Does a verified identity contain the solution to the problem of personal data privacy and security? Credit: Thinkstock They say that the more you witness something, the more normal it becomes. I opened Twitter last week to see yet another mega-hack from hell in the form of the Equifax breach; the breach exposing around 143 million US customer accounts and quite likely a further 44 million UK ones too.The Equifax breach is one in a long line of personal data mega breaches. At last look, the Breach Level Index, maintained by Gemalto, has counted over 9 billion lost data records since 2013. Many of those lost records will be accidental, but many more will be maliciously stolen.If I go to haveibeenpwned.com and check just two of my email addresses, I’ve had seven online accounts compromised. All we seem to be able to do when this happens is get annoyed and let out a large sigh. Something has to give.I am not one for expecting technology to be a global panacea. But we need to start thinking about the severe lack of privacy and security in a smarter manner. The world is awash with accountsThe fundamental issue we are dealing with is that every time we want to transact online, we have to open up a new account. This usually means sharing the same data across multiple of online sites. We find ourselves in a situation where the Internet is awash with online accounts, each containing essentially the same data, and each being a point of failure in the privacy and security of these data.Anonymized verified IDThe collection and processing of all this customer data are coming under scrutiny with the likes of GDPR, and other local data protection bills. Having a sea of data, swirling around the Internet does nobody any favors. Reigning this in, but making sure that the identifying data you do have is true, and secure is the key to fixing this issue and minimising the number of ‘Equifax’ moments in data security. Verifying customers and assigning them a digital identity that can be used across relying parties is a way forward. Of course, writing this down is a lot easier than actually achieving this. Verification of consumers can be performed, but it is the implementation of a verified identity that is the key.Some places we can look to in correct implementation include:Blockchain use case for verified identityThe blockchain has come under a lot of hype and conversely a lot of scrutiny. In a recent blast against the use of the technology within the identity space, some respected names poured water on blockchain for identity use cases. I beg to differ. I believe that the use of blockchain for verified identity status and cross-checking of that status gives us a good chance of redressing the balance that centralized identity systems have in being targets for mega-hacks.The blockchain can be used to store signatures. These signatures can represent a verification status, over time. This status can be checked by sharing the public key of the signatory. Having proof of private key ownership is part of a chain of authorization events to maintain authenticity.But how does the average Joe or Josephine store a private key? I hear you say. Well, they could store it in a piece of paper if needs be. But better still would be a randomly generated unique pass-phrase that unlocks the private key when it is needed.Privacy enhanced identityAnother implementation option when providing an online identity for consumers is the use of pseudonymization or even anonymization. Services who consume personal data need to ask: Do we really need these data to transact or can we get away with just knowing that person really is who they say they are and that they are over 18?Even in terms of marketing data. Can the service, request subset of data to market effectively. Do we really need that person’s home address? It may change anyway. Do we need their date of birth, will age over or under suffice?. This privacy-based approach gels well with the concept of consented and targeted marketing. We are rapidly moving into an era of consumer-driven data sharing; your customers telling you directly what they are interested in. Consumers are increasingly savvy buyers and this scenario is not far off. Online Identity needs to move with it.In the end, security mattersThe idea of ‘one identity to rule them all’ which pops up now and again, is a good and laudable goal. However, the likelihood of this happening hangs in the hands of not technology, but commercial models and business deals. Verified identity can help to move these hurdles.Whichever mechanism you use to maximize authority, and minimize personal data movement will still, at some juncture have an open point of vulnerability. Security of CIAM systems should never be overlooked no matter what technology you use. In another post, I’ll be talking more about the balance between usability and security in Customer Identity Access Management systems. Related content feature 4 authentication use cases: Which protocol to use? Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases. By Susan Morrow Dec 05, 2019 6 mins Authentication Identity Management Solutions Security opinion Deepfakes and synthetic identity: More reasons to worry about identity theft How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters? By Susan Morrow Oct 02, 2019 6 mins Authentication Fraud Identity Management Solutions opinion Is the digital identity layer missing or just misplaced? The orchestration of existing services and data could provide a digital identity layer that gives the internet a common way to handle identity for all consumers. By Susan Morrow Jun 28, 2019 6 mins Authentication Identity Management Solutions Security opinion Can the re-use of identity data be a silver bullet for industry? The ability to re-use identity data for individuals across different systems would greatly simplify authentication. Here's what it would take to make it happen. By Susan Morrow May 24, 2019 6 mins Authentication Identity Management Solutions Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe