKs alleviate some of these issues but remain storage-intensive and less widely supported in smart contract environments.
Biometric Anchors and SSI Wallets
Self-sovereign identity wallets incorporating biometric anchors (like fingerprint hashing) aim to link physical presence to DID verification without centralized KYC intermediaries. They promise seamless UX for credential portability. Nonetheless, biometric data, even hashed, poses long-term privacy risks if persistent across interactions. When on-chain activity leaks linkable metadata, these systems can silently erode user anonymity.
Reputation-Based Identity Graphs
Protocols like BrightID introduce Web-of-Trust structures to replace cryptographic proofs with social verifications. In theory, this offers robust Sybil resistance without personal data leaks. However, inherent weakness lies in its dependence on trust circles, making it vulnerable to collusion and network fragmentation. Reputation systems derived from such graphs remain difficult to generalize and impose social barriers to entry, hindering permissionless access.
Interchain Identity Portability
Emerging frameworks aim to support DID interoperability across heterogeneous chains. Polkadot’s identity pallets and Cosmos’ IBC-enabled identities are early movers. Still, managing consensus on identity states across chains introduces additional vectors for attack. Solutions like Moonbeam's cross-chain identity interoperability illuminate potential here, though trust assumptions scale with each integrated network.
In the next section of this series, we’ll explore cases where these concepts are already deployed—some successfully, others exposing critical vulnerabilities in live environments.
Part 3 – Real-World Implementations
Real-World Implementations of Decentralized Identity Systems in Web3
Several blockchain projects have ventured into implementing decentralized identity (DID) frameworks to solve the privacy and verification issues highlighted in Part 2. Among the most technically mature is Polygon ID, a zero-knowledge proof (ZKP)-based identity solution integrated into the Polygon ecosystem. It allows users to verify attributes without revealing the underlying data—critical for KYC compliance without sacrificing anonymity. Despite its promise, developer adoption has been slower than expected, partially due to the complexity of integrating its modular SDK, which requires a deep familiarity with ZK circuits and DID architecture.
On the Web3 credentials front, Ceramic Network and its companion identity protocol IDX have pioneered self-sovereign identity for composable dApps. IDX relies on the DID standard to offer interoperable user profiles across multiple platforms, but the protocol has struggled with scalability. Managing concurrent writes to identity streams—especially across multiple chains—has introduced latency that breaks real-time user experiences. While these issues are being addressed with DAG-JOSE and stream anchoring tweaks, no dApp has yet showcased IDX as the primary driver of user retention or conversion.
Another ambitious project is KILT Protocol, developed under the Polkadot parachain model. KILT introduces a trust market where identity attesters are economically incentivized to verify users while maintaining off-chain data privacy. However, this architecture creates centralization risks within attester networks. If a small number of large attesters gain disproportionate power, the network approach to verifiable credentials may replicate the permissioned behaviors it sought to eliminate.
Attempts to integrate DID into DeFi have shown mixed results. Aave’s Lens Protocol, while not a DID system per se, offers social graph data on-chain which can indirectly enhance decentralized identity use cases. However, privacy remains a concern. Users interacting with Lens-based applications often reveal more about themselves than intended due to linkability across on-chain actions. More granular permission layers are being explored, but these are not yet standardized across dApps.
In a different sector, fan engagement blockchain Chiliz has hinted at using identity-linked wallets to personalize rewards and voting rights. This opens the door for gated communities and reputation scoring, but also raises surveillance concerns, especially without clear anonymization guarantees. You can learn more about Chiliz’s implementation challenges in Chiliz Criticisms Unpacking Blockchains Fan Engagement Flaws.
These varied approaches reveal both the potential and the fragmented state of decentralized identity in Web3. A lack of interoperability standards often leads to isolated silos. Yet, the experimentation continues—testing the resilience and adaptability of identity mechanisms in decentralized environments.
Part 4 – Future Evolution & Long-Term Implications
Future-Proofing Web3: How Decentralized Identity Could Evolve in a Multi-Chain Landscape
The decentralized identity (DID) space is on the cusp of major technical evolutions that extend far beyond self-sovereignty. The future points toward an interoperability-first design, cryptographic breakthroughs for enhanced verification, and compatibility with emerging modular blockchain structures. However, scaling, fragmentation, and governance bottlenecks remain significant risks.
