
The Untapped Potential of Decentralized Identity Solutions: Rethinking Privacy and User Control in the Digital Age
Share
Part 1 – Introducing the Problem
The Untapped Potential of Decentralized Identity Solutions: Rethinking Privacy and User Control in the Digital Age
Part 1: Identity Fragmentation and the Silent Cost of Centralized Data Silos
In a landscape where self-custody wallets, zk-rollups, and modular chains dominate crypto discourse, one unglamorous—but systemic—issue remains glaringly unresolved: user identity. Despite a decentralized ethos, most blockchains still rely on account abstractions that say nothing about who a user is—unless voluntarily doxxed or verified by a third party. And when verification systems do emerge (via KYC/AML for on-ramps or reputation protocols), they often replicate the same centralization flaws that web3 supposedly exists to transcend.
This isn’t just a UX bottleneck—it’s a security liability and an interoperability failure. The inability to carry authenticated user traits across dApps without constant re-verification leads to fragmented identities, excessive data retention, and needless attack surfaces. Whether you’re staking assets, voting in a DAO, minting Soulbound Tokens, or accessing DeFi credit markets, each smart contract assumes a blank slate. Every interaction is over-secured for lack of context or under-secured from misplaced trust.
Historically, this problem has roots in both legacy web authentication (think OAuth or SAML) and early crypto’s hyper-focus on pseudonymity. The result? We’ve created on-chain personas—wallet addresses—and built entire markets around interacting with them. But without a portable, user-owned identity layer, those markets suffer from inefficiencies in trust-building, credit assessment, and user experience.
What’s strange is this isn’t a theoretical shortcoming. Blockchain identity frameworks have existed for years—uPort, Sovrin, and more recently, Ontology's identity stack—yet adoption has been negligible. Partly because most solutions demand coordination between dApps and identity issuers, partly because UX flows haven’t matured beyond clunky pop-ups and confusing credential delegation. And perhaps most critically, users themselves have almost no incentive to shift away from Web2 login paradigms—privacy concerns notwithstanding.
Meanwhile, protocols are building pseudonymous credit layers, DAO reputation systems, and web3 social graphs—all without a shared foundation. It’s a tower of Babel, vulnerable to Sybil exploits and vulnerable to loss. Until crypto-native identity becomes composable, portable, and user-sovereign, the default model will continue to quietly centralize.
This silent identity crisis underpins many of the ecosystem’s most persistent failures. But it also opens the door to new primitives: selective disclosure, verifiable credentials, zero-knowledge identity proofs, and more. And with the right incentive structures—perhaps tied to governance or credit exclusivity—self-sovereign identity could evolve from fringe tech to foundational stack.
We’re not there yet. But this tension—the mismatch between decentralized infrastructure and identity centralization—isn’t going away. If anything, it’s getting baked deeper into the system with every siloed dApp and every redundant KYC funnel.
Smart protocols will treat identity not as an afterthought, but as the connective tissue binding reputation, governance, and access control. The inertia is real. So are the battle scars. But the alternatives are already under construction.
Part 2 – Exploring Potential Solutions
Decentralized Identity Technologies: Navigating Trade-offs in User Control and Privacy
Decentralized identifiers (DIDs), verifiable credentials (VCs), and self-sovereign identity (SSI) frameworks have emerged as promising countermodels to centralized identity systems. At the protocol layer, solutions such as W3C-compliant DIDs offer identity constructs that are not tied to any centralized registry. Standards-based yet implementation-agnostic, DIDs allow users to generate keys independently, with public keys stored on-chain or via off-chain resolvers. However, the tension between trust minimization and discoverability remains unsolved—leaking sensitive metadata through DID resolution is still a real risk.
Verifiable credentials, often used in tandem with DIDs, allow cryptographic claims to be issued and later verified without revealing the underlying data. Projects like Hyperledger Aries and AnonCreds have pioneered these architectures, but they often rely on correlation-heavy credential schemas. The challenge becomes balancing selective disclosure with composability—generating proofs that resist correlation without undermining usability remains an open design question. The recent interest in BBS+ signatures offers some promise here, but widespread standard adoption is slow.
SSI as a philosophy emphasizes full user control of identity data, often facilitated through wallets or agents. While theoretically empowering, SSI implementations sometimes offload accountability onto end-users. The UX overhead associated with managing credentials, revocation registries, and key backups can make mainstream adoption impractical without robust middleware layers. Interoperability deficits between SSI agents often result in balkanized ecosystems.
