Tangledの信頼ネットワーク:LLMスパム蔓延に対する根本的治療法

Hacker News May 2026
Source: Hacker NewsArchive: May 2026
CAPTCHAやレート制限といった従来の防御策がLLM生成スパムの氾濫に押し負ける中、Tangledという新プロトコルが抜本的な代替案を提示します。それはユーザー同士が保証し合う分散型信頼ネットワークで、評判をポータブルで検証可能な暗号資産に変えるものです。AINews
The article body is currently shown in English by default. You can generate the full version in this language on demand.

The internet is drowning in content generated by large language models. Bots now produce spam, fake reviews, propaganda, and phishing lures at near-zero marginal cost. Traditional countermeasures—CAPTCHAs, IP rate limiting, content filters—are increasingly ineffective because LLMs can solve CAPTCHAs, rotate IPs, and produce text that passes as human. Tangled proposes a paradigm shift: instead of relying on centralized platforms to verify identity, it builds a decentralized trust network where users mutually attest to each other's authenticity. The core innovation is the use of zero-knowledge proofs (ZKPs) to create a 'verifiable privacy' layer: a service can confirm that a user has been vouched for by a certain number of trusted peers without learning who those peers are. This transforms trust into a user-owned, portable asset—a 'social capital token'—that can be carried across applications. For LLM-driven bots, the barrier shifts from computational cost (cheap) to social capital cost (expensive). A bot cannot easily forge a chain of human endorsements. The economic model of spam flips: instead of paying for compute, attackers must pay for real human relationships. Tangled's greatest challenge is the cold-start problem: a trust network is only as valuable as its initial seed nodes. But if it overcomes this, it could become the foundational layer for verifying human agency online, fundamentally altering the trust economics of the internet.

Technical Deep Dive

Tangled's architecture is a sophisticated blend of graph theory, cryptography, and game theory. At its core is a directed trust graph. Each node is a cryptographic identity (a public key). An edge from Alice to Bob represents a trust attestation: Alice vouches that Bob is a real human, not a bot. The graph is stored on a distributed ledger (likely a blockchain or a DAG-based structure) to ensure immutability and censorship resistance.

The magic lies in the query mechanism. When a service (e.g., a forum, a review site, a social network) wants to verify a user, it doesn't ask the user's entire trust graph. Instead, the user generates a zero-knowledge proof that demonstrates: "I have at least N distinct trust edges from distinct nodes that are themselves part of a high-trust subgraph (e.g., nodes with a minimum reputation score)." The verifier checks the proof without learning the identities of the endorsers. This is the 'verifiable privacy' feature.

The protocol defines a reputation score for each node, computed recursively. A node's score depends on the scores of its endorsers and the number of endorsements. This is similar to PageRank but applied to trust. The exact formula is a design parameter, but it must be Sybil-resistant. A common approach is to use a variant of the EigenTrust algorithm, which penalizes nodes that endorse low-trust nodes.

Key Cryptographic Components:
- Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge (zk-SNARKs): Used to prove statements about the trust graph without revealing the graph. Tangled likely uses a custom circuit optimized for graph queries.
- BLS Signatures: For aggregating multiple trust attestations into a single short signature, reducing on-chain storage.
- Verifiable Random Functions (VRFs): For selecting a random subset of endorsers to challenge during a verification, preventing targeted attacks.

Comparison with Existing Approaches:
| Approach | Mechanism | Verifiability | Privacy | Sybil Resistance | Cost to Attacker |
|---|---|---|---|---|---|
| CAPTCHA | Turing test | Low | Low | Low | Low (LLMs solve) |
| Rate Limiting | IP/account throttling | Low | Low | Medium | Medium (IP rotation) |
| Proof-of-Personhood (e.g., Worldcoin) | Biometric scan | High | Low | High | High (hardware) |
| Tangled | Trust network + ZKP | High | High | High | Very High (social capital) |

Data Takeaway: Tangled uniquely combines high verifiability, high privacy, and high Sybil resistance. While Proof-of-Personhood systems like Worldcoin require expensive hardware (iris scanners) and raise privacy concerns, Tangled achieves similar security with only software and existing social relationships. The attacker's cost shifts from compute to social engineering, which does not scale.

A relevant open-source project is the InterRep (Interreputation) repository on GitHub (currently ~1,200 stars). InterRep is a predecessor concept that uses a similar trust graph approach but without ZKPs, making it less private. Tangled's use of ZKPs is a critical advancement.

Key Players & Case Studies

The Tangled protocol is being developed by a pseudonymous team of cryptographers and distributed systems engineers. While the core team remains anonymous (a common practice in early-stage crypto projects), they have published a detailed whitepaper and a reference implementation in Rust. The project has attracted attention from several key players in the decentralized identity space.

