{"id":90250,"date":"2025-04-01T09:38:35","date_gmt":"2025-04-01T09:38:35","guid":{"rendered":"https:\/\/veridas.com\/?p=90250"},"modified":"2025-04-16T13:29:59","modified_gmt":"2025-04-16T13:29:59","slug":"decentralized-identity","status":"publish","type":"post","link":"https:\/\/veridas.com\/en\/decentralized-identity\/","title":{"rendered":"Decentralized Identity: How It Works &#038; Why It Matters"},"content":{"rendered":"<p>The way we prove and manage who we are online is undergoing a dramatic transformation. Traditional digital identity systems \u2013 like using passwords, social logins, or centralized ID databases \u2013 are increasingly seen as insecure and inconvenient.<strong> It is time for decentralized identity.<\/strong><\/p>\n<p>Data breaches are on the rise, and <strong>75% of security professionals reported an increase in cyberattacks in 2023<\/strong>, often targeting centralized identity stores. In response, a new approach called <strong>decentralized identity<\/strong> (also known as <strong>self-sovereign identity<\/strong>) is emerging as the future of <a href=\"https:\/\/veridas.com\/what-is-digital-identity\/\">digital identity<\/a>.<\/p>\n<p>This model uses cryptography and often blockchain technology to give individuals greater control over their own personal data. It\u2019s not just a boost to security \u2013 it\u2019s a fundamental shift that puts users back in the driver\u2019s seat of their digital lives.<\/p>\n<p>In this article, we\u2019ll break down what decentralized identity is and how it works. We\u2019ll look at how it differs from the traditional identity systems we\u2019re used to, and explore the key components that make it possible \u2013 including Decentralized Identifiers (DIDs) and verifiable credentials. We\u2019ll also discuss the role of the Decentralized Identity Foundation (DIF) in shaping this ecosystem.<\/p>\n<p>Finally, we\u2019ll dive into the benefits of decentralized identity (like better privacy, security, and user control) and real-world use cases in finance, healthcare, and beyond, before examining the challenges ahead and why many believe <strong>decentralized digital identity<\/strong> is indeed the future of identity management.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-90991 \" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity-example.jpg\" alt=\"decentralized identity example\" width=\"720\" height=\"405\" srcset=\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity-example.jpg 960w, https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity-example-300x169.jpg 300w, https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity-example-768x432.jpg 768w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/p>\n<h2>What Is Decentralized Identity?<\/h2>\n<p><strong>Decentralized identity<\/strong> is a framework for identity management that moves away from centralized authorities and gives individuals control over their own digital identities. In simple terms, it means you manage your identity through credentials you hold, rather than an organization (like a government, bank, or tech company) managing it for you.<\/p>\n<p>Your digital identity is made up of information about you \u2013 for example, your name, date of birth, passwords, payment info, diplomas, etc. \u2013 and in a decentralized model, this information isn\u2019t all stored in one big database. Instead, it\u2019s distributed and <strong>secured by cryptography<\/strong>, often with the help of blockchain or other distributed networks.<\/p>\n<p>In a decentralized identity system, there are typically three key roles: an <strong>issuer<\/strong>, a <strong>holder<\/strong>, and a <strong>verifier<\/strong>. Imagine you have a driver\u2019s license in digital form. The motor vehicle agency (issuer) can issue you a digital credential that says \u201cthis person is licensed to drive.\u201d<\/p>\n<p>You, the user (holder), store this credential in a secure <a href=\"https:\/\/veridas.com\/id-wallet\/\">digital wallet<\/a> on your device. When needed, you can present proof of your license to, say, a car rental company (verifier) which then checks the credential\u2019s authenticity.<\/p>\n<p><strong>There\u2019s no central database that the rental company needs to query \u2013 instead, they verify the digital signature on your credential to trust it<\/strong>. This is fundamentally different from how identities are handled in centralized systems, and it allows you to <strong>control which pieces of your identity to share, with whom, and when<\/strong>, enhancing privacy and security by design.<\/p>\n<p>In essence, decentralized identity lets people prove things about themselves in a trusted way <strong>without handing over all their data to centralized intermediaries<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-90265 \" style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/self-sovereign-identity-1024x576.jpg\" alt=\"self sovereign identity\" width=\"729\" height=\"410\" srcset=\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/self-sovereign-identity-1024x576.jpg 1024w, https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/self-sovereign-identity-300x169.jpg 300w, https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/self-sovereign-identity-768x432.jpg 768w, https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/self-sovereign-identity.jpg 1200w\" sizes=\"(max-width: 729px) 100vw, 729px\" \/><\/p>\n<h3>How It Differs from Traditional Identity Systems<\/h3>\n<p>Decentralized identity differs from traditional identity systems in several fundamental ways. In <strong>traditional (centralized) identity systems<\/strong>, all your information is stored and managed by a central authority or provider \u2013 think of your data sitting in a big database at a government office or on a corporate server.<\/p>\n<p>This creates a <strong>single point of failure<\/strong>: if that central database gets hacked or leaks, all user data can be exposed at once. Users also have <strong>limited control<\/strong> in such systems; you often have to trust the provider to keep your data safe and use it appropriately, and you usually have to share the same personal details over and over with different services.