Can we fix identity risks and privacy issues?

SMART Access & Identity 2023 Access Control & Identity Management

Technology makes it much easier to identify people and conduct transactions, removing many bureaucratic barriers that make manual paperwork so taxing. But these advances come with substantial drawbacks.

Jason Shedden.

Cybercrime has compromised the private information of hundreds of millions of individuals. At least one in 15 people in the United States have been victims of identity theft, according to Javelin Strategy & Research, with 37% of South Africans having fallen for COVID-related identity scams (Global Consumer Pulse Study).

“Digital identities are prime targets for criminal hackers,” explains Jason Shedden, chief operating officer at identity management provider Contactable. “Criminals use that personal information to access our bank accounts and credit facilities or to commit fraud elsewhere. There is also a big jump in employee-related fraud because it’s much easier to access and manipulate information on servers.”

For all the benefits, digital systems still retain the silos of traditional paperwork – every institution has a separate copy of someone’s identity. Digital identities will not break out of this problem unless they can decentralise, but achieving that has proven elusive. Yet a breakthrough can create digital identities that remain secure and in control of the people they represent.

Decentralisation with blockchain

This breakthrough can be found in blockchain, the technology that powers decentralised systems such as cryptocurrencies. Blockchain relies on a group of independent parties to verify the authenticity of information. Shedden compares it to sharing copies of the same document.

“Imagine someone has an important document, such as an invoice. They make photocopies and hand these to three other people for safekeeping. If someone alters the invoice, and then insists it is still the same, you can compare that invoice to the three independent copies. If all three copies are the same and the reference invoice isn’t, then it was clearly altered.”

This is the essence of the blockchain: a chain of different entities that maintain identical ledger copies. If you verify or alter the ledger, it must reflect across all the copies. Any anomalies suggest fraud and are rejected.

Blockchain provides a highly effective way to verify information independently. So, why don’t we use blockchain systems to solve identity issues? In theory, we can, and in practice, this recently became a reality.

Identity that stays with you

Blockchains have a significant drawback: keeping large quantities of data in them isn’t efficient. “It’s a small matter to store, for example, your ID number in a blockchain,” says Shedden. “But when we add your photo or more complex documentation such as medical records, things get complicated. Then we fall back to storing information on servers, and hence recreate the issues of centralisation.”

Even if we outsource identity data to third parties that act on our behalf – a Federated Identity model – they are still centralised entities. To achieve true decentralisation, the identity world has been working on Self-Sovereign Identity, making the identity’s owner its custodian. Yet because decentralising blockchains handle large volumes of information poorly, this issue has kept self-sovereign identity back – until recently.

“New methods combine blockchain with digital wallets, which are encrypted digital stores that individual’s control. Your digital wallet stores your identity information. The blockchain confirms that you and your wallet are legitimate. If you need to verify your identity – perhaps to RICA your new SIM card – all you do is scan a QR code. The blockchain then confirms your credentials, and the digital wallet provides whatever you need to conclude the process. You control and manage your identity and third-parties access only what they need to transact with you.”

An opportunity that needs partners

The arrival of self-sovereign identity can finally deliver on the promises of digital identities which include faster transactions, greater convenience, and improved access for more people. Imagine a patient at a rural clinic waiting for their medical record to arrive or people queuing early at Home Affairs to renew their IDs – with self-sovereign identity, these can all become problems of the past.

But realising this future requires another crucial step. Blockchains are only as honest as those who control them. Recently, local criminals fleeced people out of billions in cryptocurrencies because they controlled the entire blockchain that supported those assets. Self-sovereign identity will require authorities that oversee identity blockchains and partners who can be trusted to enrol legitimate identities onto the system.

“This is an opportunity for governments and identity providers to work together,” says Shedden. “If government institutions establish identity blockchains, they can ensure control doesn’t go to a third-party with compromising self-interests and they can build a network of trusted partners to support the chain’s verification and add legitimate identities.”

Self-sovereign identity will reduce paperwork, improve access to services, and could even stop most of the identity theft. They provide a leapfrog opportunity for a new age of identity that puts people in charge. Africa loves leapfrog opportunities, and this begs the question, will self-sovereign identity become the continent’s next big step forward?

For more information, contact Contactable, +27 10 100 3647,,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

You cannot bribe a computer
Access Control & Identity Management Security Services & Risk Management
Corruption is a cancer that destroys the prospects and stability of countries and businesses. It widens wealth gaps and punishes the poor. It costs countries many billions in lost revenue.

Heightening physical security at military base
Turnstar Systems Access Control & Identity Management Government and Parastatal (Industry) Products
Turnstar Systems recently installed two 3-metre Velocity Raptor traffic spikes at the South African National Defence Force (SANDF) Randfontein military base on Gauteng’s West Rand.

Zero Trust to dominate 2023
Cyber Security Access Control & Identity Management
Traditional ways of safeguarding data are no longer sufficient in 2023. Zero Trust has emerged as a more proactive way for businesses to keep their systems, data, and networks protected against compromise.

Turnstar opens an office in the UK
Turnstar Systems News Access Control & Identity Management
Turnstar Systems recently established an office in the Greater Manchester borough in the North East of England, as part of the company’s ongoing expansion strategy.

Enkulu Technologies to distribute Brazil’s Control iD
News Access Control & Identity Management Products
Enkulu Technologies has been appointed as the first South African distributor of Control iD products; a Brazilian company offering a T&A range of solutions based on its range of biometric products.

HID Technology Seminar
Technews Publishing HID Global News Access Control & Identity Management Products
HID Global’s technology seminar introduced partners and distributors to the company’s new Signo range of readers and highlighted the benefits and global growth of mobile access credentials.

Celebrating a successful year
Gallagher Technews Publishing News Access Control & Identity Management Products
Gallagher Security hosted an end-of year event at the Steyn City Equestrian Centre in which it thanked its partners for another successful year and provided a glimpse into what the company will be releasing in 2023.

Innovation and service, 37 years and counting
Technews Publishing Impro Technologies Access Control & Identity Management Integrated Solutions
Innovation, simplicity and trust underpin the nearly 40 years of success of local access control brand, Impro Technologies, which is still run as an independent entity despite being acquired by ASSA ABLOY in 2016.

Access control for one of Britain’s oldest boarding schools
Access Control & Identity Management Education (Industry) Products
In 2022, Christ’s Hospital School, which hosts 18 boarding houses on site, needed to replace its access control security system with a new solution that would be simple to manage and maintain.

Improving safety and security
Gallagher Education (Industry) Access Control & Identity Management Integrated Solutions
Education facilities have more than enough to deal with when it comes to allocating budget. Security often seems to be the last item on the agenda but is more important than ever.