-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Legion grant application #2729
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Legion grant application #2729
Conversation
Added comprehensive documentation for the Legion project, detailing its passwordless, zero-knowledge authentication features, architecture, technology stack, and development roadmap.
|
CLA Assistant Lite bot All contributors have signed the CLA ✍️ ✅ |
|
I have read and hereby sign the Contributor License Agreement. |
|
Hi @Deadends thanks for the application. This is really cool tech, but my main concern lies around funding. I wouldn't recommend relying on W3F follow-up grants for support, as its not a surefire thing. Can you elaborate on your plans for funding after the grant is completed? |
Hi Keegan, Thanks for raising this it’s a fair concern. I want to be clear that I am not viewing this grant as a bridge to indefinite funding, but rather as targeted funding to deliver a finished public good. A self-contained artifact, not a serviceLegion is intentionally architected as a finished protocol artifact, not a live service. The outcome of this grant is a complete, usable zero-knowledge authentication primitive (circuits, verifier, and SDK) that can be deployed by any parachain or dApp. No recurring costs: Durable utility: Demand-driven future developmentI agree that relying on follow-up W3F grants for basic survival is not a viable strategy. Any post-milestone work would be strictly demand-driven:
SummaryAfter the grant is completed, Legion does not require external funding to remain usable or maintained. The delivered software is a complete protocol artifact, not a service, and can be adopted indefinitely without my ongoing involvement. Any future development would be optional and driven by demonstrated ecosystem demand, rather than being required for the project’s survival. If the ecosystem later requests specific extensions or optimizations, those would be pursued selectively through ecosystem-native mechanisms such as Treasury bounties or targeted grants, but Legion itself does not depend on them. |
keeganquigley
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for your answers @Deadends given the small price tag I'm happy to support it. I will mark the application as ready for review and ping the committee for further comment.
|
NOTICE: |
|
Thanks @keeganquigley, much appreciated. |
|
Following up to keep this application active, all requested steps on my side remain completed. |
|
Thanks @Deadends for your patience, many of us were out for the holidays. I will ping the committee again and bring it up for discussion in our next weekly sync. Cheers. |
|
Thanks for the update @keeganquigley, much appreciated. |
Project Abstract
LEGION is a proof of concept for a next-generation zero-knowledge authentication protocol designed to eliminate the weaknesses of conventional identity systems. Instead of relying on passwords, OAuth tokens, or mTLS certificates which can be stolen, forged, or leaked LEGION enables users and services to authenticate through cryptographic proofs that never reveal underlying secrets.
The protocol introduces a lightweight, high-performance Halo2 proof system capable of running in browsers, mobile devices, and distributed microservice environments. Authentication is expressed through challenge-bound ZK proofs, ensuring that each login is verifiable, non-replayable, and mathematically tamper-proof. This allows organisations to adopt a secure-by-design access model while maintaining sub-millisecond latency and horizontal scalability across millions of users.
The first implementation of the protocol consists of a WASM-based client that demonstrates real-time, zero-knowledge proof–based authentication for APIs, applications, and cloud-native services.
Grant level
Application Checklist
project_name.md).@_______:matrix.org(change the homeserver if you use a different one)