On the cryptographic front, zero-knowledge proofs (ZKPs) have unlocked transformative potential for privacy-preserving verification. Protocols like zk-SNARKs and zk-STARKs enable proof of attributes (e.g., age or nationality) without revealing the data itself. While ZKPs can strengthen off-chain credential verification, they come with computational overhead and a steep complexity curve, often requiring trusted setup or continuous circuit updates. ZK infrastructure like Semaphore and zkLogin are attempting to close this usability gap.
Emerging identity networks such as Ontology offer layered solutions combining fast consensus, DID support, and VC issuance. While Ontology markets itself as a privacy-focused identity backbone, critics have highlighted centralization vectors in validator selection and governance, explored in Unpacking the Criticisms of Ontology (ONT). This raises questions about the true decentralization of such infrastructure.
As we transition from theory to implementation, Part 3 will explore how governments, DAOs, and Web3 platforms are applying (or misapplying) these models in production.
Part 3 – Real-World Implementations
Real-World Case Studies: The Trials and Triumphs of Decentralized Identity Solutions
Leading blockchain ecosystems and startups have taken meaningful—but often fragmented—steps toward implementing decentralized identity (DID). Projects like Ontology, Sovrin, and BrightID offer snapshots of how theory meets execution, each revealing both architectural promise and technical friction.
Ontology’s approach is perhaps the most enterprise-focused. Its ONT ID framework integrates W3C-compliant DIDs with verifiable credentials and tokenized reputation. Though feature-rich, it suffers from limited interoperability outside of its native ecosystem. Despite the presence of cross-chain bridges, ONT ID remains isolated due to low developer uptake and inconsistent documentation. Scalability isn’t just a matter of consensus throughput; identity verification often requires synchronous off-chain confirmations, reducing network efficiency. For a deeper examination into Ontology's performance and ecosystem dynamics, see https://bestdapps.com/blogs/news/unpacking-the-criticisms-of-ontology-ont.
In contrast, BrightID is open-source, DAO-led, and hyper-focused on resisting Sybil attacks. Its unique "social graph" method leverages biometric-free identity validation through repeated human attestations. While this resonates with privacy purists, it introduces onboarding hurdles, especially in less connected Web3 user bases. Users complain about arbitrarily long validation cycles, and dependency on subjective trust mechanics raises concerns about permissionless scalability.
Sovrin Foundation’s deployment exemplifies ambition derailed by governance complexity. Built upon Hyperledger Indy, Sovrin sought to create a global identity layer with deep compliance integrations. Technical soundness aside, the project faced major bottlenecks in validator node decentralization, leading to centralization concerns. Sovrin’s tokenomics never matured beyond test environments, resulting in a lack of financial incentives for infrastructure operators.
On the side of newer implementations, RUNEAI's mention of identity-layer integration into data access governance introduces another frontier. The idea of gated AI training pipelines with DID-authenticated datasets presents a compelling privacy-first evolution for blockchain AI coordination. For insights into how RUNEAI approaches this, see https://bestdapps.com/blogs/news/unlocking-data-potential-with-runeai. Yet, even here, technical hurdles around decentralized key revocation and identity recovery remain unresolved.
Across the board, one recurring barrier is the absence of UX norms. Creating DIDs and managing credentials often feels indistinct from performing raw cryptographic operations. Unlike the progressive onboarding seen in leading CEX platforms like Binance, DID flows tend to repel less technical users despite their philosophical alignment with user sovereignty.
These tensions—between privacy and usability, between trustlessness and friction—are shaping the real-world trajectory of DID adoption. While individual protocols make incremental headway, an industry-wide standardization layer remains conspicuously absent. In the upcoming section, we’ll explore how decentralized identity could evolve under long-term pressures like regulatory coherence, AI integration, and multi-chain interoperability.