Notable Adopters and Integrations:
- Lens Protocol: A decentralized social graph on Polygon. Lens is evaluating Tangled as a spam filter for its feed. Currently, Lens uses a simple token-gating mechanism (hold a Lens NFT to post), which is easily bypassed by bots that buy cheap NFTs. Tangled would add a social layer.
- Farcaster: Another decentralized social network. Farcaster uses a 'proof-of-participation' model where users must have a certain number of followers to post. Tangled could provide a more granular and Sybil-resistant alternative.
- Gitcoin Passport: A sybil-resistance tool for quadratic funding. Gitcoin Passport currently uses a combination of web-of-trust and OAuth stamps. Tangled could replace the OAuth stamps with a fully decentralized alternative, reducing reliance on centralized identity providers.

Competing Solutions Comparison:
| Solution | Approach | Privacy | Decentralization | Adoption Stage |
|---|---|---|---|---|
| Worldcoin | Biometric orb | Low (iris scan) | Medium (centralized verification) | Live (2M+ users) |
| BrightID | Social graph + verification parties | Medium | High | Live (100k+ users) |
| Gitcoin Passport | Multi-stamp (OAuth, web-of-trust) | Medium | Medium | Live (1M+ users) |
| Tangled | ZKP-based trust network | High | High | Testnet (Q2 2025) |

Data Takeaway: Tangled is the only solution that offers both high privacy (ZKPs) and high decentralization (no central authority). Worldcoin has the largest user base but relies on a centralized orb and biometric data. BrightID is decentralized but requires synchronous 'verification parties,' which are cumbersome. Tangled's asynchronous, privacy-preserving approach is a clear differentiator.

Industry Impact & Market Dynamics

The market for anti-spam and identity verification is massive. The global identity verification market was valued at $9.2 billion in 2024 and is projected to reach $18.6 billion by 2029 (CAGR 15.1%). The AI-generated content spam segment alone is estimated to cost businesses $200 billion annually in lost productivity, fraud, and moderation costs.

Tangled's business model is a protocol fee: a tiny fee (e.g., 0.01% of a transaction) is charged each time a trust attestation is used in a verification. This creates a revenue stream that scales with usage, not with user count. The protocol could also offer a 'premium verification' service for high-stakes applications (e.g., financial services, voting) that require a higher trust threshold.

Adoption Curve Prediction:
| Phase | Timeline | Key Milestones | User Base (est.) |
|---|---|---|---|
| Testnet | Q2 2025 | Launch with 10 partner dApps | 50,000 |
| Mainnet Launch | Q3 2025 | Integration with Lens, Farcaster | 500,000 |
| Enterprise Pilot | Q4 2025 | Pilot with a major e-commerce platform | 2,000,000 |
| Mass Adoption | 2026 | Standard for decentralized social media | 10,000,000 |

Data Takeaway: Tangled's adoption will likely follow the 'S-curve' typical of network effects. The initial growth will be slow (cold-start problem), but once a critical mass of trust nodes is established, the value proposition becomes compelling for any platform suffering from LLM spam. The enterprise pilot phase is critical: if Tangled can demonstrate a 90% reduction in spam for a major platform, it will trigger a land grab.

Risks, Limitations & Open Questions

1. Cold-Start Problem: The most significant risk. A trust network with no edges is useless. Tangled must bootstrap its initial trust graph. Proposed solutions include: (a) importing existing trust graphs from platforms like GitHub or Twitter (but this reintroduces centralization), (b) a 'trust airdrop' where early adopters receive tokens for vouching for a few friends, (c) partnerships with existing decentralized identity projects like ENS or Ceramic Network.

2. Sybil Attacks on Bootstrapping: During the cold-start phase, an attacker could create many fake identities and have them vouch for each other. Tangled's reputation algorithm must be robust to this. The whitepaper proposes a 'trust decay' mechanism: older trust edges have less weight, and nodes must be periodically re-endorsed.

3. Privacy vs. Accountability Trade-off: ZKPs provide privacy, but they also make it hard to hold users accountable for false attestations. If Alice vouches for a bot, how is she punished? Tangled uses a 'slashable' reputation: if a node is proven to have endorsed a Sybil, its reputation is reduced. But proving this requires revealing the identity of the endorser, which breaks privacy. This is an open research problem.

4. Regulatory Risk: Governments may view Tangled as a tool for anonymous communication, which could conflict with KYC/AML regulations. The protocol must be designed to allow for 'selective disclosure'—e.g., a user can prove to a regulated exchange that they have a certain number of trust edges without revealing their identity, but the exchange might still require additional KYC.

5. User Experience: Generating ZKPs is computationally expensive. A typical zk-SNARK proof generation takes 1-10 seconds on a modern smartphone. This is acceptable for infrequent verifications (e.g., creating an account) but not for real-time actions (e.g., posting a comment). Tangled is exploring 'proofless' modes for low-stakes actions, where the trust score is cached and only verified periodically.