<\/p>\n<p>For example, when you sign up for a new bank account or a new app, you provide personal information again, and it gets stored in yet another silo beyond your control. In federated identity models (like \u201cLog in with Facebook\/Google\u201d), you rely on a big tech company to vouch for you \u2013 but that still means <strong>handing control of your online identity to a third party<\/strong>.<\/p>\n<p>In <strong>decentralized identity systems<\/strong>, there is no single company or government holding all the keys to your digital identity. <strong>Your data is spread out and secured with you, the user, in control<\/strong>. Rather than a single database, information is verified using cryptographic proofs and distributed networks, so there\u2019s no central honeypot for hackers to attack. If an attacker wanted to compromise your identity in a decentralized system, they\u2019d have to breach multiple independent systems (and even then, much of the data may not be stored centrally at all), which is far more difficult.<\/p>\n<p>Another big difference is the <strong>trust model<\/strong>: in traditional systems, the verifier (like a service you use) has to directly trust the issuer or identity provider and often form a relationship or integration (for example, a partnership between a social login provider and an app). In decentralized identity, trust is <strong>unidirectional<\/strong> \u2013 a verifier can trust the credential because it\u2019s cryptographically signed by an issuer, <strong>without the issuer even needing to know the verifier<\/strong>.<\/p>\n<p>This one-way trust flow, enabled by cryptography, means you don\u2019t need all parties on a shared database or agreement ahead of time. It also enables privacy enhancements like sharing only specific proofs.<\/p>\n<p>For instance, you could prove you are over 18 <strong>without revealing your exact birthdate or any other info<\/strong>, by using a credential or <a href=\"https:\/\/veridas.com\/what-is-zero-knowledge-proof\/\">zero-knowledge proof<\/a> that only discloses that one fact. In summary, <strong>decentralized ID<\/strong> flips the current script: instead of organizations being the source of identity and users having to conform, the user becomes the center \u2013 holding their identity and deciding who gets to see it.<\/p>\n<p><iframe title=\"YouTube video player\" data-cookieconsent=\"preferences, statistics, marketing\" data-src=\"https:\/\/www.youtube.com\/embed\/iagoFLsrp2Q?si=RbayhrE7IEcty9R2\" width=\"100%\" height=\"500px\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><div class=\"cookieconsent-optout-preferences cookieconsent-optout-statistics cookieconsent-optout-marketing\"><\/div><\/p>\n<h2>Decentralized Identity Key Components &amp; Management<\/h2>\n<p>A digital identity wallet app on a smartphone shows multiple credentials (Digital ID, Employee ID, Driver License). Such an <a href=\"https:\/\/veridas.com\/id-wallet\/\"><strong>ID wallet<\/strong><\/a> is a key component of a decentralized identity system, allowing users to store and manage their <strong>decentralized ID<\/strong> credentials securely on their own device.<\/p>\n<p>To make decentralized identity work, a few core components and concepts come together. These include <strong>Decentralized Identifiers (DIDs)<\/strong> as the new kind of identifier for entities, <strong>Verifiable Credentials (VCs)<\/strong> as the digital attestations or ID documents, and infrastructure or standards organizations like the <strong>Decentralized Identity Foundation (DIF)<\/strong> that ensure everything works together.<\/p>\n<p>These pieces collectively enable what we call <strong>decentralized identity management<\/strong>, where the user manages their identity through technology (often an app or wallet) rather than a central provider managing it for them. Let\u2019s look at each component and how they function in a <strong>decentralized identity system<\/strong>.<\/p>\n<h3>Decentralized Identifiers (DIDs)<\/h3>\n<p>A <strong>Decentralized Identifier (DID)<\/strong> is basically a new type of unique identifier that isn\u2019t issued by any central authority \u2013 instead, it\u2019s registered in a decentralized way (for example, on a blockchain or distributed ledger).<\/p>\n<p>You can think of a DID like a username or address that you fully own and control, analogous to how you might control a domain name, except it\u2019s for your identity. A typical DID might look like <code>did:example:123456abcdef...<\/code> rather than a familiar format like an email.<\/p>\n<p>What makes DIDs special is that they are <strong>globally unique, persistent, and tied to cryptographic keys<\/strong> that you control. When you create a DID, you also generate a pair of keys: a private key (which you keep secret) and a public key. The public key, along with other information (like ways to contact you or verify data), is published in a <strong>DID Document<\/strong> that is accessible on the network.<\/p>\n<p>Because you have the private key, you can prove that the DID is \u201cyours\u201d by signing messages. No central registry (like a government ID database or a certificate authority) is needed to vouch for that link \u2013 the proof comes from possession of the cryptographic key.<\/p>\n<p>The significance of DIDs is huge for decentralized identity. They provide a foundation of <strong>trust without centralized control<\/strong>. For example, if Alice has a DID and Bob has a DID, Alice can digitally sign a credential for Bob (like a certificate or ID card) and Bob can present it to Carol; Carol can then use Bob\u2019s DID and Alice\u2019s DID (and their associated public keys) to verify that the credential is legitimate and was issued by Alice.<\/p>\n<p>This can all happen without any of them having to query a central server or ask permission from an outside authority. <strong>Each DID is like a self-contained trust anchor<\/strong>. Many DIDs are anchored on blockchains or similar networks to make them tamper-resistant and globally resolvable, but it\u2019s not strictly required that they use blockchain \u2013 the key idea is decentralization.<\/p>\n<p>The World Wide Web Consortium (W3C) has even standardized DIDs to ensure they work universally. In practice, when you use a decentralized identity wallet, it will create and manage DIDs for you behind the scenes. For instance, you might have a DID for yourself that your wallet uses when interacting with various services.