Here, we unravel the intricacies of protecting your personal and professional data against evolving threats. From expert advice on secure practices to insights on the latest in privacy technology, we're here to empower you with knowledge to stay one step ahead. Join our community of vigilant netizens, and let's fortify our digital world together.
By Thanasis Mandaltsis -
Read Time: 2 Minute(s)
So… Digital identity verification and remote access to essential services has evolved massively in the past decade. Getting a bank account or a loan is now a process we can complete from the comfort of our homes, creating more equal opportunities for everyone to participate in the economy, in education, in healthcare. And while the conviction around digital identity, and its ability to being unprecedented opportunities to all stakeholders, is unanimous, it remains an untapped opportunity in most countries in the world.
The main problem with digital identity is that everyone see it as something so valuable upping the stakes in every possible collaboration scenario. The various stakeholders at play are:
Identity Verifiers, whose business model works when verifying the same people multiple times. In other words, capture and analyze as many copies of our data as possible. Identity & Wallet Providers, promising secure storage of data to end-users and convenience, fundamentally a great idea but that would never work standalone outside research labs and blockchain enthusiast
Relying Parties, companies consuming identity and verification data either to comply with regulation or to create trust among their customers. They want to keep their customers in their apps because they spend millions every year to make the slick and sticky.
End-users, who despite the empowering promises still doesn’t sow much of the benefit compared to five years ago – we have little say where our data is stored, who can access it, and what we share to access services. As it is clear, all these stakeholders have different, and sometimes conflicting interests. So, despite what you might hear from certain compliance officers and MLROs, the main blocker for digital identity is not the ability to exchange identity credentials. It is lack consensus and greed.
We have been digital identity and fintech operators for 15 years combined and we have seen first-hand that digital identity companies tend to get too bogged down with the nitty gritty details of what it is that make identity secure, compliant, encrypted, standardized. We believe this is a crucial aspect of our jobs and, frankly, Magic could never exist without the foundational work that seasoned identity experts have put into what digital identity is today.
The last 10 years have been building towards a seismic shift in our online interactions, founded in amazing new technology like Machine Learning and on increasing privacy regulations that are...
...
Welcome to our blog! In today’s video, we’re excited to feature a special Q&A session with our founder, Thanasis. ...
We live in the era that personal data is among the most valuable assets. Big Tech companies have often played the role of feudal lords, wielding immense power over the...
In an era where every click and scroll is tracked, the promise of AI agents offering a bastion of privacy sounds almost rebellious. Are we witnessing the dawn of a...
Integration Challenges with Legacy Systems in Modern IAM...
Hyper-personalization is going to be key for brands in the years to come. We already see a massive move into AI assistants, promising to be our companions, simplifying our daily...
We live in a time that products reach the commodity stage faster than ever and so deepening customer connections is the main lever that companies can use to retain and...
This blog post is the first of a series about hyper-personalization, in other words, how companies can offer privacy-respecting experiences that deliver what their customers need, where and when they...
The Rise of Personal Data Stores...
The Evolution of Digital Identity: Beyond Blockchain with W3C Standards...
As digital become the new norms and organization embrace remote working and e-commerce, the Zero Trust Security Strategy is pivotal in the realm of Identity and Access Management (IAM). This...
A Game Changer for Cloud-Based Identity Management...
Blog 3: What is Identity – building the future...
Part 2: What has changed during the last decade....
Part 1: The importance of trust in our society....