{"id":2926,"date":"2020-11-07T11:43:00","date_gmt":"2020-11-07T16:43:00","guid":{"rendered":"https:\/\/rehack.com\/?p=2926"},"modified":"2024-10-02T09:06:35","modified_gmt":"2024-10-02T13:06:35","slug":"decentralized-identity","status":"publish","type":"post","link":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/","title":{"rendered":"What Are Decentralized Identities?"},"content":{"rendered":"<!-- Start Block: core\/paragraph -->\n\n<p>In modern life, organizations don&#8217;t just trust that we are who we claim to be. Instead, they need some kind of proof. As a result, identity management may mean relying on banks and government organizations for documents that provide evidence of your existence \u2014 like financial statements, Social Security numbers, birth certificates and state-issued IDs. A new technology called decentralized identity may soon replace these documents in many applications.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>Handing over your identity to providers or relying on physical documents isn&#8217;t always practical. In some cases, depending on third parties with weak data security and privacy practices may result in stolen or breached information. You can also lose physical IDs, meaning that for people like refugees, proving your identity can quickly become a major challenge.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>In<a href=\"https:\/\/identity.foundation\/\">&nbsp;tandem with the Decentralized Identity Foundation (DIF)<\/a>, Microsoft is looking to create a new approach to identity management \u2014 decentralized identities (DIDs). They&#8217;ve found that it&#8217;s possible to use new tech \u2014 like the blockchain \u2014 to develop a new, decentralized approach to identity management.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/heading -->\n\n<h2 class=\"wp-block-heading\">What Is a Decentralized Identity?<\/h2>\n\n<!-- End Block: core\/heading -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>Decentralized identities replace traditional physical and digital identifiers \u2014 like usernames \u2014 with unique and self-owned IDs.\u00a0These identities \u2014 also called &#8220;verifiable credentials&#8221; by Microsoft \u2014 allow third-party organizations to verify certain pieces of information about a given person. However, they must consent to handing over their data.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>The tech works by using the blockchain, which is the digital and distributed database technology that powers cryptocurrencies like Bitcoin.&nbsp;<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>The tech&#8217;s foundational ideas ensure the security and accuracy of data on the blockchain. Rather than store information in one place, copies of the blockchain are distributed across a network of computers that work to continuously update and verify it.&nbsp;<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>Every time users of the DID blockchain create a new transaction \u2014 whether by updating their ID or having a third-party verify some portion of their info \u2014 that transaction will be logged <a href=\"https:\/\/www.ico.li\/blockchain-validate-data\/\">as part of a new block<\/a>&nbsp;or set of transactions. Because each new block is linked to previous ones, the transaction&#8217;s information depends on data stored elsewhere in the blockchain. This combination of data distribution and linked block structure makes it extremely difficult to alter transactions once they&#8217;re completed.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>As a result, you can have verifiable proof of your identity. Unlike other forms of ID, you&#8217;ll also have ultimate control over it and who is allowed to verify it.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/heading -->\n\n<h2 class=\"wp-block-heading\">Why Identity Control Matters<\/h2>\n\n<!-- End Block: core\/heading -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>With DIDs, control of a person&#8217;s identity rests with them. It&#8217;s not up to providers \u2014 like email services, organizations and financial institutions that can verify proof of identity. As a result, you&#8217;ll have much more control over your identity and the information associated with it. This means that, unless you consent, you won&#8217;t have to transfer your information to a third party. This reduces the&nbsp;risk of your personal information being sold or transferred to others without your consent.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>The nature of DIDs on the blockchain also means you&#8217;ll have a full record of information associated with your identity, as well as a log of everyone who asked for info. You will know exactly which people and organizations have access to information tied to your decentralized ID.