<\/p>\n<p>Because you can have many DIDs (even one per relationship or service), it also helps prevent correlation \u2013 each service sees a different identifier for you, making it harder to track you across contexts. In short, DIDs replace the need for usernames or IDs issued by someone else; they let you <strong>establish your digital identity on your own terms<\/strong>, backed by strong cryptography.<\/p>\n<h3>Verifiable Credentials<\/h3>\n<p>If DIDs are like your identity\u2019s address or account, <strong>verifiable credentials (VCs)<\/strong> are like the contents of your identity \u2013 the digital equivalent of the cards and documents in your physical wallet. A verifiable credential is a <strong>tamper-proof digital credential<\/strong> that contains claims about you (or an entity), issued by some authority, and <strong>cryptographically signed<\/strong> so it can be independently verified.<\/p>\n<p>Think of a verifiable credential as a digital version of a driver\u2019s license, passport, diploma, employee ID, vaccine certificate, or even a library card \u2013 any credential you have in the real world can be its digital verifiable counterpart. What makes it \u201cverifiable\u201d is that anyone who needs to check it can do so using the issuer\u2019s public key (often via the issuer\u2019s DID).<\/p>\n<p>If even one bit of the credential was altered, the signature check would fail, so it\u2019s <strong>tamper-evident and trustworthy<\/strong>. The credential typically includes the <strong>subject\u2019s DID<\/strong> (who it\u2019s about), the <strong>issuer\u2019s DID<\/strong> (who issued it), the claims (e.g., \u201cbirthdate is 1990-01-01\u201d or \u201chas driving privilege\u201d), and an expiration date or other metadata, all signed by the issuer.<\/p>\n<p>Verifiable credentials are central to <strong>decentralized identity management<\/strong> because they carry the actual information that gets shared. How they are managed is usually via a digital wallet or app that stores your credentials securely (often encrypted) on your device.<\/p>\n<p>For example, you might have a \u201cDigital ID\u201d credential issued by a government, a \u201cEmployee ID\u201d issued by your company, and a \u201cBank KYC Verified\u201d credential from a bank after you complete a one-time verification. These credentials live in your <strong>ID wallet<\/strong>, and you decide when to present them. When a verifier (like a service or another person) requests proof, you can share a <strong>verifiable presentation<\/strong> \u2013 essentially a package of one or more credentials or even a derived proof from them, tailored to that request. Importantly, you might not need to share the entire credential; you could share just certain attributes.<\/p>\n<p>For instance, if a bar needs to verify you are over 18, your wallet could create a presentation from your driver\u2019s license credential that <strong>only confirms you\u2019re over 18, without revealing your exact birth date or address<\/strong>. Techniques like this (often using zero-knowledge proofs or selective disclosure) ensure <strong>privacy<\/strong> while still proving the necessary information.<\/p>\n<p>The benefit for businesses and verifiers is significant: they can instantly trust the information presented without having to contact the original issuer each time.<\/p>\n<p>For example, an employer can verify a candidate\u2019s digital diploma credential <strong>in seconds<\/strong> rather than waiting days for a university to respond, since the credential is digitally signed and <strong>fraud-proof<\/strong>. Overall, verifiable credentials enable <strong>secure, efficient, and user-centric sharing of identity information<\/strong>, forming the backbone of a decentralized identity system\u2019s functionality.<\/p>\n<h3>Role of the Decentralized Identity Foundation (DIF)<\/h3>\n<p>Building a decentralized identity ecosystem requires many players (tech companies, standards bodies, governments, etc.) to agree on how things work and to ensure different systems can talk to each other.<\/p>\n<p>The <strong>Decentralized Identity Foundation (DIF)<\/strong> plays a pivotal role in this. The DIF is an <strong>engineering-driven organization focused on developing the foundational elements necessary to establish an open ecosystem for decentralized identity and ensure interoperability between all participants<\/strong>.<\/p>\n<p>In other words, DIF is like a collaboration hub where experts and organizations come together to make decentralized identity technology practical on a global scale. Founded by a group of industry leaders, DIF\u2019s members include tech companies, startups, non-profits, and even government bodies, all working on identity solutions.<\/p>\n<p>They collaborate on open standards, protocols, and tools so that (for example) a credential issued in one system can be recognized in another, or a DID created on one platform can be resolved by another platform. This avoids the emergence of isolated \u201cidentity silos\u201d and instead fosters one big interoperable environment for <strong>decentralized ID<\/strong>.<\/p>\n<p>The <strong>mission of DIF<\/strong> is to <em>empower individuals and organizations by developing an open ecosystem for decentralized management of digital identities, championing secure, interoperable, and privacy-preserving technologies<\/em>.<\/p>\n<p>Practically, DIF has working groups that have contributed to key specifications such as Decentralized Identifiers and secure data exchange protocols.<\/p>\n<p>For example, DIF contributors have worked on things like <strong>DIDComm<\/strong>, a secure communication protocol for sending data (like credentials or messages) between decentralized identity agents, and <strong>Decentralized Web Nodes (DWNs)<\/strong> for distributed data storage tied to DIDs.<\/p>\n<p>DIF also coordinates with the World Wide Web Consortium (W3C) and other organizations on standards like the DID Core spec and Verifiable Credentials data model. The <strong>role of DIF in decentralized identity<\/strong> is somewhat analogous to what the Wi-Fi Alliance does for Wi-Fi \u2013 ensuring different devices and implementations can interoperate under common standards \u2013 except here it\u2019s for digital identity.