What is the scale of the internet? It’s almost impossible to precisely quantify the size of this dynamic, ever-growing behemoth. But data stored on the internet should give us a fair idea. This again is no easy task.
What is the scale of the internet? It’s almost impossible to precisely quantify the size of this dynamic, ever-growing behemoth. But data stored on the internet should give us a fair idea. This again is no easy task. There are millions of websites out there, each storing their own data on the cloud and track that is impossible. One can make an informed guess, though, by calculating the capacity of the data centres across the globe. This number currently stands at 770 Exabytes. That is 770 X 10¹⁸ or 770000000000000000000 bytes! That is HUGE! And the fact that this was all done in the last 50 years (the earliest networks came out in the early 1970s) makes it all the more incredible.
This rapid growth has come at a cost. The Internet was built without standards, especially as far as processes related to user data management are concerned. There is no universally accepted user identity management protocol. The approach is Silo-based. Every entity retains and maintains its own database and the same user across different entities is mapped differently. This not only makes the process of knowledge transfer highly inefficient and costly but also makes the data itself vulnerable.
Identity in general has the following traits:
Claim, proof and attestation. A claim is an assertion to an identity made by someone, for eg. My name is John Doe. A proof is a piece of evidence supporting that claim, like a document, for eg. a passport or license, in this case. Finally, attestation is a validation of that claim from a recognized authority, for eg. a Notary who would confirm that the document belongs to a certain person.
Digital identity, sometimes called as Online Identity, is a sum of all these traits but stored digitally on the cloud in silos managed by the various organizations.
In order to make the system more organized and reliable, user identity management has evolved gradually over time and Cove Identity, a Digi locker app, has been helping users in this regard. From being centralized and silo-based, it has switched to a decentralized structure. The companies running the cloud storage have started offering solutions to manage user identity that ensures data is not stored in one location and is more secure. But this does not solve the silo issue. User identity is still held privately by each entity and data transfer is still cumbersome.
The obvious evolution, and one that has already started, is towards user-centric/self-sovereign data. Here the data will be stored on the blockchain or other distributed systems, which make use of end to end encryption, but an individual will have sole access to their identity/data. Once validated they can share an approved token with new services they sign-up for, rather than revealing complete details to everyone.
Today, for eg., signing up with a service that legally needs to ensure you are of a minimum age requires you to share your date of birth and also its proof, which can be done using an end to end encryption app. They don’t really need that data, though, and in any case, it’s vulnerable once shared, they just need to make sure you are of a certain age and your claim is validated by a recognized authority. This is where a validated, self-sovereign identity comes in. You share an approved token with the service and they sign you up. The only information the token carries is that you are above a certain age and that it has been validated. Complete security and desired level of anonymity.
Manage your digital identity with Cove Identity, a Digi locker app, that keeps user identity management protocol and security decentralised structured. Try out our digital identity protector with decentralised end-to-end encryption and keep identity theft and fraud at bay.
Numerous high-profile lawsuits have been filed this year alone against tech firms. The United States Department of Justice and eleven states launched a lawsuit against Google, alleging the search engine giant had broken antitrust rules, joining the massive complaint already filed against Facebook.
Do we need to be extra cautious about what we post on social media, considering recent reports that the Government is investing huge amounts of money in software that permits massive online surveillance?
A person's online activities can be used to compile what's known as their digital identity, which is a collection of information about that person. This information can be used by companies to determine the identities of the people who buy their products.