Skip to main content

Data Trust

How do you build a database of relationships without becoming the thing you despise?

The Pattern

Every contact is a thing. Every thing has states. The privacy constraint doesn't limit the state machine — it shapes it into something better. The trust ladder from the progress page is the skeleton. This page fills in the muscle.

The Trust Score

Trust isn't binary. It accumulates from signals, each weighted by how hard they are to fake.

Signals That Build

SignalWeightJustification
Registry verificationLowPublic record — anyone can check
Opt-in consentMediumActive choice to engage
Identity verificationHighCost and effort to confirm
Completed transactionHighMoney exchanged — real commitment
Referral that convertsVery HighStaking reputation on someone else
Commitments kept over timeHighestOnly time can produce this

Signals That Erode

SignalWeightJustification
Email bounceLowCould be technical
UnsubscribeMediumActive withdrawal of attention
Fraud flagCriticalImmediate freeze
Broken promiseHighDebit entry in the ledger
Referred contact who damagesVery HighNetwork quality proven poor

Score Thresholds

RangeStatusWhat It Unlocks
0-20Public record onlyView in directory
21-40EnrichedOutreach eligible
41-60EngagedPersonalized communication
61-80TrustedCollaboration and referral access
81-100CredibleFull network access, commission tiers

The score is a derivative of behavior over time. Gaming it requires sustained genuine contribution — which is the point.

Universal principles. Not jurisdiction-specific statutes — the patterns underneath them.

PrincipleWhat It MeansWhy It's Good Architecture
Data minimizationOnly collect what you needForces quality over volume
Purpose limitationOne purpose per consentForces clear thinking about why
Right to erasureDelete on requestForces earned presence
Consent ladderPermission before extractionForces trust before data
Legitimate interestPublic records are fair gameGives you a starting point without asking
Data portabilityPeople own their dataForces you to be worth staying with

The privacy law isn't a compliance burden. It's the specification for a trust system. Every principle maps to an architectural constraint that makes the system better, not worse.

Master Data

The telco pattern: one master record, many organizational views.

LayerWhat It HoldsWho Owns It
Master recordIdentity, verification status, trust scoreThe platform
Org-specific recordRelationship state, deal history, permissionsEach organization
Consent recordWhat was agreed, when, for what purposeThe individual

How It Works

The master doesn't own the relationship — it owns the identity. Organization A verifies a contact. Organization B trusts that verification (copy-link model). Neither duplicates the identity. Both maintain their own relationship state.

This is the common reference data pattern. Verified once, linked many times. The master delegates, never duplicates.

The Referral Engine

Privacy-preserving referral design:

MechanismHow It WorksWhy It Matters
Unique referral linksTrack clicks, not contactsYou never see who didn't convert
Referrer-driven sharingThey send invites, not youYou never touch non-opted-in data
Hash matchingPseudonymized conversion trackingPrivacy preserved through the funnel
Conversion rewardsCommission on conversion, not invitationAnti-spam by design
Tiered credibilityHigh-trust referrers earn moreQuality referrals compound

The whole world could be your sales team — if you earn it. The referrer stakes their reputation on each introduction. The platform rewards the stake when it converts. Spam is structurally impossible because the referrer bears the social cost of bad introductions.

The DePIN Bridge

How attestations make trust portable:

WhareroaTrust SystemFunction
Commissioning signoffVerified credentialProof of identity, portable between organizations
Maintenance logOn-chain relationship historyOngoing proof of trust earned
PLC logicSmart contractAccess rules enforced by trust level
Site storeCredential registryWhere verified identities are accounted for

The PLC parallel: commissioning signoff is an on-chain attestation. When Organization A signs off on a contact's identity, that attestation travels. Organization B can trust it without re-verifying. The verification cost is paid once. The trust is used many times.

Context

  • Progress — The state machine that tracks everything
  • Credibility — Trust as the metric for agency
  • DePIN — Infrastructure on verifiable rails
  • Goodwill — Generosity without expectation that compounds into trust
  • Persuasion — Earning the right to be heard

Questions

How do you measure whether someone deserves your data — and whether you deserve theirs?

  • At what trust level does a contact become more valuable than the cost of maintaining their record?
  • If the referrer sends the invite, who owns the relationship — the referrer, the platform, or the prospect?
  • What breaks first when you scale trust scoring across organizations — the data model or the incentives?
  • The legal frame says "delete on request" — what happens to the trust score when someone exercises that right and comes back?