Can we fix identity risks and privacy issues?

SMART Access & Identity 2023 Access Control & Identity Management

Technology makes it much easier to identify people and conduct transactions, removing many bureaucratic barriers that make manual paperwork so taxing. But these advances come with substantial drawbacks.


Jason Shedden.

Cybercrime has compromised the private information of hundreds of millions of individuals. At least one in 15 people in the United States have been victims of identity theft, according to Javelin Strategy & Research, with 37% of South Africans having fallen for COVID-related identity scams (Global Consumer Pulse Study).

“Digital identities are prime targets for criminal hackers,” explains Jason Shedden, chief operating officer at identity management provider Contactable. “Criminals use that personal information to access our bank accounts and credit facilities or to commit fraud elsewhere. There is also a big jump in employee-related fraud because it’s much easier to access and manipulate information on servers.”

For all the benefits, digital systems still retain the silos of traditional paperwork – every institution has a separate copy of someone’s identity. Digital identities will not break out of this problem unless they can decentralise, but achieving that has proven elusive. Yet a breakthrough can create digital identities that remain secure and in control of the people they represent.

Decentralisation with blockchain

This breakthrough can be found in blockchain, the technology that powers decentralised systems such as cryptocurrencies. Blockchain relies on a group of independent parties to verify the authenticity of information. Shedden compares it to sharing copies of the same document.

“Imagine someone has an important document, such as an invoice. They make photocopies and hand these to three other people for safekeeping. If someone alters the invoice, and then insists it is still the same, you can compare that invoice to the three independent copies. If all three copies are the same and the reference invoice isn’t, then it was clearly altered.”

This is the essence of the blockchain: a chain of different entities that maintain identical ledger copies. If you verify or alter the ledger, it must reflect across all the copies. Any anomalies suggest fraud and are rejected.

Blockchain provides a highly effective way to verify information independently. So, why don’t we use blockchain systems to solve identity issues? In theory, we can, and in practice, this recently became a reality.

Identity that stays with you

Blockchains have a significant drawback: keeping large quantities of data in them isn’t efficient. “It’s a small matter to store, for example, your ID number in a blockchain,” says Shedden. “But when we add your photo or more complex documentation such as medical records, things get complicated. Then we fall back to storing information on servers, and hence recreate the issues of centralisation.”

Even if we outsource identity data to third parties that act on our behalf – a Federated Identity model – they are still centralised entities. To achieve true decentralisation, the identity world has been working on Self-Sovereign Identity, making the identity’s owner its custodian. Yet because decentralising blockchains handle large volumes of information poorly, this issue has kept self-sovereign identity back – until recently.

“New methods combine blockchain with digital wallets, which are encrypted digital stores that individual’s control. Your digital wallet stores your identity information. The blockchain confirms that you and your wallet are legitimate. If you need to verify your identity – perhaps to RICA your new SIM card – all you do is scan a QR code. The blockchain then confirms your credentials, and the digital wallet provides whatever you need to conclude the process. You control and manage your identity and third-parties access only what they need to transact with you.”

An opportunity that needs partners

The arrival of self-sovereign identity can finally deliver on the promises of digital identities which include faster transactions, greater convenience, and improved access for more people. Imagine a patient at a rural clinic waiting for their medical record to arrive or people queuing early at Home Affairs to renew their IDs – with self-sovereign identity, these can all become problems of the past.

But realising this future requires another crucial step. Blockchains are only as honest as those who control them. Recently, local criminals fleeced people out of billions in cryptocurrencies because they controlled the entire blockchain that supported those assets. Self-sovereign identity will require authorities that oversee identity blockchains and partners who can be trusted to enrol legitimate identities onto the system.

“This is an opportunity for governments and identity providers to work together,” says Shedden. “If government institutions establish identity blockchains, they can ensure control doesn’t go to a third-party with compromising self-interests and they can build a network of trusted partners to support the chain’s verification and add legitimate identities.”

Self-sovereign identity will reduce paperwork, improve access to services, and could even stop most of the identity theft. They provide a leapfrog opportunity for a new age of identity that puts people in charge. Africa loves leapfrog opportunities, and this begs the question, will self-sovereign identity become the continent’s next big step forward?

For more information, contact Contactable, +27 10 100 3647, info@staycontactable.com, www.contactable.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.