Identity serves as the foundation of every layer of our lives today. everything we do, both on and offline, relies upon some aspect of our identities to work. Using online services, opening bank accounts, voting in elections, buying property, and securing employment; these are just a few of the important activities we engage in everyday that require proof of identity.
Với sự tích hợp của thế giới kỹ thuật số vào các khía cạnh rộng lớn hơn trong cuộc sống của chúng ta, nhận dạng kỹ thuật số đã trở nên rất quan trọng. Là người tiêu dùng và denizens của internet, các phím này rất phong phú.
Tuy nhiên, trong tay của các trung gian tập trung, những người phát hành, giữ và kiểm soát thông tin của chúng tôi, khái niệm về nhận dạng kỹ thuật số gây ra nhiều mối quan tâm, trong đó có liên quan nhất là quyền riêng tư và bảo mật dữ liệu. Với 71,1 triệu người là nạn nhân của tội phạm mạng trên cơ sở hàng năm, và các doanh nghiệp mất trung bình 1 nghìn tỷ USD hàng năm , danh tính kỹ thuật số của chúng tôi không an toàn chính xác với các thực thể tập trung.
Như hiện tại, người dùng không có cách nào để kiểm soát thông tin liên quan đến danh tính, hoặc quyết định ai có quyền truy cập vào thông tin nhận dạng cá nhân (PII), hoặc thậm chí có bao nhiêu quyền truy cập bên thứ ba đạt được. Để ngăn chặn trộm danh tính, nhiều người đăng ký sử dụng nhiều thông tin đăng nhập và mật khẩu, nhưng điều này không giải quyết được vấn đề.
Sự thật là, hầu hết mọi người muốn họ có thể có một quá trình xác nhận đơn giản, nhưng an toàn cho tất cả các đăng nhập của họ; tốt, đó chính xác là những gì nhận dạng phi tập trung là tất cả về. Blockchain, như một công nghệ, là lý tưởng cho việc áp dụng một mô hình nhận dạng phi tập trung, với đó đăng ký an toàn, truy cập và quyền riêng tư của thông tin cá nhân tất cả trở nên khả thi.
Trong phần này, chúng ta sẽ xem xét nhận dạng phi tập trung có ý nghĩa gì trong thế giới ngày nay, tại sao nó quan trọng, cách nó được quản lý trên blockchain và những gì nó cung cấp cho người dùng.
What Is Decentralized Identity?
Decentralized identity, often used interchangeably with self-sovereign identity (SSI), primarily gives individuals the power to control their own digital identity without having to rely on a service provider.
In a decentralized framework, individuals are provided with credentials from important issuers, such as the government, educational institutions, and employers, which are then stored in a digital wallet. Individuals can then present those credentials to the relevant issuing authority, who verifies their identity through a blockchain-based ledger that does not store any of the user’s data.
Essentially, a digital identity is a body of information about an individual, organization, or electronic device that exists online and contains their usernames and passwords, search history, social security number, address, biometrics, citizenship, employment, credit card accounts, credit history, and more.
By using a decentralized identity, individuals gain full control of their personal information, and the ability to provide only the information required for verification. Decentralized identity management supports an identity trust framework through which users, organizations, and things interact with each other transparently and securely.
Tại sao nhận dạng phi tập trung lại quan trọng trong thế giới ngày nay?
Many people today aren’t pleased with how personal identity is handled, or how businesses go about building it.
Organizations need to collect sensitive personal data from users to authenticate their identities. However, as long as businesses continue to suffer data breaches and mishandle information, the existing identity system may not necessarily be in the customers’ best interests, further suggesting that the safety of individual digital identities is not guaranteed.
In 2017, Equifax fell victim to one of the worst data breaches in corporate history, as the personal information of more than 147 million people, including Social Security numbers, dates of birth, home addresses, driver’s license numbers, and credit card numbers, was exposed.
Decentralized identity, on the other hand, promises to improve user independence, enhance privacy, and inspire digital transformation across organizations, even in its development stage.
Làm thế nào để quản lý danh tính phi tập trung trong Blockchain?
Decentralized identity is set up on the blockchain according to a few key elements. For example, for decentralized identity management, a decentralized, encrypted, blockchain-based wallet is used.
These decentralized encrypted wallets are unique applications (also known as identity wallets) that enable users to create their own decentralized identity. Upon the development of an identity, two cryptographic keys are generated—one public, one private.
The identity wallet submits a registration payload with a public key to the blockchain, which subsequently generates a unique identifier linked to the wallet. The private key, however, remains on the user’s device/identity wallet, and is used during authentication processes.
