Can we fix identity risks and privacy issues?

SMART Access & Identity 2023 Access Control & Identity Management

Technology makes it much easier to identify people and conduct transactions, removing many bureaucratic barriers that make manual paperwork so taxing. But these advances come with substantial drawbacks.


Jason Shedden.

Cybercrime has compromised the private information of hundreds of millions of individuals. At least one in 15 people in the United States have been victims of identity theft, according to Javelin Strategy & Research, with 37% of South Africans having fallen for COVID-related identity scams (Global Consumer Pulse Study).

“Digital identities are prime targets for criminal hackers,” explains Jason Shedden, chief operating officer at identity management provider Contactable. “Criminals use that personal information to access our bank accounts and credit facilities or to commit fraud elsewhere. There is also a big jump in employee-related fraud because it’s much easier to access and manipulate information on servers.”

For all the benefits, digital systems still retain the silos of traditional paperwork – every institution has a separate copy of someone’s identity. Digital identities will not break out of this problem unless they can decentralise, but achieving that has proven elusive. Yet a breakthrough can create digital identities that remain secure and in control of the people they represent.

Decentralisation with blockchain

This breakthrough can be found in blockchain, the technology that powers decentralised systems such as cryptocurrencies. Blockchain relies on a group of independent parties to verify the authenticity of information. Shedden compares it to sharing copies of the same document.

“Imagine someone has an important document, such as an invoice. They make photocopies and hand these to three other people for safekeeping. If someone alters the invoice, and then insists it is still the same, you can compare that invoice to the three independent copies. If all three copies are the same and the reference invoice isn’t, then it was clearly altered.”

This is the essence of the blockchain: a chain of different entities that maintain identical ledger copies. If you verify or alter the ledger, it must reflect across all the copies. Any anomalies suggest fraud and are rejected.

Blockchain provides a highly effective way to verify information independently. So, why don’t we use blockchain systems to solve identity issues? In theory, we can, and in practice, this recently became a reality.

Identity that stays with you

Blockchains have a significant drawback: keeping large quantities of data in them isn’t efficient. “It’s a small matter to store, for example, your ID number in a blockchain,” says Shedden. “But when we add your photo or more complex documentation such as medical records, things get complicated. Then we fall back to storing information on servers, and hence recreate the issues of centralisation.”

Even if we outsource identity data to third parties that act on our behalf – a Federated Identity model – they are still centralised entities. To achieve true decentralisation, the identity world has been working on Self-Sovereign Identity, making the identity’s owner its custodian. Yet because decentralising blockchains handle large volumes of information poorly, this issue has kept self-sovereign identity back – until recently.

“New methods combine blockchain with digital wallets, which are encrypted digital stores that individual’s control. Your digital wallet stores your identity information. The blockchain confirms that you and your wallet are legitimate. If you need to verify your identity – perhaps to RICA your new SIM card – all you do is scan a QR code. The blockchain then confirms your credentials, and the digital wallet provides whatever you need to conclude the process. You control and manage your identity and third-parties access only what they need to transact with you.”

An opportunity that needs partners

The arrival of self-sovereign identity can finally deliver on the promises of digital identities which include faster transactions, greater convenience, and improved access for more people. Imagine a patient at a rural clinic waiting for their medical record to arrive or people queuing early at Home Affairs to renew their IDs – with self-sovereign identity, these can all become problems of the past.

But realising this future requires another crucial step. Blockchains are only as honest as those who control them. Recently, local criminals fleeced people out of billions in cryptocurrencies because they controlled the entire blockchain that supported those assets. Self-sovereign identity will require authorities that oversee identity blockchains and partners who can be trusted to enrol legitimate identities onto the system.

“This is an opportunity for governments and identity providers to work together,” says Shedden. “If government institutions establish identity blockchains, they can ensure control doesn’t go to a third-party with compromising self-interests and they can build a network of trusted partners to support the chain’s verification and add legitimate identities.”

Self-sovereign identity will reduce paperwork, improve access to services, and could even stop most of the identity theft. They provide a leapfrog opportunity for a new age of identity that puts people in charge. Africa loves leapfrog opportunities, and this begs the question, will self-sovereign identity become the continent’s next big step forward?

For more information, contact Contactable, +27 10 100 3647, info@staycontactable.com, www.contactable.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.