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>Theoretically, the distributed nature of the blockchain also makes it immune to hacking and data breaches. Despite the number of blockchain users, there&#8217;s been <a href=\"https:\/\/theconversation.com\/how-blockchain-could-prevent-future-data-breaches-130122\">no major breach<\/a>&nbsp;yet. While the tech certainly isn&#8217;t unhackable, it seems to be a much better option than centrally managed databases controlled by third-party institutions. For example, Equifax and Capital One both <a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/equifax-capital-one-learn\/\">fell victim to hackers<\/a> in the past few years.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/heading -->\n\n<h2 class=\"wp-block-heading\">Potential Challenges for Decentralized Identity<\/h2>\n\n<!-- End Block: core\/heading -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>Despite the early success and adoption of DIDs, the tech isn&#8217;t ready for large-scale use just yet. While the blockchain is very good at maintaining the security and accuracy of its data, it isn&#8217;t great at processing a large volume of transactions or updates.&nbsp;<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>A blockchain is constantly getting longer by default \u2014 and while the tech is very good at verifying transactions, it doesn&#8217;t really prioritize speed. Even the most advanced, high-volume blockchains process just tens of transactions per second. To provide decentralized identification services for people worldwide, it may need to process something more like tens or hundreds of thousands of those operations.&nbsp;<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>Microsoft is working with others to create new blockchain tech that could tackle this issue. However, the same design principles that make the blockchain so secure could also create a major bottleneck that threatens the approach&#8217;s effectiveness.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/heading -->\n\n<h2 class=\"wp-block-heading\">How DIDs Could Change Identity Management<\/h2>\n\n<!-- End Block: core\/heading -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>In the future, proving your identity will be just as important as it is now \u2014 if not even more so. DIDs provide an alternative to current identity management methods, one where a person can be in control of their identity.<\/p>\n\n<!-- End Block: core\/paragraph -->\n\n<!-- Start Block: core\/paragraph -->\n\n<p>The approach is another example of how the blockchain is being applied outside of the cryptocurrency space. However, it also demonstrates some of the limitations of the tech. Transaction bottlenecks could make the approach difficult or impossible in a real-world context.<\/p>\n\n<!-- End Block: core\/paragraph -->","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":2928,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_wpscp_schedule_draft_date":"","_wpscp_schedule_republish_date":"","_wpscppro_advance_schedule":false,"_wpscppro_advance_schedule_date":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[171],"tags":[205,203,206,204,202,207],"class_list":["post-2926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fintech","tag-bitcoin-basics","tag-blockchain-security","tag-btc","tag-digital-currency","tag-distributed-ledger-technology","tag-finance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Are Decentralized Identities? - ReHack<\/title>\n<meta name=\"description\" content=\"Understanding the concept of decentralized identity is a core foundation of seeing the promise of blockchain. Keep reading to learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Are Decentralized Identities? - ReHack\" \/>\n<meta property=\"og:description\" content=\"Understanding the concept of decentralized identity is a core foundation of seeing the promise of blockchain. Keep reading to learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"ReHack\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-07T16:43:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-02T13:06:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rehack.com\/wp-content\/uploads\/2020\/10\/decentralized-identity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Devin Partida\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devin Partida\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Are Decentralized Identities? - ReHack","description":"Understanding the concept of decentralized identity is a core foundation of seeing the promise of blockchain. Keep reading to learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/","og_locale":"en_US","og_type":"article","og_title":"What Are Decentralized Identities? - ReHack","og_description":"Understanding the concept of decentralized identity is a core foundation of seeing the promise of blockchain. Keep reading to learn