Part 4 – Future Evolution & Long-Term Implications
Future-Proofing Decentralized Identity: Scalability, Interoperability and On-Chain Synergies
The next evolution of decentralized identity (DID) hinges on its ability to scale across chains, seamlessly integrate with existing web2 and web3 systems, and address the bottlenecks caused by smart-contract execution limits and fragmented data architectures. Current MVPs built on SSI (Self-Sovereign Identity) principles suffer from limited portability between ecosystems, often locking users into specific platforms. To overcome this, modular identity frameworks are underway—leveraging off-chain storage (e.g. IPFS with Merkle-linked state validation via ZKPs) and Layer 2 anchoring—to decouple identity data size from cost-intensive base-layer storage.
An emergent trend in DID evolution is composability with DeFi, especially where “reputation primitives” act as decentralized sybility filters. For instance, deployments of identity-linked soulbound tokens (SBTs) are being trialed across credit protocols, but still face challenges around revocability and privacy-preservation. Expect further experiments in verifiable credentials issuance on privacy-preserving L2s using zero-knowledge attestations. These could enable identity assertions without revealing correlating metadata across applications, a problem that still threatens most public DID solutions today.
Next-gen DID architectures are also developing blockchain-agnostic credential registries, powered by cross-chain oracle systems. Projects like Band Protocol offer foundational infrastructure for propagating trust assumptions across disparate ecosystems. You can explore how they’re tackling decentralized data flows in this deepdive into Band Protocol. As multi-chain user bases grow, the ability to bring verified identities across chains without centralized federation is becoming critical.
From an infrastructure standpoint, integration with on-chain compute layers—like those being expanded in networks such as Golem—could also introduce decentralized identity-aware compute. This allows encrypted credential data to be computed in trust-minimized environments without ever being revealed. Such synergies hint at a broader identity/data liquidity framework, with decentralized identity acting as the connective tissue.
Yet these projections are not without friction. Onboarding sovereign identities requires UX flows that abstract technical choices without sacrificing user custody. Moreover, widespread adoption hinges on resolving DID registry governance, revocation flows, and interoperability between W3C standards (like DID Core) and newer, EVM-specific ledger formats.
As identity becomes programmable and modular, composability with broader blockchain systems will demand robust decentralized governance capabilities and upgrade mechanisms. The architectural and social decisions around how identity frameworks are curated will shape the long-term legitimacy of decentralized identity ecosystems. This sets the stage for the next examination: how governance, decentralization, and consensus mechanisms will steer these innovations.
Part 5 – Governance & Decentralization Challenges
Governance vs. Centralized Control in Decentralized Identity: Risks, Attacks, and Trade-offs
Decentralized identity (DID) systems present a fundamental shift away from state or corporate-controlled identity. But such autonomy isn’t free—it hinges on governance models that can become just as fragile as the centralized structures they aim to replace.
At the heart of the decentralization debate is whether validator and token-holder governance models actually democratize control or subtly re-centralize it. In many decentralized identity protocols, decision-making is handed to token-weighted voting. This introduces a plutocratic vector where influence is directly correlated with capital, not community stake. If 1% of holders control 90% of votes, then on-chain governance becomes a mirror image of traditional oligarchies.
The risk of governance attacks—where colluding actors coordinate off-chain to rush proposals—exacerbates this vulnerability. Even “secure” DAO frameworks can be manipulated through flash loan-enabled attacks or rushed governance periods, especially when economic incentives outweigh reputational costs.
On the flip side, centralized projects offer clearer lines of accountability. The governance apparatus in such models—often led by a foundation or a single legal entity—can move quickly, implement updates efficiently, and engage with regulators directly. But this agility comes at the cost of censorship vulnerability and regulatory capture. Once a government or institution pressures a centralized identity provider, user data sovereignty becomes immediately compromised.
For decentralized identity solutions, neutrality is a myth. Every design decision—whether voting thresholds, validator delegation, or slashing conditions—carries embedded trade-offs in representation and resilience. For instance, bonding requirements for validators may keep Sybil attacks low, but they also erect capital barriers that consolidate power among whales or VC-backed actors.
Golem’s governance journey provides insight here. A so-called “decentralized” computing protocol, it has faced persistent critiques regarding whether its governance structure reflects real stakeholder diversity or is functionally led by its earliest insiders. A deeper discussion is available at https://bestdapps.com/blogs/news/decentralized-governance-in-golem-network-explained, which unpacks how decentralized governance frameworks may evolve under persistent pressure.
Identity systems carry more than capital—they carry lineage, relationships, access. The implications of their governance collapses are more socially systemic than a DeFi lending pool failure. Designing systems that resist plutocratic control without veering into chaos requires a paradigm rethink, not just minor governance tweaks.