One trajectory centers on enhanced composability between DID protocols and cross-chain identity frameworks. Projects building DID layers currently lack consistency across ecosystems like EVM chains, Substrate-based networks, and app-specific rollups. Standards such as W3C's Verifiable Credentials are gaining traction, but practical implementation varies widely. If cross-chain identity registries can leverage zero-knowledge proofs (ZKPs) to verify claims without revealing user data, this could unlock seamless integration across protocols—a goal aligned with the cross-chain ambitions discussed in The Unexplored Terrain of Cross-Chain DeFi: Building Bridges to a Unified Financial Ecosystem.
Zero-knowledge infrastructure—particularly recursive SNARKs and zk-STARKs—will also shape DID’s privacy future. Currently, proving control over identifiers without third-party trust still requires trade-offs between latency and privacy-preserving execution. Emerging cryptographic primitives could enable privacy-first attestations over large credential graphs, facilitating data-minimized authentication for both on-chain and off-chain applications.
Meanwhile, DID scalability hinges on trustless credential revocation and recovery systems. Most current identity frameworks either centralize recovery processes or rely on fragile social recovery mechanisms. Decentralized key management architectures—especially those leveraging threshold cryptography or multi-layer MPC—may offer more resilient identity recovery without compromising security.
A pressing concern is the fragmentation of DID ecosystems. Competing identity wallets, issuers, and registries are creating silos, which undercuts the Web3 promise of interoperability. Without a robust DID discovery layer, duplicated efforts across L1s, rollups, and sidechains will continue to fragment digital identity. Modular identity systems need to treat DID as a first-class primitive, akin to tokens or smart contracts, embedded within rollup SDKs and chain runtime environments.
Finally, the convergence of decentralized identity with social graphs, AI agents, and DAO tooling could dramatically alter how identity is contextualized and governed. This introduces fresh challenges in credential weighting, identity inflation, and power centralization—issues that tie directly into the next discussion on governance, decentralization, and collective decision-making mechanisms within DID protocols.
Part 5 – Governance & Decentralization Challenges
Governance in Decentralized Identity: Balancing Autonomy with Systemic Risk
Decentralized Identity (DID) presents a compelling use case for Web3’s privacy-first future, but the backbone of this model—decentralized governance—sits on uncertain terrain. Governance frameworks remain fragmented, often suffering from ambiguous delegation models, participation bottlenecks, and vulnerabilities to plutocracy. The foundational tension lies in striking a balance between efficient coordination and maintaining the censorship-resistance that DID systems promise.
On one end, centralized governance offers agility. Decisions can be made quickly, software upgrades occur predictably, and operational overhead is reduced. Yet, this comes at the cost of systemic trust. Judiciaries, regulators, and compliance frameworks could lean heavily on centralized foundations, turning DID platforms into honeypots for regulatory capture. If foundational elements such as DID registries or revocation mechanisms are governed by small, upgradable multisigs, user autonomy is effectively compromised.
In contrast, decentralized governance introduces slow, consensus-based decision-making—more aligned with the ethos of distributed control, but riddled with new friction points. Disengaged stakeholders, token-gated voting, and low voter turnout can lead to governance asymmetries. Sybil-resistance mechanisms like quadratic voting seek to mitigate vote monopolization, yet these are often either theoretical or practically under-implemented. Worse, token-weighted voting introduces the risk of governance capture through capital concentration—an issue evident in numerous protocols that have gravitated toward de facto plutocracy.
Governance attacks—where coordinated or stealthy actors co-opt power—are a persistent threat. In DID ecosystems utilizing native tokens, oracles, and upgradable contracts, this risk becomes existential. A compromised governance mechanism could, for example, retroactively alter verifiable credentials, blacklist identifiers, or tamper with consent flows. These are not just theoretical vectors; they are structurally enabled by flawed governance architectures.
The problem deepens when examining off-chain input dependency. Many DID systems rely on oracles, data aggregators, and attestation providers that exist outside decentralized reach. This reintroduces trust assumptions, which decentralization was intended to displace. Furthermore, interoperability standards like DIDComm or VC (Verifiable Credentials) governance often defer parameters to non-transparent bodies, creating grey zones in decision provenance.
A relevant comparison can be made with systems like https://bestdapps.com/blogs/news/decoding-filecoin-governance-a-community-driven-approach, where despite best efforts toward inclusivity, governance still hinges on a relatively small group of participants capable of shaping protocol direction under the guise of decentralization.