more.","og_url":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/","og_site_name":"ReHack","article_published_time":"2020-11-07T16:43:00+00:00","article_modified_time":"2024-10-02T13:06:35+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/rehack.com\/wp-content\/uploads\/2020\/10\/decentralized-identity.jpg","type":"image\/jpeg"}],"author":"Devin Partida","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Devin Partida","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/#article","isPartOf":{"@id":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/"},"author":{"name":"Devin Partida","@id":"https:\/\/rehack.com\/#\/schema\/person\/2813ec7805a59212be99382bcebc9f85"},"headline":"What Are Decentralized Identities?","datePublished":"2020-11-07T16:43:00+00:00","dateModified":"2024-10-02T13:06:35+00:00","mainEntityOfPage":{"@id":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/"},"wordCount":848,"commentCount":0,"publisher":{"@id":"https:\/\/rehack.com\/#organization"},"image":{"@id":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/rehack.com\/wp-content\/uploads\/2020\/10\/decentralized-identity.jpg","keywords":["Bitcoin Basics","Blockchain Security","BTC","Digital Currency","Distributed Ledger Technology","Finance"],"articleSection":["Fintech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/","url":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/","name":"What Are Decentralized Identities? - ReHack","isPartOf":{"@id":"https:\/\/rehack.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/#primaryimage"},"image":{"@id":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/rehack.com\/wp-content\/uploads\/2020\/10\/decentralized-identity.jpg","datePublished":"2020-11-07T16:43:00+00:00","dateModified":"2024-10-02T13:06:35+00:00","description":"Understanding the concept of decentralized identity is a core foundation of seeing the promise of blockchain. Keep reading to learn more.","breadcrumb":{"@id":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/#primaryimage","url":"https:\/\/rehack.com\/wp-content\/uploads\/2020\/10\/decentralized-identity.jpg","contentUrl":"https:\/\/rehack.com\/wp-content\/uploads\/2020\/10\/decentralized-identity.jpg","width":600,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/rehack.com\/tech-explained\/fintech\/decentralized-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rehack.com\/"},{"@type":"ListItem","position":2,"name":"What Are Decentralized Identities?"}]},{"@type":"WebSite","@id":"https:\/\/rehack.com\/#website","url":"https:\/\/rehack.com\/","name":"ReHack","description":"","publisher":{"@id":"https:\/\/rehack.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rehack.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/rehack.com\/#organization","name":"ReHack","url":"https:\/\/rehack.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rehack.com\/#\/schema\/logo\/image\/","url":"https:\/\/rehack.com\/wp-content\/uploads\/2023\/09\/Favicon_Rehack-icon.png","contentUrl":"https:\/\/rehack.com\/wp-content\/uploads\/2023\/09\/Favicon_Rehack-icon.png","width":135,"height":134,"caption":"ReHack"},"image":{"@id":"https:\/\/rehack.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/rehack.com\/#\/schema\/person\/2813ec7805a59212be99382bcebc9f85","name":"Devin Partida","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/306b998670cf17c744275dc5d04f30024236bd920f94b76e93885064660b333b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/306b998670cf17c744275dc5d04f30024236bd920f94b76e93885064660b333b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/306b998670cf17c744275dc5d04f30024236bd920f94b76e93885064660b333b?s=96&d=mm&r=g","caption":"Devin Partida"},"description":"Devin Partida is the Editor-in-Chief of ReHack Magazine. She covers topics related to data, cybersecurity, tech investments, and more. View Devin's full professional portfolio here: https:\/\/rehack.com\/professional-portfolio-of-devin-partida\/","sameAs":["https:\/\/rehack.com\/professional-portfolio-of-devin-partida\/"],"url":"https:\/\/rehack.com\/author\/devin\/"}]}},"_links":{"self":[{"href":"https:\/\/rehack.com\/wp-json\/wp\/v2\/posts\/2926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rehack.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rehack.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rehack.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rehack.com\/wp-json\/wp\/v2\/comments?post=2926"}],"version-history":[{"count":0,"href":"https:\/\/rehack.com\/wp-json\/wp\/v2\/posts\/2926\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rehack.com\/wp-json\/wp\/v2\/media\/2928"}],"wp:attachment":[{"href":"https:\/\/rehack.com\/wp-json\/wp\/v2\/media?parent=2926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rehack.com\/wp-json\/wp\/v2\/categories?post=2926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rehack.com\/wp-json\/wp\/v2\/tags?post=2926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}