<\/p>\n<p>Thanks to DIF\u2019s work, a growing number of products and services (digital wallets, blockchain networks, authentication systems, etc.) speak the same language when it comes to decentralized identity. This collaboration is crucial for the future of digital identity: it means that your decentralized identity should work across borders and across different platforms.<\/p>\n<p>In summary, DIF is helping to build the <strong>infrastructure of trust<\/strong> for decentralized identity, so that no matter who you are or where you are, you can use your decentralized credentials and DIDs seamlessly, just like we use email or web standards today.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-81262 size-large\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/07\/image-22-1-1024x685.png\" alt=\"Veridas ZERODATA\" width=\"800\" height=\"535\" srcset=\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/07\/image-22-1-1024x685.png 1024w, https:\/\/veridas.com\/wp-content\/uploads\/2024\/07\/image-22-1-300x201.png 300w, https:\/\/veridas.com\/wp-content\/uploads\/2024\/07\/image-22-1-768x514.png 768w, https:\/\/veridas.com\/wp-content\/uploads\/2024\/07\/image-22-1-1536x1027.png 1536w, https:\/\/veridas.com\/wp-content\/uploads\/2024\/07\/image-22-1.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2>Decentralized Digital Identity Benefits &amp; Use Cases<\/h2>\n<p>Decentralized identity brings a host of benefits that address many of the weaknesses of traditional identity systems. With a <strong>decentralized identity system<\/strong>, users get enhanced privacy and control, and organizations benefit from stronger security and streamlined processes.<\/p>\n<p>These advantages translate into a wide range of real-world applications across industries \u2013 from banking and finance to healthcare, travel, and even everyday online services. Let\u2019s explore the key benefits (especially in terms of privacy, security, and user control) and then look at some concrete use cases showing how decentralized identity is being used today and what it enables.<\/p>\n<h3>Privacy, Security &amp; User Control<\/h3>\n<p>One of the biggest benefits of decentralized identity is the <strong>improvement in privacy and security<\/strong> for individuals. Because you are not storing all your personal data in countless central databases, you dramatically reduce the risk of large-scale data breaches.<\/p>\n<p>In a decentralized model, even if one of your credentials or accounts is compromised, it doesn\u2019t automatically expose everything else about you. Each piece of data is compartmentalized under your control. <strong>Sensitive information is not concentrated in a single vulnerable location, which significantly reduces the risk of mass exposure<\/strong>.<\/p>\n<p>For instance, if you use a decentralized ID to verify your age to a nightclub, that club doesn\u2019t get to store your ID info in a database; they simply get a one-time cryptographic proof. There\u2019s nothing valuable for hackers to steal from the verifier, and your most sensitive data stays with you.<\/p>\n<p>In addition, decentralized identity often leverages advanced security techniques such as <strong>zero-knowledge proofs (ZKP)<\/strong> to enhance privacy. A zero-knowledge proof allows you to prove something about yourself without revealing the underlying data.<\/p>\n<p>For example, with the right setup, you could prove \u201cI am a citizen of X country\u201d without exposing any other personal details or even your identity document number.<\/p>\n<p>This concept is already being applied in cutting-edge solutions: <a href=\"https:\/\/veridas.com\/zero-data-id\/\"><strong>Veridas\u2019s ZeroData ID<\/strong><\/a> technology, for example, uses ZKPs to verify a user\u2019s identity through their biometrics without storing any personal <a href=\"https:\/\/veridas.com\/what-is-biometric-data\/\">biometric data<\/a>. It converts a person\u2019s biometric (like a selfie) into an irreversible encrypted vector and embeds it in a QR code.<\/p>\n<p>Scanning that QR code can confirm the person\u2019s identity <strong>without ever revealing or saving the original face image<\/strong>, thus ensuring privacy by design. This level of privacy protection is virtually impossible in traditional systems where showing an ID means handing over all the info on it.<\/p>\n<p>Security is also enhanced because <strong>authentication becomes cryptographic<\/strong> \u2013 instead of weak passwords or easily stolen personal details, you authenticate with possession of private keys and cryptographically signed credentials, which are far harder for attackers to compromise.<\/p>\n<p>Closely tied to privacy and security is <strong>user control<\/strong>, sometimes referred to as <strong>self-sovereign identity<\/strong>. Decentralized identity empowers users to be the ones in charge of their identity data, rather than passive subjects of data collected by others.<\/p>\n<p>You decide what information to share, who gets to see it, and you can often even set conditions (for example, a credential that expires or can be revoked by you). This flips the power balance: <strong>users feel less powerless about their personal information and more in control<\/strong>.<\/p>\n<p>With an identity wallet on your phone, it\u2019s like having your driver\u2019s license, passport, work ID, and credit cards in your own pocket digitally \u2013 <strong>and only you can unlock and use them<\/strong>, typically via biometric or PIN authentication on your device.<\/p>\n<p>This user-centric design also <strong>improves convenience<\/strong>. No more managing dozens of usernames and passwords or filling out the same forms for every new service \u2013 you can re-use your verifiable credentials to quickly sign up or log in to new services with confidence.<\/p>\n<p>Many solutions offer a <a href=\"https:\/\/veridas.com\/what-is-biometric-login\/\"><strong>biometric login<\/strong><\/a> using decentralized ID: you just scan a QR or tap a button to present a secure credential instead of typing a password. That\u2019s both easier for users and more secure (since phishing a cryptographic login is far harder than phishing a password).