Digital identity underpins how we access services online, but centralized systems create risks of breaches, misuse, and loss of control. Decentralized models — blockchain, self-sovereign identity, and verifiable credentials — aim to return ownership of data to users. Each model has pros and cons, and choosing depends on security needs, scalability, and budget.Digital identity underpins how we access services online, but centralized systems create risks of breaches, misuse, and loss of control. Decentralized models — blockchain, self-sovereign identity, and verifiable credentials — aim to return ownership of data to users. Each model has pros and cons, and choosing depends on security needs, scalability, and budget.

I - vengers: Identity Wars

2025/10/02 02:44
Okuma süresi: 9 dk
Bu içerikle ilgili geri bildirim veya endişeleriniz için lütfen [email protected] üzerinden bizimle iletişime geçin.

\

\ What an efficient label to encapsulate such a concept of great practical and philosophical depth. Like an ominous name pronounced by a wise sage with outstretched arms to capture a rather illusive and mysterious phenomenon. Picture yoda making that discovery.

\

\ A rather more general term though, this article will be focusing on a more specific aspect of Identity known as digital identity. Digital identity is basically how your information is managed online for proper identification and management. Digital identity is something that we rarely think about in our day-to-day lives, but it is something that we all have subscribed to.

\ Currently, the average person, and likely you reading this, has over 150 accounts online, each with a separate username, password and security process. Think of the likes of Facebook, X (Twitter), Instagram, Signal, Amazon, Telegram, Deliveroo, Uber… the list goes on.

\ Every time we open an account online, to use a service, buy something online, use social media, or even just browse the internet, we are creating a digital footprint for ourselves, which feeds into a digital profile. And each of these different accounts holds personal data about you, such as your name, age, photographs, sex, gender etc., and also various preference data, such as what you browse, like, share or click on. These digital profiles are generally secured behind a password, meaning that you feel a level of confidence that you have control over them.

\

However, in reality this is not the case. Our data is stored across multiple gated siloes, and every time we want to access this data, we need to prove to the gatekeeper that we are who we claim to be through an authentication process. In other words, every time you want to get access to your own digital identity data, you need to get through a locked door using a key. This established way of managing digital identity is known as centralized identity management.

\ There are many problems with this model and a few of them are as follows:

\

  • Data is vulnerable to breaches from a single point of failure (i.e. the server)

  • Companies can do as they please with user data e.g. selling to ad companies.

  • Difficulty in managing user data across several accounts.

    \

These numerous problems have predictably resulted in the rise of several innovations to offer alternative identity management solutions in cyberspace creating a rather entertaining identity management war.

\ Identity Wars?

\

\ Well, you may find the topic “I - vengers: Indentity Wars” rather nerdy right?

\ Lol… me too.

\ However, the tech field can be quite difficult to understand and as the alpha nerd of this story I'd rather carry everyone along with what I believe to be a more friendly reference - The Avengers series.

\ Let's summarize our introduction like this.

\

\

\ We shall now proceed to explore these models and technologies in detail.

\

Types of identity management.

\

  1. Centralized Identity Model:

\ Here, all user identity data like usernames, passwords etc. is stored in a single, central location. It is easy to manage and scale, however, there is a single point of failure. If the central database is compromised, all user data could be exposed.

\

Examples Of Centralized Identity Models

\ I. Directory Service is a centralized identity system that stores user information in a central database for authentication and access. For example, Yahoo small business.

Yahoo small business provides web hosting, domain registration, and business related services for small businesses. The directory website design is user friendly and well structured, with clear navigation menus. It provides essential information for small business owners.

\ II. Identity Federation is a system that allows users to authenticate to multiple websites and applications using a single set of credentials. For example, academic websites like claerine.eu.

A university student can use their identity federation credentials to sign in to the university's website, the library's website, and the student union's website. The student only has to remember one set of credentials and their identity is verified once by the central identity provider.

\ III. Cloud-based Identity Management Platforms is a system that can be used to manage user access to applications and resources. Such platforms offer a variety of features, including single sign-on, multi-factor authentication, and user provisioning. For example, Google Cloud.

