SSI - Identity Verification Evolution

October 25th, 2022

How technology has made identity verification and creation evolve during history?

Continuation from post SSI: Digital Identity User Experience

Understanding the evolution of identity verification is crucial for designing the future of digital identity. Each technological advancement has brought new possibilities and challenges, shaping how we prove who we are and how others verify our claims. But this isn't just a technical story, it's a story about power, control, and the fundamental question of who gets to decide who you are.

I've been thinking about this a lot during my time working with digital identity systems. The more I learned about how identity verification has evolved, the more I realized that every step forward has also created new problems. It's like we're constantly trying to solve yesterday's problems while creating tomorrow's challenges.

The Pre-Digital Era: Trust Through Authority

Physical Documents and the Birth of Bureaucracy

For centuries, identity was tied to physical documents, birth certificates, passports, driver's licenses. These documents were issued by trusted authorities and carried physical security features like watermarks, seals, and signatures. The verification process was manual and required human inspection.

But here's the thing that really struck me: these documents weren't really about proving who you were, they were about proving that some authority had vouched for you. A passport didn't prove you were you; it proved that your government said you were you. This created a system where identity was fundamentally about institutional trust, not personal verification.

This is something I think we often forget. We've gotten so used to the idea that identity comes from institutions that we don't question it anymore. But what if you don't trust the institution? What if the institution doesn't exist? What if the institution is corrupt?

The Problem with Physical Documents

Physical documents were easy to forge, difficult to verify remotely, and created barriers for people who didn't have access to official documentation. The system was slow, expensive, and exclusionary. But more importantly, it created a dependency on institutions that could be corrupt, biased, or simply unavailable.

Think about it: if you were born in a country without a proper birth registry, or if you were a refugee, or if you were part of a marginalized community, your identity literally didn't exist in the official system. You couldn't prove who you were because no one with authority had ever said you existed.

The Social Construction of Identity

Before we had official documents, identity was largely a social construct. You were who your community said you were. Your identity was validated through relationships, reputation, and social proof. This was actually more flexible and inclusive than the bureaucratic systems that replaced it, but it didn't scale well and was vulnerable to social manipulation.

The Digital Revolution: From Paper to Pixels

Database Systems and the Centralization of Identity

The introduction of computer databases revolutionized identity management. Governments and institutions could now store and cross-reference identity information electronically. This made verification faster and more accurate, but it also created new vulnerabilities and dependencies.

Suddenly, your identity wasn't just a piece of paper, it was data in a system. This meant that whoever controlled the system controlled your identity. If the system went down, your identity went down with it. If the system was compromised, your identity was compromised.

The Internet Era: Identity Goes Global

With the rise of the internet, identity verification moved online. Email addresses became identifiers, and passwords became the primary authentication method. This was convenient but created massive security problems.

The internet also created a new kind of identity problem: how do you prove who you are when you're interacting with people you've never met, in places you've never been, through systems you don't understand? The answer was to create new forms of digital identity that were separate from your physical identity.

Social Security Numbers and National IDs: The Standardization of Identity

Many countries introduced national identification systems that could be used across different services. This centralized approach made verification easier but created single points of failure and privacy concerns.

The Social Security Number in the US is a perfect example of this. It was never meant to be a universal identifier, but it became one because it was the only number that most people had. This created a system where a single number could unlock access to everything about you, your bank accounts, your medical records, your tax information, your credit history.

I remember when I first moved to the US, I was shocked by how much power this one number had. You literally couldn't do anything without it. Open a bank account? Need your SSN. Get a job? Need your SSN. Even getting a library card sometimes required it. It's like they took this number that was supposed to track your retirement benefits and turned it into the master key to your entire life.

The Modern Era: Convenience vs. Control

Biometric Technology: Your Body as Your Password

Fingerprint scanners, facial recognition, and other biometric technologies have made identity verification more secure and convenient. However, they've also raised serious privacy concerns and created new forms of surveillance.

The problem with biometrics is that they're not really passwords, they're identifiers. You can change a password, but you can't change your fingerprint. If your biometric data is compromised, it's compromised forever. And unlike passwords, biometric data can be collected without your knowledge or consent.

This is something that really worries me. We're walking around with our faces and fingerprints everywhere, and we have no idea who's collecting this data or how they're using it. I've seen people unlock their phones with their face without thinking twice about it, but what happens when that data gets into the wrong hands? You can't get a new face.

Two-Factor Authentication: Security Through Friction

The introduction of 2FA added an extra layer of security, but it also added friction to the user experience. Users had to carry additional devices or remember complex procedures. This created a tension between security and usability that we're still trying to resolve.

The real problem with 2FA is that it's still based on the assumption that you need to prove who you are to every service you use. It doesn't solve the fundamental problem of identity fragmentation, it just makes it more secure.

OAuth and Social Login: The Rise of Platform Identity

The development of OAuth and social login protocols made it easier for users to access multiple services with a single identity. However, this created new dependencies and gave tech giants enormous power over digital identity.

Now, instead of having dozens of different identities, you have one identity that's controlled by Google, Facebook, or Apple. This is convenient, but it means that these companies have enormous power over your digital life. If they decide to lock you out, you lose access to everything.

I've seen this happen to people. Someone gets locked out of their Google account, and suddenly they can't access their email, their photos, their documents, their calendar, everything. It's like having your entire digital life held hostage by one company. And the worst part is, there's often no human you can talk to about it. You're just stuck in an automated system that may or may not help you.