<\/p>\n<p>Additionally, because all your credentials can be stored in one secure digital wallet, it streamlines the experience \u2013 just like having a single physical wallet, but for the digital world.<\/p>\n<p>From a broader perspective, giving individuals control also builds <strong>trust<\/strong>: when users know they are only sharing what\u2019s necessary and that they can withdraw consent, they\u2019re more likely to engage with digital services without fear. Organizations, in turn, can demonstrate they respect privacy by adopting user-controlled identity processes, which can become a competitive advantage.<\/p>\n<p>Overall, <strong>decentralized identity puts privacy, security, and user control at the forefront<\/strong>, solving many pain points of today\u2019s identity systems (like data breaches, <a href=\"https:\/\/veridas.com\/identity-theft\/\">identity theft<\/a>, and user frustration) by fundamentally redesigning how identity is managed.<\/p>\n<h3>Real-World Applications in Finance, Healthcare &amp; More<\/h3>\n<p>The benefits of decentralized identity aren\u2019t just theoretical \u2013 they are being realized in many real-world applications across various sectors.<\/p>\n<p>In <a href=\"https:\/\/veridas.com\/financial-services\/\"><strong>financial services<\/strong><\/a>, for example, banks and fintech companies are using decentralized identity for customer onboarding (<a href=\"https:\/\/veridas.com\/what-is-kyc\/\">KYC \u2013 Know Your Customer<\/a>) and authentication.<\/p>\n<p>Instead of making customers repeatedly submit the same identity documents to every bank or exchange (and each of those organizations storing copies of those documents), a customer can carry a <strong>\u201cverified identity\u201d credential<\/strong> in their digital wallet.<\/p>\n<p>One bank (or a trusted identity provider) might issue a KYC credential after verifying the person once, and then other banks could instantly rely on that credential to onboard the customer, saving time and cost. This not only speeds up the process (opening a new account can go from days to minutes) but also reduces fraud, since the credential is tamper-proof.<\/p>\n<p>Payment companies are also exploring decentralized ID to fight identity theft and credit card fraud \u2013 for instance, requiring a cryptographic proof of identity tied to transactions for an extra layer of security. In the <strong>EU<\/strong>, there\u2019s a major push towards a unified digital identity wallet for citizens.<\/p>\n<p>A large consortium backed by the European Commission (the <a href=\"https:\/\/veridas.com\/veridas-joins-the-we-build-consortium-to-drive-digital-identity-in-the-eu\/\"><strong>WE BUILD project<\/strong><\/a>) is piloting an <a href=\"https:\/\/ec.europa.eu\/digital-building-blocks\/sites\/display\/EUDIGITALIDENTITYWALLET\/EU+Digital+Identity+Wallet+Home\"><strong>EU Digital Identity Wallet<\/strong><\/a> to cover use cases in payments, government services, and more, with nearly 200 partners involved.<\/p>\n<blockquote><p>Companies like Veridas are contributing their wallet technology to enable things like secure <a href=\"https:\/\/veridas.com\/age-verification\/\">age verification<\/a> for purchases and confirming senior citizen discounts via one-time identity proofs.<\/p><\/blockquote>\n<p>This shows how finance, government, and tech are coming together to use decentralized ID for everyday conveniences (buying age-restricted products, proving eligibility for benefits) in a privacy-preserving way.<\/p>\n<p>In <strong>healthcare<\/strong>, decentralized identity can revolutionize how we manage health records and credentials. Consider vaccination certificates or COVID test results as verifiable credentials \u2013 instead of paper cards or PDFs (which can be forged or lost), patients could have digitally signed health credentials from hospitals or labs in their identity wallet.<\/p>\n<p>When checking in for a flight or entering an event, they could present a proof of vaccination that is instantly verified as authentic, without exposing other medical details. Similarly, healthcare professionals (doctors, nurses) could have verifiable credentials for their licenses and qualifications.<\/p>\n<p>A hospital onboarding a new doctor could quickly verify their credentials issued by a medical board, without lengthy background checks, by scanning a QR code or verifying a digital credential. This improves trust and safety in healthcare interactions.<\/p>\n<p><strong>Education<\/strong> is another area: universities are issuing digital diplomas as verifiable credentials, which graduates can share with employers globally. This cuts down on transcript fraud and makes resume verification much more efficient \u2013 a recruiter can validate a candidate\u2019s degree in seconds rather than the slow process of sending requests to universities.<\/p>\n<p>In the <strong>travel industry<\/strong>, decentralized identity could enable digital passports or traveler IDs that passengers control, potentially streamlining airport security and customs (with projects and trials already exploring this).<\/p>\n<p><strong>Enterprise and workforce<\/strong> use cases are also notable: companies can issue employee ID credentials for building access or VPN login, and when an employee leaves, those credentials can be revoked from their wallet \u2013 without worrying that copies exist elsewhere. It also means an employee could prove their past work history to future employers with credentials instead of references.<\/p>\n<p>Even everyday scenarios like proving your age at a store, checking in to a hotel, or renting a car can be improved. Instead of handing over a physical ID (where someone might glance at all your personal info), you could flash a verifiable credential that only confirms the one thing needed (age, identity, or reservation details), protecting your privacy.<\/p>\n<p>These <strong>real-world applications<\/strong> illustrate that decentralized identity isn\u2019t just a niche tech concept; it\u2019s actively solving problems: reducing onboarding friction, <a href=\"https:\/\/veridas.com\/fraud-detection\/\">preventing identity fraud<\/a>, enabling regulatory compliance (by providing auditable, signed evidence of checks), and giving users a smoother experience.