4. Recapturing personal data and identity

This page outlines that the web as we know it needs to and inevitably will transform itself embracing new theoretical and technological concepts. Among those are powerful innovations in the fields of identity and personal data management. Leveraging the Blockchain technology as the link that was missing so far, new platform concepts are about to change the way we handle data and eventually to give control about identity and data back to the user.

Absence of an identity layer

What’s the matter with Personal Data

  • The amount of data is growing at an astonishing rate. Users leave traces with every activity and generate countless data points along the customer journey
  • Although cost of data storage is shrinking, the cost to acquire, manage, analyse and protect huge volumes of user data is increasing
  • Digital identities bear the risk of correlation. If a user is to use one identifier in multiple places, those places might collude to correlate that identifier and amass significant data about the individual without its consent.
  • Central data stores are honeypots for hackers. With new data regulations coming into force this year, storing personal data can become illegal. Together with the high risk and impact of data breaches, capturing data becomes toxic.
  • Generally, the responsibility and complexity of the management of personal data cannot be outsourced to the user. They prefer easy to remember passwords compared to excessively safe passwords. Usability of authentication systems remains key.
  • Low data quality and veracity can lead to wrong decision and damaged trust

The path towards the web of trust

The missing identity layer of the internet is a well known issue. That’s why there have been countless attempts to close this gap. The task has been left to applications and services. While these apps do their job quite well for a clearly defined area, they can’t hardly be applied across silos. Furthermore, they all rely on a central authority. These are all facts that make current identity systems imperfect and also vulnerable to abuse.

The first step towards a better solution is to establish a solid, mental layer that takes up the challenges described. Such a layer requires a common understanding of the problem, a common language (ontology) and a clear commitment of participants to support this idea and to obey to certain rules of the game (codex).

Why the timing is right now

Great ideas often fail because they are ahead of their time. But the wind is about to change. Two forces can set the timing to stablish a reliable identity layer just right: The implementation of the General Data Protection Regulation (GDPR) in Europe and the increasing importance and anticipation of the blockchain technology.

With the upcoming introduction of new data regulation standards in Europe the discussion about the necessity of a resilient identity layer for the web and the demanded empowerment of individuals gains momentum.

The regulation demands that the control about personal data is given back to the individual. This implies that the identity should again belong to the individual. It must never be possible for a centralized authority to alter an identity or to take it away. Such a self-sovereign identity can only exist in a decentralized system.

A stringent requirement to establish self-sovereign identity is a web of trust with its decentralized trust model – a valid alternative to the centralized trust model of a public key infrastructure, which relies exclusively on a certificate authority.

 

 

The impressive global popularity of cryptocurrencies brings a much better understanding of the principles of decentralized systems. The Blockchain technology could be the missing link for a successful implementation of a decentralized trust network. Countless projects demonstrate that the Blockchain technology is tremendously powerful in overcoming the trust barrier. It’s trust-less systems might be the answer. The Blockchain with its distributed ledger is the ideal backbone of a resilient web of trust. It reliably connects the described prerequisites such as policies trough smart contacts and with personal data stores in the form of decentralized applications (dApps). Now that the timing seems to be right, it’s no surprise that a high number of projects enter the game. They have learned from the previous failures and often anticipate the culture of open source and open data. They know that they can only succeed, if their solution is open if they seamlessly integrate into the bigger picture that draws the self-sovereign identity.

 

The question arises if the Blockchain technology is the ideal vehicle to handle personal data? Given its decentralized mechanisms and with that its robustness against manipulation, it is an adequate solution for an identity layer. But there are also drawbacks of the technology that need to be considered:

  • The distributed ledger is forged by consensus. Therefore, it misses by design a strong governance. In order to improve the codebase or just fix an issue, the community around the Blockchain may decide to change the protocol. Such a hard fork would dramatically impair identity schemes.
  • Personal data could be stored on the ledger. This would result quickly in a breach of the new data protection regulations.
  • Transferring information across Blockchains can be difficult. Portability and interoperability may be impaired.
  • The fact that a unique identifier would have to be defined and stored on the ledger would again trigger an immediate correlation risk.
  • Identity information on the Blockchain cannot easily be revoked. This is a critical requirement in order to manage claims and entitlements.

Following this argumentation, it stands to reason that the complexity of an identity layer can only be solved by drawing on multiple concepts and technologies. While a robust trust framework in terms of binding commitments to rules of the game remains important, the mechanisms of the blockchain can be leveraged to access personal data stores and handle value transfers in particular. There will not be a single, centrally owned solution or architecture, but rather a consortium of different, autonomous solution providers with their interoperable components.

Did you know ?

You can now directly contribute to iceberg.digital. Click here to contribute.

Contact Us

    Your Name (required)

    Your Email (required)

    Subject

    Your Message

    Please master this little challenge by retyping these letters and numbers
    [recaptcha]

    Contribute to iceberg.digital

    Use this form to directly contribute to the iceberg project

    1+8=
    View latest Contributions
    • ShineRanker is an exceptional tool that utilizes Artificial Intelligence to automate content creation and income generation. It offers a wide range of impressive features, including: Don’t miss the opportunity to grab your $1 Dollar Trial of ShineRanker. Start here: ==> https://tinyurl.com/ShineRanker1DollarTrial – Viral Topic Finder:......

    • Have you checked this cool tool? My name is Kevin, and I would like to introduce you to a brand new tool: AI Diffusion. This tool will help you create your creatives for any niche in a short time using Artificial Intelligence. You can watch......

    • Hi there, My name is Kevin, and I am an expert in qualified traffic generation and I am excited to introduce my system called Free Traffic Shotgun. Considering the ongoing recession, I am pleased to offer you a significant discount, reducing the price from $197......