A company can use a cloud-based identity management platform to manage user access to its internal applications, such as its email system and its customer relationship management (CRM) system. It can also be used to manage user access to external applications.

\

2. Decentralized Identity Model:

In this model, user identity data is distributed across multiple locations. This data is stored securely, and it is only accessible to the user and the entities that the user has authorized to access it.

Decentralized identity models offer several advantages over centralized identity models. They are more secure, as there is no single point of failure. They are also more user-friendly, as users only have to manage one set of credentials.

However, decentralized identity models can be more difficult to manage and scale than centralized identity models. Also, they may not be compatible with all existing applications and systems.

\

Examples Of Decentralized Identity Models

\

  1. Blockchain is a distributed ledger technology that can be used to create decentralized identity systems. In a decentralized identity system using blockchain, users' identity data is stored in a tamper-proof distributed ledger. This data is only accessible to the user and the entities that the user has authorized to access it. For example, cheqd.io.

cheqd is a blockchain network, built in the Cosmos ecosystem, designed to achieve three core missions:

  • To enable individuals and organisations to have digital, trustworthy interactions directly with each other, whilst maintaining privacy and without any centralised intermediary needed.

  • To facilitate the creation of new trusted ecosystems or business models across several industries, through the decentralised identity and Verifiable Credentials technology, plus the use of their token $CHEQ for credential payments.

  • To bridge the DeFi ecosystem with the decentralised identity ecosystem, for better user experiences, democratic governance, regulatory compliance and operational efficiency.

    \

  1. Self-Sovereign Identity (SSI) is a decentralized identity model that gives users control over their identity data. In an SSI system, users own their identity data and can share it with entities that they trust. Users can also revoke access to their identity data at any time.

    SSI systems are based on several key principles:

  • Self-ownership of all user data.
  • Portability of data between users.
  • Interoperability between SSI systems.

For example cheqd SSI and Nordivo.

Nordivo enables you to engage with decentralized identity for your products and services and plug into the new identity layer of the internet with verifiable credentials.

\ Verifiable Credentials (VC), are digital credentials that can be verified by anyone, can be used to verify a person's identity, education, or other attributes. For example, students can use VC to prove their academic achievements to potential employers or universities. This can help to reduce the need for paper transcripts and make it easier for students to transfer credits between institutions.

\

Centralized Identity Versus Decentralized Identity.

The flier below compares centralized identity management and decentralized identity management under several key aspects.

\

As you can see, each of the models has their area of strength and weakness but decentralized models tend to have more advantages than disadvantages.

\

Which model do I want?

The model you should consider depends on your specific needs. Are you building a product or you're just a user? What kind of product are you building? What's your budget and long term plan?

\

\ Whatever the answer is below are some factors you should consider before making a choice.

\

  • The size and complexity of your company: If you have a small company with a few employees, you may be able to get away with using a simple centralized identity management solution. However, if you have a large company with a complex IT infrastructure, you will need a more robust and scalable solution.
  • The types of applications and systems that you use: If you use a lot of different applications and systems, you will need an identity management solution that can integrate with all of them. This can be a challenge, as not all identity management solutions are compatible with all applications and systems.
  • The security requirements of your company: If you have a high-security environment, you will need an identity management solution that can provide a high level of security. This may require a solution that uses two-factor authentication, single sign-on, and other security features.
  • The budget that you have available: Identity management solutions can range in price from a few hundred dollars to several thousand dollars. You will need to decide how much you are willing to spend on an identity management solution, and then choose a solution that fits your budget.
  • The future growth of your company: If you are planning on growing your company shortly, you will need to choose an identity management model that can scale with your growth.
  • The needs of your users: You will need to choose an identity management model that is easy for your users to use. This is especially important if you have a large number of users or if your users are not tech-savvy.

\

In Conclusion:

Welcome audience to the end of this briefing. You've explored the digital identity wars in great detail. As a user or developer of this technology, you've been equipped with all the necessary information to take a winning position on your digital identity campaign. You shall now explore the technologies highlighted or share this piece to spread the identity gospel.