<\/p>\n<p>As a result, we\u2019re seeing adoption in sectors like <strong>finance, healthcare, travel, government services, education, and enterprise IT<\/strong> \u2013 essentially anywhere <a href=\"https:\/\/veridas.com\/identity-verification-platform\/\">identity verification<\/a> is important. And this is just the beginning; the flexibility of the technology means new use cases are emerging rapidly, from managing IoT device identities to creating <strong>universal single sign-on<\/strong> across services using your decentralized ID.<\/p>\n<p>The momentum suggests that many aspects of daily life that involve showing \u201cID\u201d will be transformed by decentralized identity systems in the coming years.<\/p>\n<h2>Decentralized Identity Challenges &amp; Future Outlook<\/h2>\n<p>As promising as decentralized identity is, it\u2019s not without challenges. Being a relatively new paradigm, there are hurdles to overcome in technology, user experience, and policy before it fully realizes its potential.<\/p>\n<p>However, the <strong>future of identity management<\/strong> is increasingly being shaped by this approach, with broad consensus that many current challenges can be addressed through ongoing innovation and collaboration. Let\u2019s discuss some of the key challenges and then look at the future outlook of decentralized identity \u2013 why it\u2019s expected to play a central role in the years to come.<\/p>\n<h3>The Future of Identity Management<\/h3>\n<p><strong>Decentralized identity<\/strong> is an exciting and rapidly evolving concept, but achieving its vision requires tackling a few important challenges. One major challenge is <strong>user adoption and ease of use<\/strong>. Managing your own keys and credentials can be daunting for non-technical users.<\/p>\n<p>If someone loses access to their identity wallet (for example, losing a phone without a backup), recovering those credentials or DIDs is not as straightforward as clicking \u201cReset Password\u201d in a traditional system. The industry is actively working on solutions like social recovery (where trusted contacts help restore your identity) and backup mechanisms to make this safer. Another challenge is the need for a <strong>trusted ecosystem of issuers and verifiers<\/strong>.<\/p>\n<p>For decentralized ID to work widely, many organizations need to issue verifiable credentials and many service providers need to accept them. This is a chicken-and-egg problem: verifiers want to see lots of users with credentials, and issuers want to know there are verifiers who will accept them. Initiatives like the DIF and government programs (e.g., the <a href=\"https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019-2024\/europe-fit-digital-age\/european-digital-identity_en\">EU\u2019s digital identity framework<\/a>) are helping by standardizing technology and seeding initial use cases.<\/p>\n<p>There\u2019s also the question of <strong>interoperability<\/strong>: ensuring that a credential from one country or platform is recognized in another. This ties into setting global standards (which DIF and W3C are addressing) and establishing trust registries or networks (sometimes called \u201ctrust frameworks\u201d) so that, say, a university in one country issuing a diploma credential will be trusted by employers in another country.<\/p>\n<p>Privacy remains a double-edged sword challenge \u2013 while decentralized identity improves privacy, careful design is needed to prevent unintended data correlation. If not done right, using one identity everywhere could allow observers to link your activities. Techniques like having multiple DIDs and minimal disclosure credentials mitigate this, but they need to be consistently applied.<\/p>\n<p>Lastly, <strong>regulatory and legal recognition<\/strong> is a hurdle: laws in various jurisdictions may need to catch up to recognize digital credentials and signatures as legally equivalent to physical IDs and paper. The good news is many governments are already moving in this direction, updating regulations to accommodate digital and decentralized IDs.<\/p>\n<p>Looking ahead, the <strong>future of identity management is expected to be decentralized, user-centric, and highly interoperable<\/strong>. As technology keeps advancing and industries collaborate, we are likely to see big changes in how we manage and control our online identities.<\/p>\n<p>The concept of <strong>self-sovereign identity<\/strong> \u2013 where individuals fully control their digital identity \u2013 is set to grow and become mainstream.<\/p>\n<p>This will make online services easier to use (<a href=\"https:\/\/veridas.com\/what-is-passwordless-authentication\/\">passwordless authentication<\/a>, instant trust verification) and will allow different systems to work together seamlessly, because common standards will let identities roam across platforms. Governments are beginning to adopt digital IDs (for example, national ID programs that include digital wallets), and the next step is a broader push towards decentralized identity systems integrated into public services. We can expect more government-issued credentials (like driver\u2019s licenses, passports, social security cards) to become available as verifiable credentials that people can hold in their personal wallets. A<\/p>\n<p>s more governments take this route, businesses will feel the push to integrate these methods as well, creating a network effect. A country like <strong>Estonia \u2013 which has been a pioneer with its e-Residency and digital ID system \u2013 demonstrates how effective a digital-first (and somewhat decentralized) identity approach can be<\/strong> in providing secure, interoperable services. In the future, we might routinely use a single digital wallet to check into hotels, rent cars, prove our age, access medical records, and sign legal documents, all with cryptographic proofs rather than handing over raw data.<\/p>\n<p>This promises stronger security (since every interaction is signed and verifiable), better privacy (since you only share what\u2019s needed), and far more convenience.<\/p>\n<p>The future identity ecosystem will likely involve lots of behind-the-scenes coordination \u2013 blockchain networks or other distributed systems might serve as the backbone for DIDs and credential registries, and standards ensure that whether you\u2019re using a wallet from company A or service B, they all speak the same language.