The end of the seed phrase

A persons identity is incredibly precious, but because of the way in which technology and identity have evolved, todays systems don’t treat it with the care it deserves.

May 2, 2024

A persons identity is incredibly precious, but because of the way in which technology and identity have evolved, todays systems don’t treat it with the care it deserves.

That’s not just a problem for the individual, it’s also at the root of problems like hacking, account takeovers and fraud.

The issue is very simple. We take a risk based approach to identity when identity is actually binary. In isolation, a particular use case may not feel like it warrants strong identity verification, but we have to look at the risk through the lens of the user, not the use case.

A user’s data is not just used by them with you, they use it everywhere because it is how they identify themselves to everyone. Bad actors leverage the ubiquity of an individual’s personal data, correlating legitimate and stolen data to commit crime.

A risk based approach to identity provides opportunity and creates demand for criminal activity. The fact that you don’t always know who your users are is both why you get hacked and how you get hacked.

The best identity systems are reserved (by virtue of price) for banks and governments, but they are flawed enough that money can still be stolen, or identity compromised.

At Self we only have one kind of identity product. One that tells you who your user is when they try to do something.

We believe identity belongs to the user, and that companies shouldn’t be the arbiters or holders of a person’s identity. That’s why identity in Self is controlled by the person it relates to.

They don’t need a username, or password, they don’t need an account number. You don’t even have to know who they are for them to be able to use Self to prove they are the right human. They just need their Self.

Secure in Name Only
Exploring how metaphors like “vaults,” “keys,” and “wallets” shape our sense of safety—and the risks that confidence creates.
Are we getting closer to a true identity layer?
Initiatives like W3C Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) are moving us toward an identity layer
The internet was built for machines not people
The internet has no built-in identity layer — it only knows devices and keys, not people. Everything we call “online identity” is an application-level patch, and that’s why the web’s trust and security problems are so persistent.‍