Share this article

Dear Elon, This Is How to Decentralize Twitter and Give the Internet Back to Everyone

The self-sovereign web would use protocols, not companies, to build the tools we need most.

Updated Jun 14, 2024, 10:58 p.m. Published Oct 28, 2022, 6:05 p.m.
(Chesnot/Getty Images)
(Chesnot/Getty Images)

Dear Elon,

Congrats on buying Twitter! We’ve been watching the process unfold with enthusiasm because of all the times you’ve mentioned the importance of decentralization. You and your team seem to have the vision to use this wonderful platform as the lever to kickstart a more mature and self-sovereign web.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the CoinDesk Headlines Newsletter today. See all newsletters

With the right design, a decentralized Twitter would catalyze a new kind of internet – fundamentally changing the relationship between users and platforms. People could own the data they generate across applications across the web.

David Sneider is a co-founder of Lit Protocol, a decentralized cryptography network.

A look at Twitter’s (TWTR) product lines like profiles, posts, messaging system and advertising could provide insight into what the self-sovereign web would look like and how to go about onboarding people.

Vision

As we can tell from your texts with former Twitter CEO Jack Dorsey, it seems you believe Twitter today is lingering at the limits of the utility it can provide. To become more useful to users and develop further as a “protocol” rather than as a company, we can learn a lot from email.

Email is a protocol. You might be using Microsoft Office, Dorsey might be using Proton, and I’m on Gmail. We can all easily message one another and be on the same thread, but see and write our emails via different application interfaces (e.g. Outlook, Gmail).

See also: Why the Decentralized Web's Development Is Unstoppable | Opinion

This model can be expanded to social media using systems like Filecoin, Arweave, Ceramic and Polybase. Users' connections and posts wouldn’t be confined to a single “walled garden” like Twitter or Facebook, but live on the open web. This data can still be private and permissioned (and therefore monetized) via threshold cryptography-powered access control (like what Lit is building).

On decentralized, user sovereign and privacy-focused social-media protocols, users will have the ability to consent to which applications and connections can see their content across interface platforms just like email.

Onboarding

One of the biggest hurdles in Web3 is wallet user experience. For some people, self-custody of keys is a privilege, but for many more, it’s a burden. As a result, in the past year, there’s been an explosion of interest in multiparty computation (MPC).

MPC wallets enable users to sign into apps with a traditional login, pin code and biometric with their wallets without the burden of self-custody or having to rely on a centralized key holder custodian.

Public user data

For the parts of the social graphs that are public, like Twitter today, there are already a number of active projects that have created open-source infrastructure to help people own their data. Lens Protocol and Orbis, for instance, are live now.

Private user data

Of course, not all social data is public. Often the basic components in social networking and media, like a person’s connections, profile info, posts and messages are private, meaning that they are viewable only to authorized people. Or, at least, it would be preferable to have that option.

Today, on Twitter, this data is largely locked within Twitter's and Facebook’s servers. The alternative is to store this data encrypted on the open web and give the user fine-grained access control over who can decrypt it.

This isn’t a new idea in online social networking, and this system is sync with the early days of the web and the Pretty Good Privacy (PGP) encryption program still used by many. (PGP allows people to post their public key anywhere, to receive messages that only the private key holder can read.)

Threshold cryptography advances these privacy standards by allowing users to create rules around who can view their posts. And if decentralized social protocols are widely adopted, this encrypted data could then be used across “the open web.”

For example, Alice might make a post with a setting that says “anyone on my friends list can see this post." Bob, Alice’s friend, could decrypt that post on any platform by proving his identity via a signature from his wallet.

Advertising

Ads are often considered a dirty subject in certain Web3 circles, but the fact is only about 10% of internet users pay for premium apps and software. That means most people use software services with ads.

Tracking a “conversion” for a purchase is largely done via last-click attribution where the publisher (e.g. Twitter) has some software running on its page that indicates to the advertisers (e.g. an e-commerce store) that a user has clicked on an ad. When that person makes a purchase, the publisher is compensated.

This too can be decentralized. The system mentioned above for user data can also be applied to ad attribution. The ”last click” is written to a person’s data hub (encrypted and stored on the open web) as a verifiable credential and then the advertiser can get permission to decrypt this data.

See also: The Decentralized Mystique

As the world’s regulators continue to crack down on tracking cookies, bringing the user and his or her consent into the system for tracking ad clicks and conversions presents a long-term path forward for ad-supported publishers.

Next steps

The decentralized networks to support global scale are still maturing, but there’s never been a better time to start laying the foundation. If you’re Elon Musk or another ambitious builder who’s got their eye on the future of social networking and media, please get in touch!

Note: The views expressed in this column are those of the author and do not necessarily reflect those of CoinDesk, Inc. or its owners and affiliates.

More For You

Protocol Research: GoPlus Security

GP Basic Image

What to know:

  • As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
  • GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
  • Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.

More For You

The Grandma Test: When Your Mom Can Use DePIN, Mass Adoption Has Arrived

Grandma (Unsplash/CDC/Modified by CoinDesk)

Mass adoption doesn't happen when crypto enthusiasts start using the technology: it happens when your grandma does it without even realizing it, argues Uplink co-founder Carlos Lei.