Next, we explore the scalability challenges and engineering compromises these systems must confront before achieving global adoption.
Part 6 – Scalability & Engineering Trade-Offs
Scalability & Engineering Trade-Offs in Decentralized Identity Systems
The technical architecture of decentralized identity (DID) systems often collides with the hard limits of blockchain scalability. Implementing verifiable credentials at global scale introduces significant engineering friction, especially once these systems need to support millions—or billions—of identity interactions per day.
At the heart of the tension lies the trilemma: decentralization, scalability, and security. Permissionless, L1 blockchains like Ethereum prioritize decentralization and security over throughput, leading to gas congestion and unpredictable transaction finality. This becomes a bottleneck when every credential issuance, revocation, or DID interaction triggers an on-chain operation. Even layer-2 options, while offering improved performance, introduce trust assumptions and fragmented UX across bridges and rollups.
Alternative blockchain designs, such as DAG-based architectures, promise cheaper and faster operations, but trade sequential consistency for eventual finality and raise concerns about adversarial ordering. For identity use cases where immutability and timestamping are critical—like in KYC logs or legal proofs—such trade-offs may not be acceptable.
Consensus mechanisms further skew performance constraints. PoW chains like Bitcoin offer uncensorable immutability but are computationally expensive and slow, while PoS chains like Solana or Avalanche offer TPS advantages, often by sacrificing node decentralization or requiring specialized hardware. The impact on DID systems is non-trivial: reduced validator diversity could theoretically centralize control over identity anchor registries, defeating the privacy-preserving design goals of DID architectures.
Engineering teams must also wrestle with metadata leakage. Even anonymized credential interactions generate on-chain breadcrumbs—timestamp correlations, key reuse, revocation patterns—that can be exploited unless zero-knowledge proofs or stealth addressing mechanisms are integrated. These privacy-preserving layers often require layer-2 ZK-rollups or complex off-chain compute environments, reintroducing dependency chains that complicate trust analysis and system auditability.
A more experimental but promising direction is offloading raw identity data storage to decentralized compute networks like Golem, allowing blockchains to focus solely on lightweight state transitions. This segregation of duties—computation off-chain, verification on-chain—has been explored in projects discussed in The Visionaries Behind Golem: Decentralizing Computing, which may pave the way for more efficient identity data flows.
Ultimately, every engineering decision—data locality, consensus method, on-chain/off-chain separation—exposes different failure modes or latency penalties. As identity systems edge toward production-grade deployments, scalability questions are no longer theoretical. They are existential.
Up next, the series will dissect the inconsistent global regulatory landscape and its implications for decentralized identity adoption and compliance.
Part 7 – Regulatory & Compliance Risks
Regulatory and Compliance Risks in Decentralized Identity Systems: Cross-Jurisdictional Chaos and Legal Ambiguity
The regulatory terrain for decentralized identity (DID) solutions is fragmented, hostile in some jurisdictions, and dangerously undefined in most. These legal ambiguities pose a formidable barrier to widespread adoption, particularly for protocols looking to scale beyond permissionless networks and into enterprise and governmental use cases.
One of the most immediate risks stems from the clash between DID frameworks and established Know Your Customer (KYC) and Anti-Money Laundering (AML) laws. In high-compliance jurisdictions like the U.S. and the EU, regulators demand immutable identity verification tied to real-world documentation. Decentralized identity models, by design, avoid centralized repositories of personally identifiable information—a foundational tension that invites regulatory scrutiny. Projects seeking institutional partnerships or fiat on-ramps may be forced into hybrid models that compromise decentralization to appease legal mandates.
Cross-jurisdictional interoperability further complicates compliance. An identity token that’s GDPR-compliant in the EU may violate emerging data sovereignty laws in regions like India, where personal data localization is a legal mandate. This makes it nearly impossible for a single DID protocol to operate globally without adapting minute structural differences to stay compliant—adding overhead and discouraging innovation.
The specter of government intervention looms especially large for DID adopters. As the technology begins to challenge state-led digital identity tools—such as national ID systems—expect legislative friction. Historical regulatory crackdowns on privacy coins and mixers like Tornado Cash have shown governments' willingness to squash tech when it undermines surveillance capabilities or threatens monetary sovereignty.