The governance-layer weaknesses in DID systems threaten not just adoption but user safety. As these platforms scale, the challenge will shift from decentralization as a principle to decentralization as an engineered outcome—setting the stage for Part 6, which will examine the scalability and technical trade-offs in bringing DID to the masses.
Part 6 – Scalability & Engineering Trade-Offs
Engineering Trade-Offs in Scaling Decentralized Identity for Web3
Decentralized identity (DID) systems are inherently reliant on blockchain infrastructure, making their scalability a direct function of the underlying network's architectural constraints. As adoption of DIDs grows—especially in highly dynamic Web3 ecosystems like DeFi, social dApps, and cross-chain platforms—their ability to scale without undermining decentralization or privacy becomes a critical friction point.
Scalability in DIDs is not a binary issue of on-chain throughput. Instead, it's a multifaceted challenge tied to consensus mechanism latency, data availability models, and the cost of transaction finality. When identity credentials or verifiable claims are stored or anchored on-chain, network throughput becomes a bottleneck at a scale. For instance, Proof-of-Work (PoW) systems like Ethereum (pre-Merge) are secure but fall short in transaction speed and cost-efficiency. In contrast, low-latency chains like Solana offer impressive throughput, but often via trade-offs in validator count, which many argue introduces centralization risks. These choices introduce philosophical conflict into DID design—do you prioritize liveness or safety?
Moreover, deploying DIDs on layer-1s comes with expensive write operations, especially when using smart contracts to handle credential issuance or revocation registries. Layer-2s, rollups, and sidechains offer alternative scalability paths but raise concerns about data consistency and cross-chain identity resolution. Optimistic and ZK rollups provide significant gas cost reductions, though they introduce added complexity in verifying credential states and synchronizing with base layers.
Another trade-off exists in the use of IPFS or other decentralized storage to offload identity data, complemented by on-chain hashes for verification. While this reduces load on the chain itself, it sets up its own engineering challenges—how to guarantee high availability, data permanence, and resistance to censorship outside the blockchain layer.
For interoperability, cross-chain identity proofs bring their own set of scaling bottlenecks. Cross-chain credential verifications remain largely trust-bridging exercises with varying degrees of on-chain proof complexity. Blockchains like Sui experiment with object-centric data models to address composability but still face critiques regarding real-world scalability under high user concurrency.
Finally, a centralized verification authority—an anti-pattern to many in decentralized design—can offer a straightforward way to achieve scale without compromising speed. However, it directly undermines many of the core tenets of Web3 identity, like self-sovereignty and censorship resistance.
With architecture, consensus, and operational models all pulling in different directions, developers face unavoidable trade-offs in building scalable DID systems. Each decision—whether it's selecting a consensus algorithm or anchoring credentials on-chain—shapes the balance between decentralization, security, and performance.
Next: a close examination of the regulatory and compliance risks threatening the long-term viability of decentralized identity solutions.
Part 7 – Regulatory & Compliance Risks
Regulatory and Compliance Risks in Decentralized Identity: Navigating the Legal Minefield of Web3
Decentralized Identity (DID) systems promise user ownership over personal data and pseudonymity across dApps—but legal and regulatory frictions remain a formidable barrier to adoption. One of the greatest complications stems from jurisdictional divergence. A DID solution that complies with the GDPR’s right to be forgotten may conflict with the irrevocability of blockchain records, especially in permissionless ecosystems where on-chain immutability is foundational. Meanwhile, U.S.-based protocols must also navigate the complex maze of SEC and FTC oversight, where the definition of a “security” or “digital entity” is notoriously fluid. These competing frameworks raise the stakes for decentralized identity providers and integrators alike.
Moreover, the boundary between “self-sovereign identity” and state-sanctioned digital ID is already under pressure. Government-led digital identity frameworks in jurisdictions like China and India represent a top-down contrast to the bottom-up ethos of Web3 identity architecture. If legal frameworks start enforcing mandatory KYC mechanisms—even for decentralized protocols—then DIDs could end up becoming surveillance vectors rather than privacy tools. This risk becomes more acute when applied to cross-border DeFi apps, where identity interoperability could subject participants to multiple, often contradictory compliance standards simultaneously.