\

\

\

Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen [email protected] ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Wormhole launches reserve tying protocol revenue to token

Wormhole launches reserve tying protocol revenue to token

The post Wormhole launches reserve tying protocol revenue to token appeared on BitcoinEthereumNews.com. Wormhole is changing how its W token works by creating a new reserve designed to hold value for the long term. Announced on Wednesday, the Wormhole Reserve will collect onchain and offchain revenues and other value generated across the protocol and its applications (including Portal) and accumulate them into W, locking the tokens within the reserve. The reserve is part of a broader update called W 2.0. Other changes include a 4% targeted base yield for tokenholders who stake and take part in governance. While staking rewards will vary, Wormhole said active users of ecosystem apps can earn boosted yields through features like Portal Earn. The team stressed that no new tokens are being minted; rewards come from existing supply and protocol revenues, keeping the cap fixed at 10 billion. Wormhole is also overhauling its token release schedule. Instead of releasing large amounts of W at once under the old “cliff” model, the network will shift to steady, bi-weekly unlocks starting October 3, 2025. The aim is to avoid sharp periods of selling pressure and create a more predictable environment for investors. Lockups for some groups, including validators and investors, will extend an additional six months, until October 2028. Core contributor tokens remain under longer contractual time locks. Wormhole launched in 2020 as a cross-chain bridge and now connects more than 40 blockchains. The W token powers governance and staking, with a capped supply of 10 billion. By redirecting fees and revenues into the new reserve, Wormhole is betting that its token can maintain value as demand for moving assets and data between chains grows. This is a developing story. This article was generated with the assistance of AI and reviewed by editor Jeffrey Albus before publication. Get the news in your inbox. Explore Blockworks newsletters: Source: https://blockworks.co/news/wormhole-launches-reserve
Paylaş
BitcoinEthereumNews2025/09/18 01:55
UK crypto holders brace for FCA’s expanded regulatory reach

UK crypto holders brace for FCA’s expanded regulatory reach

The post UK crypto holders brace for FCA’s expanded regulatory reach appeared on BitcoinEthereumNews.com. British crypto holders may soon face a very different landscape as the Financial Conduct Authority (FCA) moves to expand its regulatory reach in the industry. A new consultation paper outlines how the watchdog intends to apply its rulebook to crypto firms, shaping everything from asset safeguarding to trading platform operation. According to the financial regulator, these proposals would translate into clearer protections for retail investors and stricter oversight of crypto firms. UK FCA plans Until now, UK crypto users mostly encountered the FCA through rules on promotions and anti-money laundering checks. The consultation paper goes much further. It proposes direct oversight of stablecoin issuers, custodians, and crypto-asset trading platforms (CATPs). For investors, that means the wallets, exchanges, and coins they rely on could soon be subject to the same governance and resilience standards as traditional financial institutions. The regulator has also clarified that firms need official authorization before serving customers. This condition should, in theory, reduce the risk of sudden platform failures or unclear accountability. David Geale, the FCA’s executive director of payments and digital finance, said the proposals are designed to strike a balance between innovation and protection. He explained: “We want to develop a sustainable and competitive crypto sector – balancing innovation, market integrity and trust.” Geale noted that while the rules will not eliminate investment risks, they will create consistent standards, helping consumers understand what to expect from registered firms. Why does this matter for crypto holders? The UK regulatory framework shift would provide safer custody of assets, better disclosure of risks, and clearer recourse if something goes wrong. However, the regulator was also frank in its submission, arguing that no rulebook can eliminate the volatility or inherent risks of holding digital assets. Instead, the focus is on ensuring that when consumers choose to invest, they do…
Paylaş
BitcoinEthereumNews2025/09/17 23:52
Trump rages at 'independent' Supreme Court judges: 'I just want smart decisions'

Trump rages at 'independent' Supreme Court judges: 'I just want smart decisions'

President Donald Trump raged at "independent" Supreme Court judges on Monday during a bill signing ceremony in the Oval Office. Trump and several administration
Paylaş
Rawstory2026/03/17 05:07