There's also the risk of precedent. Regulatory reactions to decentralized finance—most notably in the form of the SEC's ambiguous stance on what constitutes a “security”—set a tone that could spill over into identity protocols. Claims of token utility haven’t protected DeFi platforms; a similar fate could await DID systems if regulators interpret identity tokens as “identity markets” or data monetization schemes. These interpretations carry existential consequences if arbitration leads to fines or forced shutdowns.
Furthermore, protocols like Ontology, explored in-depth in Ontology vs Rivals The Blockchain Identity Battle, may become case studies in how decentralized ID systems either adapt to or resist top-down governance pressure.
This broad uncertainty is already disincentivizing venture capital and enterprise involvement—at a time when DID systems most need financial backing and legal clarity.
In Part 8, we’ll examine the economic and financial ripple effects of decentralized identity entering both permissionless and traditional markets, including its potential to disrupt legacy ID infrastructure, licensing revenue streams, and compliance-heavy industries like finance and healthcare.
Part 8 – Economic & Financial Implications
Economic and Financial Implications of Decentralized Identity Solutions
The integration of decentralized identity (DID) systems doesn’t merely alter privacy dynamics—it unleashes complex economic consequences that could upend the digital identity verification market and broaden crypto’s utility across financial verticals. At the forefront is market disruption: traditional KYC and authentication providers, reliant on centralized data repositories, are increasingly vulnerable to being replaced by self-sovereign identity protocols. These solutions, often built on blockchain layers with verifiable credentials, decimate intermediaries by enabling peer-to-peer trust without databases.
This redirection cascades into fragmented value accrual models. Protocols offering identity layers could become foundational infrastructure, monetizing the issuance, attestation, and verification of identities. However, their value capture depends on effective token economies. Much like we've seen with decentralized data oracles, new incentive structures will be needed to motivate issuer-participant engagement in the absence of centralized profits. Without robust incentive alignment, DID projects may face the same fate as underutilized DeFi primitives.
For institutional investors, the asset class profile of identity-focused projects complicates established risk models. Tokens tied to DIDs do not yield in the same manner as liquidity pool-backed DeFi protocols or staking mechanisms. Their value hinges on evolving regulatory environments, network participation rates, and integration into broader ecosystems—factors that rarely manifest in predictable cash flow valuations. Risk-adjusted ROI could easily fall short of expectations unless governance and utility are tightly coupled and market penetration is robust.
Meanwhile, developers find both opportunity and constraint. Projects building core layers of DID can capitalize early, but those choosing to integrate with open standards risk commoditizing themselves. Fragmentation is another issue—if multiple DID standards proliferate without interoperability, composability across ecosystems may collapse, increasing friction for end users and developers alike.
Day traders, perpetually seeking volatility, may latch onto identity tokens during hype cycles, but the long-term horizon remains unclear. These tokens may not follow traditional TVL/trading volume narratives and could require entirely new metrics—such as active attestations or verified credential flows—that the market has yet to price correctly.
Moreover, tribal allegiance from identity layer camps—whether they emerge from projects like Ontology, Ethereum-attached credentials, or cross-chain ecosystems—could influence liquidity patterns, speculative surges, or yield farming strategies tied to governance rights.
Such shifts prune some market participants while fortifying others. Exchanges, for instance, may embed verified DID services into sign-up flows as native features, enhancing usability and reducing regulatory burdens—especially for those operating under uncertain jurisdictional pressures. Strategic investors might view emerging relevance as an entry point into less-saturated infrastructure plays that mirror the early DeFi explosion.
Part 9 will explore a less tangible—yet arguably more disruptive—facet: the social and philosophical reordering of identity, power, and trust that decentralized systems bring to the digital age.
Part 9 – Social & Philosophical Implications
Decentralized Identity and the Economic Disruption of Digital Markets
As decentralized identity (DID) systems begin to disrupt the foundational assumptions of digital interaction, their economic and financial implications merit deep analysis. The decentralization of identity introduces a paradigm shift in how value, risk, and opportunity are distributed across markets and stakeholders.
At a structural level, DIDs threaten to disintermediate platform-centric gatekeepers—traditional identity verifiers, KYC providers, and data brokers—undermining the multi-billion-dollar surveillance capitalism model. The shift from custodial identity tied to centralized platforms to self-sovereign identity models has the potential to erode decades-long incumbents that profit from user data siloing. Startups and agile developers building on open standards like W3C Verifiable Credentials see an opportunity to capture new economic layers powered by trustless reputational capital.