All information created in the identity wallet is signed and verified by multiple trusted parties to ensure factual accuracy. This means that issuers and verifiers, such as governments, universities, and finance institutes, confirm the information in question, and add the data to the digital identity in a process similar to issuing a certificate. With the newly created decentralized identity wallet, users are enabled to provide proof of identity to any third party, anywhere in the world.
Lợi ích của nhận dạng phi tập trung
1. Security: One of the major reasons for leveraging the blockchain in decentralized identity systems is to ensure sturdy security. The blockchain caters to digital signatures, consensus algorithms, and cryptographic hash functions to protect user identities from breaches and theft. In this way, device and data tracking from browsing websites can be fully prevented, safeguarding users against the spread of data without their knowledge.
2. Trustworthiness: Blockchain technology utilizes a consensus approach to prove data authenticity through various nodes, and acts as a source of trust for verifying user identities. Along with this data, each block also contains a hash that changes if anything is tampered with. These blocks represent a highly-encrypted list of transactions and entries shared across all the nodes distributed throughout the network.
3. User Centric Apps: Decentralized identity give developers the opportunity to build user-centric apps that eliminate the need for passwords and inefficient authentication processes, and thereby enhance the user experience. Users can then safely request data directly from other users while maintaining their own privacy.
4. Privacy: Decentralized identity systems leveraging blockchains via pseudo-anonymous identifiers (decentralized identifier) can help mitigate privacy concerns. Each user fully owns their data, and can choose with whom to share relevant information, and how much.
5. Data Integrity: The blockchain-based data storage mechanism is immutable and permanent, eliminating the possibility of modification or removal. Decentralized identity can use this mechanism to ensure that data contained within cannot be modified or tampered with by external entities.
6. Simplicity: Identity issuers can leverage the seamless process of issuing digital identities. Identity verifiers can efficiently onboard new users and conduct the information verification process. Identity owners can effortlessly store and manage their identities within a decentralized identity wallet. This approach conceals data, highly reducing the risk of credential tracking, hacks, and unauthorized access breaches that would otherwise lead to the theft or monetization of people’s data.
On the Flipside
1. There is resistance from businesses and governments who wholeheartedly prefer, and often benefit from the current system, and may therefore not be in favor of end-users controlling their identities. This could become an impediment to the implementation of decentralized identity.
2. The truth is that, although decentralized identity runs on the blockchain, which is nigh impossible to hack, there are still weaknesses from outside the blockchain that can often lead to the risk of identity theft. Failure to store personal credentials such as seed phrases in safe, secure locations is one such avenue for hackers to gain access to identity wallets.
3. Lack of trust and acceptance by less-technologically-inclined users. Although decentralized identity offers many benefits, people who currently lack basic documents for ID, or lack technical know-how may have difficulty accepting and adapting to this new reality in which all of their personal details reside in the digital world.
Centralized Identity Management Vs Decentralized Identity Management
The major difference between centralized identity management (CIM) and decentralized identity management (DIM) lies in the manner in which data is stored and shared with other entities—an process that is otherwise described as identity access management (IAM).
In CIM, IAM typically takes place in one environment, while the same is spread out across different environments in DIM. To explain further, IAM in CIM can be compared to a workplace in which employees sign into a Slack channel in order to access information from across multiple different departments. On the other hand, in DIM, employees would have to sign into multiple channels to gain access to information from different departments, making them more secure.
Although CIM offers one-step access to information, which is beneficial in some cases, there is an increased risk of data breaches. However in DIM, data is decentralized and stored by users in their personal wallets, which eradicates any risk of a data breach.
Furthermore, data in CIM may be collected, stored, and shared with other parties without the knowledge of the original owner, whereas in DIM, data is only shared with those given explicit authorization by the owner.
Finally, data is owned and controlled by organizations, apps, and services in CIM, while in DIM, data is completely owned and controlled by the users themselves, thereby putting them in a more advantageous position in the data-sharing business.
Why You Should Care
Given the visible changes spurred on by the growth of blockchain, decentralized identity is well on the path to becoming the future of identity access management.
Decentralization stands to make significant improvements, especially in terms of ownership and control over personal identity and associated data. Decentralized identity has the potential to solve a wide range of other problems stemming from the centralized identity management experienced today, including widespread certificate fraud, slow and expensive verification processes, and data breaches.
Find out more about how Talao is improving European digital identity:
European Digital Identity: Talao Announces Professional Credential Solution
Read more on MetaVisa’s plans to integrate decentralized identity:
MetaVisa optimizes the on-chain credit system and integrates decentralized identity into DAO and GameFi as a support to improve the management and service for other projects like YGG