Recapturing personal data and identity – How a Swiss project may lead the way

Recapturing personal data and identity – How a Swiss project may lead the way

This article shows that the web as we know it needs to and inevitably will transform itself embracing new theoretical and technological concepts. Among those are powerful innovations in the fields of identity and personal data management. Leveraging the Blockchain technology as the link that was missing so far, VALID, a new platform concept from Switzerland, is about to change the way we handle data and eventually to give control about identity and data back to the user.

Ware all connected. Ever since the American social psychologist Stanley Milgram proved with his small-world experiments in the late Sixties that every human being is inevitably linked to each other by surprisingly short chains of connections, we know about the importance of social networks. We also know that networks not only play a significant role in social interaction, but rather all over our physical and mental world. They allow a virus or gossips to spread. They can be used to display protein-protein interaction networks as mathematical representations of the physical contacts between proteins in the cell. It is in the nature of things to position itself or allocate resources in networks. The typical network characteristics and effects can also be made accountable for the emergence and spread of the internet. Being connected is one of the most important qualities in today’s world. In our understanding of digital business, network effects are key to success. But there is a second side to this coin. Network effects can also encourage unfortunate developments. Alike the unstoppable spreading a bad virus or cancer, networks such as the internet can also evolve along wrong paths.

Today, the leading revenue models of digital businesses are based on advertising. It is evident that the economic engine of the world wide web is privatized and monopolized to a great extent. Monopolistic companies have emerged as giants in their space. Facebook, Google, Tencent, Airbnb and numerous other leaders of the pack have created own, proprietary platforms in the form of digital ecosystems in their markets. They collect and analyze the wealth of data their users produce when accessing their websites, communicating on their platforms and in many more occasions. All these data points together create the user’s digital identity.

Most of the success stories in digital business have one thing in common; they are all enabled by data. The mechanism behind this phenomenon can be explained in only a few sentences. Constantly improving algorithms lead to digital products and services. When done right, these data products add value to the customer. This perceived value added will convince customers to provide even more data. The use of data products itself leads in this perfectly closed loop to an ever-increasing wealth of transactional and behavioral data. All that data can be monetarized which causes profits to surge. Unfortunately, there is a worrying imbalance between giving and taking. Customers more and more understand this issue and demand for more reciprocity. They recognize the value of their personal data. Empowered with new technological means and knowledge, they start to better protect this data. An even bigger effect on existing data-driven business models is to be expected by interventions from regulators. The latter are also increasingly concerned at what they see as a growing imbalance between data-dependent companies and individuals (Nguyen et al., 2013). This is why the European Commission will finally introduce its “regulation on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)” in May 2018 (European Commission, 2012).

All this leads to the hypothesis that the area of living in a land of milk and honey is coming to an end for the large players in the digital economy. The newly emerging web is characterized by fundamentally different mechanisms, it’s about multiple nodes sharing value across an open network. Companies like Facebook are already anticipating this change. They are restlessly on the search for other revenue models apart from data monetization through advertising. But this is another story. Before painting a picture of the future and outlining solutions, we need to ask ourselves; How did it come to this?

Absence of an identity layer

The answer to this question can be found in a simple fact: “The Internet was created without an identity layer”. This increasingly popular quote from Kim Cameron, Chief Architect of Identity for Microsoft, leads to the root cause that can make network effects a counterproductive force. Although the triumphant progress of the internet brought the information age to a new level, it led digital business models towards the described impasse. Whereas the Hypertext Transfer Protocol (HTTP) as the underlying protocol used by the World Wide Web lead to unpanelled, successful growth of the internet, the web community missed to establish an adequate system to assign and verify identity. The way the internet works is fundamentally different than identity on the web works. The latter is a network of connected devise. Each of these devices connected to a network are centrally assigned a numerical label, the Internet Protocol address. Instead of identifying human beings as endpoints on the network, the system connects physical devices. That’s why it is nearly impossible today to uniquely identify people and authenticate their messages. In addition, we currently define and authenticate accounts that are not necessarily tied to real people or organizations. We do this often separately for each service. For the sake of convenience, we even allow the giants like Facebook or Google to authenticate our identities on third party platforms. This all leads to the unfavorable side effect that online identities can dramatically differ from real world identities and that information spread in digital communication might not be true. To better describe this phenomenon, politics has established all new expressions such as “alternative facts” or “fake news”.