Institutional investors face a radically asymmetric landscape. On one hand, early positioning in DID infrastructure—blockchain projects focusing on verifiable authentication, decentralized attestations, or cross-chain identity resolution—offers exponential upside. But the same investors must reconcile this with the defensive collapse of conventional privacy-invasive user tracking. Identity monetization becomes decentralized and potentially tokenized, upending portfolio assumptions centralized around Web2 ad tech.
For developers, decentralized identity introduces both complexity and empowerment. Effective monetization aligns closer with DID-compatible protocols for authentication, content access control, or encrypted communications. But integrating across multiple chains or data standards adds cost and interoperability friction. This mirrors challenges seen in cross-chain oracle integrations, as examined in The Overlooked Dynamics of Blockchain Incentives.
Traders may identify early alpha in DID-aligned tokens, particularly those that tokenize identity credentials, social reputations, or granular data access rights. However, these assets can be illiquid, speculative, and difficult to price due to the novelty of their use cases. Secondary markets tied to DID ecosystems are vulnerable to primitives that lack proven tokenomic feedback loops—something observable in other experimental sectors like decentralized data oracles.
Financial risk, meanwhile, is not evenly distributed. As data ownership shifts toward the individual, legal liabilities around on-chain attestations, falsification, and misattribution could shock emerging identity token markets. Similarly, privacy regulation may impose unexpected constraints on DID-related tokens that fail to meet evolving jurisdictional definitions for personal data control.
The economic battleground is being redrawn. But beneath the token valuations and protocol debates lies a deeper reckoning: the re-commodification of trust itself. That shift opens a Pandora’s box of social and philosophical implications that go far beyond capital—and will be the focus of our next section.
Part 10 – Final Conclusions & Future Outlook
Final Reflections: The Future Landscape of Decentralized Identity
After dissecting trustless authentication mechanisms, token-gated access models, and resistance to identity silos, the conclusion is clear: decentralized identity (DID) solutions aren’t a UX upgrade — they represent a paradigm shift. But the path to adoption remains murky, fragmented between technical realities and ideological purity.
In a best-case scenario, decentralized identity becomes the default layer across DeFi, gaming, DAOs, and beyond. Wallets like MetaMask and interfaces that integrate verifiable credentials at the protocol level move from Web3 fringe tools to digital passports accepted across blockchains. Adoption here hinges on removing friction — eliminating JSON-LD complexity, expanding zero-knowledge support for privacy guarantees, and rethinking incentive design to align validators, issuers, and credential holders. Identity, in this vision, becomes composable — a modular Web3 primitive as foundational as tokens or oracles.
In the worst-case case? DID solutions get buried beneath their own fragmentation. Competing frameworks (VC, DIDs, zkIDs, SBTs) never achieve standard consensus, and bloat from identity attestation layers adds more friction than trust. If dependency on centralized verifiers like LinkedIn, government records, or KYC providers becomes cemented, we’ll have created another permissioned trust stack — cloaked in decentralization theater.
Real adoption also clashes with regulatory flux. If governments recognize blockchain-based identity as compliant or even superior alternatives to traditional KYC/AML tools, decentralized ID could accelerate. But without global guidance, most platforms will continue to err toward centralized verification to sidestep legal exposure.
There are still core unanswered tensions: How do decentralized identity systems balance privacy with recoverability? Is sovereignty meaningful if onboarding continues to rely on centralized institutions? Can DID survive in an ecosystem where speculative incentives dominate design?
To bridge current constraints, robust alignment with existing decentralized computation infrastructure like Golem's ecosystem could play a transformative role. Pairing off-chain compute power with privacy-preserving identity verification might be the missing piece this fragmented landscape needs.
Mainstream adoption isn't impossible. But it’s not inevitable. It requires a shift from product-building to ecosystem coordination. A reliable identity layer can’t be bootstrapped overnight or sustained by token inflation.
In the end, perhaps the most important question remains: Will decentralized identity redefine the very architecture of blockchain — or will it join the graveyard of experiments that were ahead of their time but failed to solve for coordination, usability, and trust?
Authors comments
This document was made by www.BestDapps.com