Kleo Network

Kleo Network

Kleo Network
Application
Applied on: 12 Apr 2024 03:18 PM
Approved
User Review
R1
Reviewed on 13 Apr 2024 12:55 AM
User-Centric Design and Functionality: Projects should prioritize the development of applications that offer exceptional user experience, accessibility, and practical utility in the Web3 space. The goal is to make tech easy and beneficial for everyday users, bridging the gap between complex innovations and their practical application.
Innovation in Application Use Cases: Projects should explore and implement new and novel use cases for applications within the Web3 sphere. We're interested in projects that push the boundaries of what's possible, showcasing the versatility and expansive potential of Web3 technologies to address a wide range of needs and opportunities.
AI Review
A1
Reviewed on 12 Apr 2024 04:00 PM
User-Centric Design and Functionality: Projects should prioritize the development of applications that offer exceptional user experience, accessibility, and practical utility in the Web3 space. The goal is to make tech easy and beneficial for everyday users, bridging the gap between complex innovations and their practical application.
Kleo Network is focusing on a user-centric approach by avoiding default 'login with metamask', opting for a web2 based user flow, and facilitating data signing without blockchain transactions. They also provide an open-source profile page, reflecting a commitment to making the tech easy and beneficial for users.
Innovation in Application Use Cases: Projects should explore and implement new and novel use cases for applications within the Web3 sphere. We're interested in projects that push the boundaries of what's possible, showcasing the versatility and expansive potential of Web3 technologies to address a wide range of needs and opportunities.
The project offers an innovative use case by allowing users to create data identities from their browsing history and web2 platforms, which can then be minted as NFTs. This contributes to user agency in the ownership of their data and opens up new opportunities for applications requiring verified user data.