Selznick Pictures Corporation / Select Pictures Corporation, Public domain, via Wikimedia Commons

… in the virtual world …

Identity is a fundamental concept in computing systems, and is critical to the security and integrity of digital transactions. At its core, identity refers to the set of attributes that define a person or entity, and differentiate them from others. In computing systems, identity is used to control access to resources and data, and to verify the authenticity and integrity of transactions.

In the real world, identity is often established through physical characteristics such as facial features, fingerprints, or DNA. In the digital world, however, identity is established through the use of unique identifiers such as usernames, email addresses, or digital certificates. These identifiers are used to distinguish one user from another, and to grant or deny access to resources based on their identity.

Identity management is a complex and multifaceted process, and involves several key components. These include:

 

    1. Authentication: The process of verifying the identity of a user or entity. This can be done through the use of passwords, biometric data, or digital certificates.

    1. Authorization: The process of granting or denying access to resources based on the identity of the user. This is typically done through the use of access control lists or other security mechanisms.

    1. Auditing: The process of monitoring and recording activity related to identity management. This can include logging login attempts, tracking changes to access controls, and monitoring the use of digital certificates.

In computing systems, identity is often tied to real-world identities through the use of personal information such as name, address, and date of birth. This information is used to establish trust and verify the authenticity of users and entities. However, this approach has several drawbacks, including the potential for identity theft and fraud, and the need to trust third-party organizations to manage and protect personal information.

Decentralized identity systems, such as those based on blockchain technology, offer an alternative approach to identity management. These systems use self-sovereign identities that are not tied to any central authority or institution. Instead, users control their own identity information and can share it securely with others as needed.

In summary, identity is a critical concept in computing systems, and is used to control access to resources and data, and to verify the authenticity and integrity of transactions. While traditional identity management systems are often tied to real-world identities and personal information, decentralized identity systems offer an alternative approach that gives users greater control over their own identity information.

… in the real world …

In human systems, individuals typically establish their identity through the use of personal identifying information such as their name, date of birth, social security number, or government-issued ID. This information is used to create a unique record of the individual that can be used to verify their identity and establish trust.

In many cases, individuals must provide this identifying information to third-party organizations such as banks, government agencies, or employers in order to access services or resources. These organizations may store this information in databases or records, and use it to authenticate and verify the identity of the individual.

In addition to personal identifying information, individuals may also establish their identity through other means such as biometric data (e.g. fingerprints, facial recognition), physical tokens (e.g. badges, smart cards), or digital certificates (e.g. SSL certificates).

The process of establishing and managing identity in human systems can be complex and challenging, particularly in situations where personal information is sensitive or confidential. There is a risk of identity theft, fraud, or misuse of personal information, and organizations must take steps to ensure that personal information is properly protected and secured.

Overall, the process of establishing and managing identity in human systems relies on the use of personal identifying information and various forms of verification and authentication. As technology continues to advance, new methods and approaches to identity management will emerge, offering new possibilities for secure and trusted identification in human systems.

… the point is …

Sometimes we think that identity is something simple and easy to grasp, answering the question “Who am I?” is extremely complex. In the movie “Anger Management”, the doctor Buddy Rydell asks Dave Buznik, “Who are you?” Repeatedly, and after describing himself all the way from his given name, to his hobbies and occupation (in response to who are you) Buddy exclaims: “Wrong! You have no idea who you are! Do you?! You have been to New York and L.A. and you have been to Princeton and Harvard, Yale and Santa Cruz. You have eaten at all the best restaurants and stayed at all the finest hotels. And yet, you act as if the things you own, the things you wear, and the places you frequent define you. How pathetic! You’re a walking case of arrested development. I mean, who are you?!”

Try the exercise yourself … and then dig deep into the question of identity … who am I?

In the case of computer systems, and especially in the case of Blockchain, identity is extremely complex and important. In a distributed system, where there is no central authority to verify that you are who you say you are (to authenticate you and I), the question poses some serious security questions. To the blockchain itself, you’re just an address, an end point … and really … isn’t that just another name for wallet? Think about it, everything about a transaction is held in a ledger, where the only identifier for that transaction is a “pointer” to the transaction in the wallet. Now the blockchains take a lot of effort to protect the integrity and security of that ledger, to make sure that entry and that “pointer” are immutable … they can’t change no way, no how. But to be able to pinpoint exactly “Who”or “What” is representing in the real-world … well that’s up to something else … often it’s Metamask, or Coinbase, or DegenForest that provides a human to “end-point” mapping which we will call a wallet and which, I’ll contend that this is what we consider, in the simple case of blockchain … an identity.

Who am I? I’m a wallet — just ask my kids they’ll agree.

About The Author

Leave a Reply

Your email address will not be published. Required fields are marked *