The Blockchain Revolution: A New Paradigm

Decentralized Identity: Taking Back Control

Blockchain technology introduced the possibility of decentralized identity systems where users could control their own identity data without relying on central authorities. This was a fundamental shift from previous approaches.

For the first time in history, it became possible to have an identity that wasn't controlled by any single institution. You could prove who you were without relying on a government, a bank, or a tech company. This was revolutionary, but it also created new challenges.

Cryptographic Proofs: Trust Through Math

Zero-knowledge proofs and other cryptographic techniques made it possible to prove identity claims without revealing the underlying data. This solved many privacy problems while maintaining security.

This is where things get really interesting. Instead of saying "I am John Smith, here's my driver's license," you could say "I can prove I'm over 18" without revealing your name, age, or any other personal information. This is a fundamentally different way of thinking about identity.

When I first learned about zero-knowledge proofs, it blew my mind. The idea that you could prove something about yourself without revealing the underlying information seemed like magic. But it's not magic, it's math. And it could change everything about how we think about privacy and identity.

Smart Contracts: Programmable Identity

Smart contracts enabled programmable identity verification, allowing for complex rules and automated processes that weren't possible with traditional systems.

Imagine a smart contract that automatically verifies your identity for a loan application, checks your credit score, and approves or denies the loan, all without any human intervention and without revealing your personal information to the lender.

The Current State: A Fragmented World

The Identity Crisis

We now live in a world where multiple identity systems coexist. Users have to manage different identities for different services, each with its own verification requirements and security measures. This creates a massive burden on users and creates security vulnerabilities.

The average person has over 100 different online accounts, each with its own password, security questions, and verification processes. This is unsustainable and creates a huge attack surface for hackers.

I know I have way more than 100 accounts. Every time I want to try a new app or service, I have to create another account. And each one has different password requirements, different security questions, different verification processes. It's exhausting. And the worst part is, I can't even remember half of them. I'm constantly resetting passwords and going through recovery processes.

Privacy Concerns: The Data Economy

The collection and use of personal data has become a major concern. Users are increasingly aware of how their data is being used and want more control over their digital identity.

The problem is that most users don't understand how their data is being used. They click "agree" to terms of service they never read, and they have no idea what data is being collected or how it's being used. This creates a power imbalance between users and the companies that collect their data.

I'm guilty of this too. I've clicked "agree" to thousands of terms of service without reading them. Who has time to read a 50-page legal document every time they want to use an app? But the result is that we're giving away our data without even knowing what we're giving away. It's like signing a contract in a language you don't understand.

Security Challenges: The Honeypot Problem

Despite advances in technology, identity theft and data breaches continue to be major problems. The centralized nature of most identity systems creates vulnerabilities that are difficult to address.

The problem is that we've created a system where all your eggs are in one basket. If one service is compromised, all your data is compromised. This is why data breaches are so devastating, they don't just affect one service, they affect everything.

I remember when Equifax got hacked in 2017. They had data on 147 million people, including Social Security numbers, birth dates, addresses, and driver's license numbers. That's almost half the US population. And what could people do about it? Nothing. They couldn't change their Social Security number. They couldn't change their birth date. They were just stuck with compromised identity data forever.

The Future: Self-Sovereign Identity

What Self-Sovereign Identity Really Means

The next evolution in identity verification is self-sovereign identity (SSI), where users have complete control over their identity data and can choose what to share, with whom, and for how long.

This isn't just about technology, it's about power. It's about giving users the ability to control their own identity instead of having it controlled by institutions. It's about creating a system where identity is a right, not a privilege.

Interoperability: Breaking Down the Silos

Future identity systems will need to be interoperable, allowing users to use the same identity across different platforms and services while maintaining privacy and security.

This means creating standards that work across different systems and platforms. It means building bridges between different identity systems instead of creating new silos.

User-Centric Design: Putting Users First

The focus is shifting from what's convenient for institutions to what's best for users. This means designing systems that are secure, private, and easy to use.

This is a fundamental shift in thinking. Instead of asking "How can we make this secure for our system?" we need to ask "How can we make this secure and usable for our users?"

The Deeper Implications

Identity as a Human Right

Identity isn't just a technical problem, it's a human right. Everyone has the right to prove who they are, to control their own data, and to participate in society. The current system excludes millions of people who don't have access to official documentation or who are part of marginalized communities.

Self-sovereign identity could change this. It could create a system where everyone has access to identity verification, regardless of their circumstances or location.

The Power Dynamics of Identity

Identity systems are fundamentally about power. They determine who gets access to what, who gets to participate in society, and who gets to control their own data. The current system concentrates this power in the hands of a few large institutions.

Self-sovereign identity could redistribute this power. It could create a system where users have control over their own identity instead of having it controlled by institutions.

The Economic Implications

Identity systems have enormous economic implications. They determine who can access financial services, who can get loans, who can start businesses, and who can participate in the global economy.

The current system excludes billions of people from the formal economy because they don't have access to proper identity verification. Self-sovereign identity could change this by creating a system that works for everyone, regardless of their circumstances.

The Path Forward

The future of identity verification lies in systems that give users control while maintaining security and enabling innovation. This is the promise of self-sovereign identity and the technologies that support it.

But this isn't just about technology, it's about creating a more just and equitable world. It's about giving everyone the ability to prove who they are and to control their own data. It's about creating a system where identity is a right, not a privilege.

The evolution of identity verification has been a story of increasing centralization and control by institutions. Self-sovereign identity represents a fundamental shift toward user control and empowerment. It's not just the next step in the evolution of identity, it's a revolution in how we think about identity itself.


Next in the series: What is digital identity? Where does the concept come from?