AINews Verdict & Predictions

Tangled is the most intellectually honest attempt to solve the LLM spam problem. It acknowledges that technical fixes (better CAPTCHAs, better filters) are a losing battle against increasingly capable AI. The only sustainable solution is to raise the cost of abuse to a level that bots cannot afford. Social capital, unlike compute, is inherently scarce and non-fungible.

Our Predictions:

1. Tangled will become the de facto standard for decentralized social media by 2027. Lens, Farcaster, and similar platforms will adopt it because they have no better alternative. Centralized platforms (Twitter, Reddit) will be slower to adopt due to their existing moderation infrastructure, but they will eventually integrate Tangled as a 'verified human' badge.

2. The cold-start problem will be solved via a 'trust import' from existing web-of-trust systems like Keybase or PGP. This will be controversial (it centralizes the bootstrap), but it will be necessary to reach critical mass.

3. A new class of 'trust brokers' will emerge. These are individuals or organizations that specialize in building and maintaining high-reputation nodes. They will charge a fee to vouch for new users, creating a market for social capital. This could lead to inequality (the rich get more trust), but it also creates a clear economic incentive for honest behavior.

4. The biggest threat to Tangled is not technical but social. If the team remains anonymous and the protocol is captured by a small group of early adopters, it could become an oligarchy. The protocol must implement governance mechanisms (e.g., a DAO) to ensure that the trust graph remains open and fair.

5. By 2028, the concept of 'internet trust' will be fundamentally redefined. Instead of asking 'Is this account real?', we will ask 'How many real humans vouch for this account?' Tangled will be the infrastructure that makes this question answerable.

What to Watch Next: The launch of Tangled's mainnet in Q3 2025. The key metric is the number of 'trust edges' created in the first month. If it exceeds 1 million, the network effect will be unstoppable. If it stalls below 100,000, the project may need to pivot to a more centralized bootstrap model.

More from Hacker News

Claude Soul:200の会話がAIの自己進化の飛躍を引き起こすClaude Soul represents a fundamental rethinking of how AI systems learn over time. Instead of relying on static file sto分布ファインチューニング:ロボット的な文章作成を終わらせるAIブレイクスルーFor years, the most glaring flaw in AI-generated text has not been factual errors, but a pervasive, unmistakable 'plastiDeepSeek V4 Flash、クラウド不要で最先端AIをリビングルームへDeepSeek has unveiled V4 Flash, a model that compresses near-frontier reasoning capabilities into a footprint small enouOpen source hub3615 indexed articles from Hacker News

Archive

May 20261999 published articles

Further Reading

Tag:ローカルファーストの信頼層が真のAIエージェント自律性を実現する可能性Tagと呼ばれる新しいオープンソースプロトコルが、AIエージェント経済における根本的な信頼問題に取り組んでいます。エージェントがクラウドサーバーやユーザーアカウントを必要とせず、完全にデバイス上で相互に認証・承認できるようにすることで、TaAIエージェントパスポート:AIエージェントを信頼可能にするデジタルアイデンティティ標準AINewsは、自律型AIエージェントに検証可能なデジタルアイデンティティを付与する新たなオープン標準「AIエージェントパスポート」を発見しました。この標準は、エージェントエコシステムにおける核心的な信頼不足を解決し、エージェント間の監査可10人委員会が静かに自律エージェント向けAIアイデンティティルールを策定10人の技術委員会が、AIエージェントが自身を認証するための核心基準を静かに定義している。その作業は取引ボットからカスタマーサービスシステムに至るまでの信頼を左右するが、意思決定権の集中は深刻なガバナンス上の懸念を引き起こしている。Grievous-MCP:LLMの幻覚を武器化するオープンソースツールgrievous-mcp という新しいオープンソースツールは、LLMの幻覚を体系的に武器化し、AIの最も悪名高い欠点を制御可能な型付きデータ生成器に変えます。この革新は、業界の事実正確性への執着に挑戦し、創造的なアプリケーションにパンドラの

常见问题

这篇关于“Tangled's Trust Network: A Radical Cure for the LLM Spam Epidemic”的文章讲了什么?

The internet is drowning in content generated by large language models. Bots now produce spam, fake reviews, propaganda, and phishing lures at near-zero marginal cost. Traditional…

从“How does Tangled use zero-knowledge proofs for privacy?”看,这件事为什么值得关注?

Tangled's architecture is a sophisticated blend of graph theory, cryptography, and game theory. At its core is a directed trust graph. Each node is a cryptographic identity (a public key). An edge from Alice to Bob repre…

如果想继续追踪“Can Tangled prevent LLM-generated fake reviews on Amazon?”,应该重点看什么?

可以继续查看本文整理的原文链接、相关文章和 AI 分析部分,快速了解事件背景、影响与后续进展。