Common objections to digital identity systems and how we address them
Digital identity solutions are a key component of modern digital infrastructure. At the same time, they are often the subject of critical debate. Many of these concerns are valid and deserve a transparent and objective response.
Below, we address some of the most common objections and explain how we tackle these challenges.
Objection 1
Digital identity systems lead to surveillance.
Digital identity systems are primarily designed to enable specific administrative or service processes to be carried out securely. They simply replace existing identity verification procedures.
Our systems are used exclusively in connection with a specific procedure, such as identification or the submission of an application. There is no ongoing monitoring or tracking of individuals.
Objection 2
Biometric procedures constitute too great an invasion of privacy.
Biometric methods are used to reliably verify a person’s identity. In this context, biometric characteristics are processed exclusively as part of a specific identification process.
The platform itself does not store any personal data. Responsibility for data processing always lies with the relevant operator or specialist service.
Objection 3
Such systems can be hacked or tampered with.
Every digital infrastructure must be protected against tampering and attacks. Our systems have therefore been designed to minimise their vulnerability to attack.
The systems used are not connected to the public internet, but operate via fully private and dedicated network connections. The devices are technologically isolated and protected against tampering.
If an attempt at tampering is detected, the systems shut down automatically. Upon restart, they are booted from an audit-proof system image, thereby preventing any permanent compromise.
Objection 4
Digital identity solutions put people without technical expertise at a disadvantage.
Digital systems must be designed to be as accessible as possible.
Our systems use dialogue-based user interfaces and support a wide range of languages. This means they can also be used by people with little experience of digital technologies.
Objection 5
Automated systems make decisions about people.
The purpose of such systems is not to make decisions about people.
The systems merely support the secure execution of processes, such as verifying a person’s identity or checking a document. Decisions regarding administrative procedures remain the responsibility of the relevant institutions.
Objection 6
Biometric systems can be fooled by masks or photos.
Modern identification systems use multi-stage procedures for liveness detection.
The system used detects a person’s genuine vital signs, in a similar way to how this is done in forensic medicine. These include, amongst other things, physiological characteristics that cannot be replicated by photographs, masks or similar attempts at deception.
This means that deception using images, masks or similar methods is not possible. Even deliberate alterations to individual biometric features, such as those resulting from surgical procedures, can be detected.
Objection 7
Digital identity systems create new dependencies on technology providers.
Our platform is designed as an open infrastructure.
It is generally available as an interface to any suitable data provider, company, public authority or local authority. It may be used without any discriminatory restrictions.
The system is based on the principle of fair, reasonable and non-discriminatory use of the platform and can be utilised by various partners.
Objection 8
Digital identity systems are too complex for practical use.
Complexity is a challenge facing modern IT systems. That is why, during development, great emphasis is placed on ease of use and clear processes. The systems are designed to guide users step by step through a process.
Objection 9
Automated systems could produce incorrect identifications.
The reliability of identification systems is assessed using various metrics.
With our system, the false acceptance rate is close to zero. This means that an unauthorised person cannot, in practice, be accepted as someone else.
If a person attempts to conceal their identity, in extreme cases this may result in the system being unable to identify the person in question with certainty. In such cases, however, the process is automatically terminated.
This ensures that a false identity cannot be accepted.
Objection 10
Digital identity systems are bringing about too great a change in public administration.
Digital systems are not intended to replace existing administrative structures, but to complement them.
They provide additional digital access channels and enable citizens to complete certain procedures more easily and quickly. At the same time, existing administrative channels remain in place.
Final thought
Digital identity solutions are a key component of modern digital infrastructures. What matters is not only the technology itself, but above all its responsible design, transparent oversight and secure implementation.
Clear security architectures, independent audits and open communication can help to build lasting trust in such systems.