Precedent matters. Historical government interventions in crypto—like the delisting of privacy coins on centralized exchanges or the ban on Tornado Cash by the U.S. Treasury—highlight a clear regulatory sentiment: anonymity is a red flag. If DIDs evolve to serve as privacy-preserving tools, they may attract similar scrutiny. The framing of DID-related technologies under existing AML/CFT regulations is yet unresolved, but risk-averse projects and institutions may shy away from implementation until legal clarity emerges.
Additionally, decentralized governance complicates compliance accountability. In the absence of a central intermediary, regulators may target token holders, developers, or validators individually. This piecemeal enforcement approach raises questions about legal liability within DAO ecosystems. The issue resonates with broader critiques explored in The Unseen Importance of Decentralized Oracles in Smart Contract Reliability, as both touch on the fragility of decentralized infrastructure under regulatory stress.
Even if a DID protocol is architecturally sound, jurisdictions wielding surveillance-heavy mandates—or blacklisting tools that anonymize identity—could choke its usage. The challenge lies not just in designing compliant systems, but ones that can gracefully deform across regulatory boundaries without compromising on core Web3 values.
In the next section, we will explore how decentralized identity impacts market dynamics, focusing on value capture, token incentive structures, and the economic implications for both users and platforms.
Part 8 – Economic & Financial Implications
The Economic Disruption of Decentralized Identity in Web3: Investment Boon or Financial Liability?
Decentralized Identity (DID) is poised to introduce a fundamental shift in how users, entities, and protocols interact economically within the Web3 ecosystem. By untethering identity from centralized custodians and placing control in users' hands, new economic dynamics emerge—some lucrative, others laden with systemic risks.
For investors, especially those positioning in identity-centric protocols or privacy infrastructure, DID introduces asymmetric upside. Emerging projects may capitalize on DID primitives (e.g. verifiable credentials, zero-knowledge attestations) integrated into DeFi, gaming, DAOs, and beyond. This unlocks granular, on-chain reputation systems that can optimize liquidity provisioning, insurance underwriting, and even credit delegation without collateral. It’s not difficult to imagine DeFi markets pricing access to capital based on identity-weighted risk scores, effectively reshaping underwriting criteria. However, this also risks consolidating power in early DID standard bearers, introducing network monopoly dynamics under the guise of decentralization.
For developers, the monetization of DID standards and APIs is double-edged. While building core identity infrastructure promises lucrative licensing models and data composability monetization, fragmentation in DID methodologies—ranging from W3C-compliant DID Documents to non-standard wallet-based identifiers—could inhibit interoperability and investor confidence. This mirrors some of the fragmentation issues seen in early cross-chain DeFi infrastructure, where market inefficiencies delayed capital flow across ecosystems.
Institutional players face a more paradoxical scenario. On one hand, DIDs create auditability and tamper-proof KYC primitives that align with compliance frameworks. On-chain DID-based attestations could replace intrusive third-party KYC for exchanges, protocols, and CeDeFi offerings. On the other hand, mass adoption of DID could undercut traditional service layers financial institutions rely on—such as identity verification, credit bureaus, and centralized risk modeling products. The commodification of identity drastically compresses margins across these verticals, forcing incumbents to shift toward DID-native solutions or risk obsolescence.
Traders, particularly those deploying sybil-resistant airdrop farming or multi-account arbitrage, may see profitability slashed. Protocols employing DIDs for sybil mapping and uniqueness verification will move aggressively to mitigate abuse. The very same tools that enhance Web3’s integrity and trust, also redefine access boundaries in a way that upends many of the gray-zone capital strategies common in DeFi.
As DID infrastructure matures, its economic tailwinds—and liabilities—will depend less on cryptographic novelty and more on governance, incentive alignment, and market adoption. These shifts don’t just rewire financial mechanics; they challenge the deeper assumptions of identity, reputation, and trust in a decentralized society. We now move toward exploring the broader philosophical and social consequences emerging from these transformations.
Part 9 – Social & Philosophical Implications
Economic and Financial Implications of Decentralized Identity in Web3
Decentralized Identity (DID) protocols have the potential to introduce economic dislocations across several verticals, from KYC providers to centralized identity verification systems entrenched in TradFi. As DID solutions enable users to control how and when their identity or credentials are shared across chains and dApps, entire identity-as-a-service verticals are at risk of becoming obsolete. For example, exchanges and credit scoring platforms that monetize identity verification may find their models cannibalized by trustless alternatives based on verifiable credentials and zero-knowledge proofs.
