In the identity industry, there’s been a lot hype these days around self-sovereign identity. The latest permutation in the quest for user-centric identity, self-sovereign revisits the laudable goal of enabling people to be in better control of how information about them passes to enterprises and organizations (but now with added blockchain.) To be clear, increased individual control is an important goal and one that incredibly sharp people have been working on for 15+ years, going back to InfoCard and Higgins.
Before I discuss why self-sovereign has a real chance at widespread adoption, it’s important to understand why identity technologies and approaches get adopted in the first place. At least, three things are required:
- People who will use the identity system
- Organizations willing to consume identities from the system
- Significant and relatively equivalent value for both groups
You need a lot of people to use an identity system for mainstream adoption. You get those people by providing enough value to them either in hard currency (e.g. you give them a cut of what their personal data is worth, extend discounts in lieu of currency, or free services) or in efficiencies (e.g. never fill out an account registration form ever again) or in security (e.g. your account will be harder to hack) or in privacy (e.g. your data will never be resold or your data is anonymized.)
There also needs to be real utility for people to use a given identity system. Assuming there is a choice to be made, an individual will naturally select an identity system that gives them access to more services than one that doesn’t. (To be clear only a small portion of people spend time thinking identity systems or the selection thereof. And an even smaller portion know that they are thinking about identity systems. What people do think about is, “how can I log into this service over here with minimal pain” and “how I can avoid disclosing too much about myself.”)
To get enterprises interested in consuming digital identities from a system, enterprises needed to see value as well. Such values include the data flowing in the identity system is useful and accurate, reduction in the cost of acquiring large numbers of well-proofed identities, lower customer acquisition costs, and increased data quality.
Now you might be scratching your head on the 3rd point, specifically the phrase “relatively equivalent.” Both the individual and the organization need to get value out of the use of the identity system. AND both have to feel like they got a fair deal. If individual feels they were taken advantage of, or the organization just simply doesn’t see enough value for the investment, neither will use the system. All it takes is one bad deal with one organization and an individual will be inclined to stop using the identity system. So, bad organizational actors prevent the network effect and widespread adoption from being realized.
There have been technologies and systems to provide these sorts of value propositions to both people and enterprises for years. Arguably, the only one that has seen widespread adoption is social sign-on (the use of a social network identity for sign up and sign-on into other services) because it provides efficiencies to the person and lower cost of acquisition and large addressable population to the enterprise. And with the increased attention to how social networks use shared information about people and increased competition by social providers in other markets where “traditional” enterprises deal, social sign-on may be facing some head winds.
The time could be ripe for something different. Something like self-sovereign identity?
The goals of user-centric/personal data/self-sovereign provide an impressive value proposition (at least from an individual’s perspective) including control, privacy, and security and thus could generate a large potential user-base. Organizations also need to see value in order to adopt this sort of identity system. In this case, we need to leave aside data quality and the ability to acquiring proofed customer/citizen identities because those abilities have been available in identity systems for 15+ years. That said, self-sovereign/user-centric brings a new potential asymmetrical value for organizations to realize: the ability to shift risk onto the individual. And that, my friends, is a huge attractor to enterprise and a huge detractor for individuals.
The core notion of user-centric identity is that the individual can choose what information about them to disclose to which organizations and for what purposes – the individual has greater control. I love that notion. But I am not a typical person and if you want widespread adoption, do not use me as a baseline for design purposes.
Here’s my concern: in course of interacting with an organization online, a person is asked to disclose some information. The person’s smart user agent gathers the individual’s consent to disclose the information and it sends the data to the organization. The person then receives lower quality of service from the organization. The person complains to the organization saying that they didn’t understand what they was being asked to consent to. “Too bad,” says the organization because we have evidence that your smart agent sent us the data and you provided consent for the use of that information.
In this case, the organization can push the risk of attribute use (or mis-use in the eyes of the individual) back onto the individual. The organization has a clear line of sight as to how it acquired the data (directly from the individual) and the individual has no recourse in the case they made a mistake or misunderstood what was being asked of them. This sort of risk shifting is asymmetrical in favor of the organization at the expense of the individual.
In the payment card world, there are clear guidelines on personal liability. $50 if you use credit and up to $500 for debit depending on when you report the issue. Based on that, different people choose to use different “systems.”
However, no such guidelines exist for the use of identity information (e.g. attributes.) In the absence of such guidelines and especially in a world without the right of personal action, the risk will shift from the enterprise to the individual and we can expect enterprises to aggressively try to shift this risk and thus adopt self-sovereign approaches. This exploits and exacerbates an asymmetry; this is not “relatively equivalent value.”
And that seems at odds with the goal of putting the individual in control. This asymmetry shouldn’t be the actual reason for widespread adoption.