<\/p>\n<p>We can also anticipate <strong>biometrics<\/strong> playing a role in simplifying user experience \u2013 for instance, using your voice or face (stored securely) to unlock your decentralized ID wallet and sign transactions, combining security with convenience.<\/p>\n<p>In fact, solutions like biometric-bound decentralized IDs (e.g., the earlier mentioned ZeroData ID that ties a biometric vector <a href=\"https:\/\/veridas.com\/what-are-renewable-biometric-references\/\">RBR<\/a> to your decentralized credential) hint at a future where <strong>you are the key to your identity<\/strong> in the literal sense.<\/p>\n<p>Overall, the trajectory is clear: decentralized identity is poised to <strong>reshape digital life<\/strong>, making it safer and more user-friendly. As this technology matures and adoption grows, we\u2019ll move closer to a world where identity verification is instant but private, and <strong>individuals truly own their digital identities<\/strong> \u2013 fulfilling the promise of the future of digital identity.<\/p>\n<p>The path isn\u2019t without obstacles, but with ongoing innovation and cooperation (through bodies like DIF and forward-thinking industry leaders), decentralized identity stands out as the foundation for the next generation of identity management. The future of identity is being built now, and it is decidedly <strong>decentralized<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The way we prove and manage who we are online is undergoing a dramatic transformation. Traditional digital identity systems \u2013 like using passwords, social logins, or centralized ID databases \u2013 are increasingly seen as insecure and inconvenient. It is time for decentralized identity. Data breaches are on the rise, and 75% of security professionals reported [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":90260,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":[252],"meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[72],"tags":[],"country":[301],"resource":[293],"topic":[251],"industry":[],"solution":[232],"class_list":["post-90250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-biometrics","country-global","resource-yes","format-article","topic-identity","solution-identity-verification"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Decentralized Identity: How It Works &amp; Why It Matters &#8226; Veridas<\/title>\n<meta name=\"description\" content=\"Learn about self-sovereign identity, its benefits, and how decentralized digital identity management secures access and verification.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/veridas.com\/en\/decentralized-identity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Decentralized Identity: How It Works &amp; Why It Matters &#8226; Veridas\" \/>\n<meta property=\"og:description\" content=\"Learn about self-sovereign identity, its benefits, and how decentralized digital identity management secures access and verification.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/veridas.com\/en\/decentralized-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"Veridas\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-01T09:38:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-16T13:29:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jos\u00e9 Miguel S\u00e1nchez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jos\u00e9 Miguel S\u00e1nchez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"25 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/veridas.com\/en\/decentralized-identity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/decentralized-identity\/\"},\"author\":{\"name\":\"Jos\u00e9 Miguel S\u00e1nchez\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/0289c37f7a4ac8a87704b25e9d39302b\"},\"headline\":\"Decentralized Identity: How It Works &#038; Why It Matters\",\"datePublished\":\"2025-04-01T09:38:35+00:00\",\"dateModified\":\"2025-04-16T13:29:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/veridas.com\/en\/decentralized-identity\/\"},\"wordCount\":4925,\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/decentralized-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity.jpg\",\"articleSection\":[\"Identity &amp; Biometrics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/veridas.com\/en\/decentralized-identity\/\",\"url\":\"https:\/\/veridas.com\/en\/decentralized-identity\/\",\"name\":\"Decentralized Identity: How It Works & Why It Matters &#8226; Veridas\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/veridas.com\/en\/decentralized-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/decentralized-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity.jpg\",\"datePublished\":\"2025-04-01T09:38:35+00:00\",\"dateModified\":\"2025-04-16T13:29:59+00:00\",\"description\":\"Learn about self-sovereign identity, its benefits, and how decentralized digital identity management secures access and verification.\",\"breadcrumb\":{\"@id\":\"https:\/\/veridas.com\/en\/decentralized-identity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/veridas.com\/en\/decentralized-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/decentralized-identity\/#primaryimage\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity.jpg\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity.jpg\",\"width\":1200,\"height\":675,\"caption\":\"decentralized identity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/veridas.com\/en\/decentralized-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/veridas.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity &amp; Biometrics\",\"item\":\"https:\/\/veridas.com\/en\/category\/identity-biometrics\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Decentralized Identity: How It Works &#038; Why It Matters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"name\":\"Veridas\",\"description\":\"Just be you\",\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\",\"name\":\"Veridas\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"width\":2048,\"height\":1076,\"caption\":\"Veridas\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/VeridasOfficial\",\"https:\/\/es.linkedin.com\/company\/veridas\",\"https:\/\/www.instagram.com\/veridas.life\/\",\"https:\/\/www.youtube.com\/@VeridasOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/0289c37f7a4ac8a87704b25e9d39302b\",\"name\":\"Jos\u00e9 Miguel S\u00e1nchez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/jmsanchez_coral-150x150.png\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/jmsanchez_coral-150x150.png\",\"caption\":\"Jos\u00e9 Miguel S\u00e1nchez\"},\"description\":\"Identity Verification Expert\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/josemiguelsanchezrodriguez\/\"],\"url\":\"https:\/\/veridas.com\/en\/author\/jmsanchez\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Decentralized Identity: How It Works & Why It Matters &#8226; Veridas","description":"Learn about self-sovereign identity, its benefits, and how decentralized digital identity management secures access and verification.