A certain degree of anonymity in digital communication is not harmful by nature. Anonymity may lower barriers to engage in discussions and therefore to participate in a network. It can support the rapid growth of networks and with that it’s positive externalities. This effect describes the fact that an additional node in a network has a positive effect on the value of this network to others. Anonymity is also what drives the success of many use cases on the blockchain. The Bitcoin is one of them. Due to inherent anonymity, the most prominent among the broad range of new cryptocurrencies is also used for shady transactions. Without anonymity, the rapid adoption of the Bitcoin would not have happened and its value would be much lower.

Another aspect that sheds a bad light on anonymity is the popular assumption that online anonymity is one of the principle factors that promotes aggression. This must not necessarily be the case. Anonymity can produce the “stranger on a train” phenomenon, wherein people share intimate self-disclosures with strangers as they do not expect a reunion and hence do not fear any risks and constraints (Bargh et al., 2002). Recent studies in social norm theory show that in the context of online firestorms, non-anonymous individuals are more aggressive compared to anonymous individuals (Rost et al., 2016). When introducing an identity layer for the web the major focus should therefore not lay on making anonymity a thing of the past. It should rather lay on enabling and supporting authenticity and eventually data veracity. In this context authentication can be defined as the act of confirming the truth of an attribute. If we were able to more easily and reliably authenticate data on the web, the degree to which data we use to make decisions is accurate, precise and trusted will be much higher.

What’s the matter with Personal Data

Another side effect of the missing identity layer on the world wide web is the fact that personal data is easily accessible for service provider and that this data can be monetized without a clear consent and without remuneration of the owner. Dealing with personal data is complicated and gets more and more toxic for companies of all industries. Here is why:

  • The amount of data is growing at an astonishing rate. Users leave traces with every activity and generate countless data points along the customer journey.
  • Although cost of data storage is shrinking, the cost to acquire, manage, analyse and protect huge volumes of user data is increasing.
  • Digital identities bear the risk of correlation. If a user is to use one identifier in multiple places, those places might collude to correlate that identifier and amass significant data about the individual without its consent.
  • Central data stores are honeypots for hackers. With new data regulations coming into force this year, storing personal data can become illegal. Together with the high risk and impact of data breaches, capturing data becomes toxic.
  • Generally, the responsibility and complexity of the management of personal data cannot be outsourced to the user. They prefer easy to remember passwords compared to excessively safe passwords. Usability of authentication systems remains key.
  • Low data quality and veracity can lead to wrong decision and damaged trust

There is a common understanding of the strategic thrust mandatory to further develop digital business models: “A new approach to personal data is needed that is flexible and adaptive to encourage innovation, but also protects the rights of individuals. Notice and consent need to be reconsidered to be equipped for this changing world.” (WEF, 2013). Extracting insight from consumer data requires respectful and farsighted handling of personal data. A first step on this approach is to establish a new paradigm to manage digital identities. Alike the handling of personal data, the control about identity needs to be brought back to the individual. Individual identity shall have administrative autonomy regardless of its location in digital space.

  • The distributed ledger is forged by consensus. Therefore, it misses by design a strong governance. In order to improve the codebase or just fix an issue, the community around the Blockchain may decide to change the protocol. Such a hard fork would dramatically impair identity schemes.
  • Personal data could be stored on the ledger. This would result quickly in a breach of the new data protection regulations.
  • Transferring information across Blockchains can be difficult. Portability and interoperability may be impaired.
  • The fact that a unique identifier would have to be defined and stored on the ledger would again trigger an immediate correlation risk
  • Identity information on the Blockchain cannot easily be revoked. This is a critical requirement in order to manage claims and entitlements.

  1. The VALID wallet for personal data management. The wallet is the central user interface to access the VALID ecosystem. It features a personal data store that stores most sensitive data locally on the device. The encrypted data is therefore not stored on the ledger itself and the user is in full control of all his data at any time.
  2. The VALID marketplace for data monetization. Users can decide to share their data by granting interested parties access to clearly defined data points. As a reward, users will be remunerated in VALID tokens (ERC20) based on the desirability of the shared data.

No Comments

Post A Comment