Institutional capital faces a dual-layered challenge. On one end, DID infrastructure is difficult to value, lacking revenue models traditionally favored by VCs and hedge funds. On the other, the emergence of a self-sovereign digital identity layer creates new asset classes—reputation tokens, credential NFTs, and decentralized attestation tokens—which remain economically untested. Yet, early investments could yield asymmetric upside, particularly if these tokens capture sizable network effects across DeFi, DAOs, and cross-chain composability. The fragmentation of the identity stack may spawn new derivative markets tied to identity scoring, with oracles feeding on-chain reputation indexes.
For DeFi developers and platform architects, DID represents both a gateway and a bottleneck. On one hand, finer-grained access control, sybil resistance, and compliance features based on decentralized identifiers can expand institutional adoption. On the other, relying on nascent identity protocols introduces operational and liquidity risks. Any downtime or failure in attestation layers directly impacts protocol integrity, especially in multi-sig governance, lending protocols, or real-world asset onboarding.
Traders and airdrop hunters will likely confront more friction. By design, decentralized identities limit multiple claims, bots, and sybil attacks, reducing exploitative behavior within airdrop ecosystems. While this boosts long-term protocol health, it curtails short-term Alpha exploits and reduces revenue for airdrop farmers. Alternatively, traders could benefit from DID-based proof-of-personhood to gain exclusive access to tailored token sales or tiered yield opportunities previously inaccessible in anonymous public offerings.
The secondary effect may ripple into platforms like Chiliz, where verified fan identities could translate into more targeted monetization strategies. However, as explored in Chiliz Criticisms Unpacking Blockchains Fan Engagement Flaws, attaching true identities to fandom metrics could backfire by introducing surveillance-like optics into entertainment ecosystems.
Understanding these complex stakeholder impacts sets the stage for examining the broader social, ethical, and political tensions surrounding Web3's encroachment into sovereign identity in the next section.
Part 10 – Final Conclusions & Future Outlook
Final Conclusions & Future Outlook: Will Decentralized Identity Define Web3’s Future or Fade Into Obscurity?
After breaking down the technological underpinnings, privacy benefits, UX challenges, and integration potential throughout this series, it’s clear that decentralized identity (DID) stands as a critical—yet underutilized—component in the architecture of secure, user-sovereign Web3 systems. Its ability to minimize data leakage, eliminate reliance on centralized KYC solutions, and improve cross-application interoperability answers real security and regulatory pain points. Yet, implementation remains fragmented and solutions are too often siloed.
In the best-case scenario, DID becomes the cornerstone of Web3 identity infrastructure—not only safeguarding personal data but also enabling seamless, permissionless participation across DeFi, DAOs, and metaverses. Infrastructure-level adoption—built into smart contract middleware and wallet standards—could allow users to authenticate once and dynamically interact across apps with minimal friction. Imagine a composable credential system that integrates with platforms like https://bestdapps.com/blogs/news/the-unseen-power-of-community-centric-smart-contracts-a-new-paradigm-for-decentralized-applications, enabling truly decentralized user control with granular privacy overlays. That's the interoperable dream.
The worst-case? DID becomes just another fragmented standard layered atop the Web3 stack—technically appealing but ignored due to poor UX, industry apathy, or lack of coordination. Competing protocols—each championed by different L1s or DAOs—may create data silos that mirror the Web2 identity problem in decentralized packaging. Enterprises may opt for pseudo-decentralized identities linked back to surveillance-heavy frameworks, undermining the very ethos DID was designed to preserve.
Key unanswered questions remain: Who governs trust anchors (issuers of DID credentials)? How will revocation, recovery, and fraud prevention be handled in a permissionless context? What liability do credential verifiers or issuers hold across jurisdictions?
For mainstream adoption, there must be alignment across protocol-level standards (e.g. W3C compliance), strong incentive models for issuers and verifiers, and seamless developer tooling. UX needs transformation—from arcane JSON-LD structures to intuitive flows embedded in wallets. Regulatory clarity could shift adoption, but if left ambiguous, fear of non-compliance may stall rollout.
In the end, the trajectory of decentralized identity may well define whether Web3 matures into a trustless, sovereign system—or metastasizes into Web2.5 with more cryptographic gloss. The real question is: will DID be the backbone of a decentralized future, or simply an elegant prototype destined for crypto’s archival shelf alongside other noble experiments?
Authors comments
This document was made by www.BestDapps.com