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/veridas.com\/en\/decentralized-identity\/","og_locale":"en_US","og_type":"article","og_title":"Decentralized Identity: How It Works & Why It Matters &#8226; Veridas","og_description":"Learn about self-sovereign identity, its benefits, and how decentralized digital identity management secures access and verification.","og_url":"https:\/\/veridas.com\/en\/decentralized-identity\/","og_site_name":"Veridas","article_published_time":"2025-04-01T09:38:35+00:00","article_modified_time":"2025-04-16T13:29:59+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity.jpg","type":"image\/jpeg"}],"author":"Jos\u00e9 Miguel S\u00e1nchez","twitter_card":"summary_large_image","twitter_creator":"@VeridasOfficial","twitter_site":"@VeridasOfficial","twitter_misc":{"Written by":"Jos\u00e9 Miguel S\u00e1nchez","Est. reading time":"25 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/veridas.com\/en\/decentralized-identity\/#article","isPartOf":{"@id":"https:\/\/veridas.com\/en\/decentralized-identity\/"},"author":{"name":"Jos\u00e9 Miguel S\u00e1nchez","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/0289c37f7a4ac8a87704b25e9d39302b"},"headline":"Decentralized Identity: How It Works &#038; Why It Matters","datePublished":"2025-04-01T09:38:35+00:00","dateModified":"2025-04-16T13:29:59+00:00","mainEntityOfPage":{"@id":"https:\/\/veridas.com\/en\/decentralized-identity\/"},"wordCount":4925,"publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"image":{"@id":"https:\/\/veridas.com\/en\/decentralized-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity.jpg","articleSection":["Identity &amp; Biometrics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/veridas.com\/en\/decentralized-identity\/","url":"https:\/\/veridas.com\/en\/decentralized-identity\/","name":"Decentralized Identity: How It Works & Why It Matters &#8226; Veridas","isPartOf":{"@id":"https:\/\/veridas.com\/en\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/veridas.com\/en\/decentralized-identity\/#primaryimage"},"image":{"@id":"https:\/\/veridas.com\/en\/decentralized-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity.jpg","datePublished":"2025-04-01T09:38:35+00:00","dateModified":"2025-04-16T13:29:59+00:00","description":"Learn about self-sovereign identity, its benefits, and how decentralized digital identity management secures access and verification.","breadcrumb":{"@id":"https:\/\/veridas.com\/en\/decentralized-identity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/veridas.com\/en\/decentralized-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/decentralized-identity\/#primaryimage","url":"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity.jpg","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2025\/04\/decentralized-identity.jpg","width":1200,"height":675,"caption":"decentralized identity"},{"@type":"BreadcrumbList","@id":"https:\/\/veridas.com\/en\/decentralized-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/veridas.com\/en\/"},{"@type":"ListItem","position":2,"name":"Identity &amp; Biometrics","item":"https:\/\/veridas.com\/en\/category\/identity-biometrics\/"},{"@type":"ListItem","position":3,"name":"Decentralized Identity: How It Works &#038; Why It Matters"}]},{"@type":"WebSite","@id":"https:\/\/veridas.com\/en\/pt\/#website","url":"https:\/\/veridas.com\/en\/pt\/","name":"Veridas","description":"Just be you","publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/veridas.com\/en\/pt\/#organization","name":"Veridas","url":"https:\/\/veridas.com\/en\/pt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","width":2048,"height":1076,"caption":"Veridas"},"image":{"@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VeridasOfficial","https:\/\/es.linkedin.com\/company\/veridas","https:\/\/www.instagram.com\/veridas.life\/","https:\/\/www.youtube.com\/@VeridasOfficial"]},{"@type":"Person","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/0289c37f7a4ac8a87704b25e9d39302b","name":"Jos\u00e9 Miguel S\u00e1nchez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/jmsanchez_coral-150x150.png","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/jmsanchez_coral-150x150.png","caption":"Jos\u00e9 Miguel S\u00e1nchez"},"description":"Identity Verification Expert","sameAs":["https:\/\/www.linkedin.com\/in\/josemiguelsanchezrodriguez\/"],"url":"https:\/\/veridas.com\/en\/author\/jmsanchez\/"}]}},"_links":{"self":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/90250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/comments?post=90250"}],"version-history":[{"count":10,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/90250\/revisions"}],"predecessor-version":[{"id":90997,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/90250\/revisions\/90997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media\/90260"}],"wp:attachment":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media?parent=90250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/categories?post=90250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/tags?post=90250"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/country?post=90250"},{"taxonomy":"resource","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/resource?post=90250"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/format?post=90250"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/topic?post=90250"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/industry?post=90250"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/solution?post=90250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}