In an age where anyone’s face, voice, or words can be faked in seconds, it’s easier to mimic a person online than it is to prove you are one.
Deepfakes are nearly indistinguishable from real video, AI-generated messages can spoof coworkers and public figures, and identity thieves are bypassing legacy protections faster than organizations can deploy new patches. The costs associated with this level of fraud are rising fast. In 2023 alone, $1.2 billion was lost to imposter scams in the US.
With the AI revolution threatening what we know about security today, we’re in the midst of a digital trust crisis — and identity is at the center of it. Security systems are built on the assumption that we can reliably know who’s behind the screen. In truth, that’s never been certain. The good news is, the technology to change that is here — so, let’s dive in.
What we thought trust meant — and why it’s no longer good enough
For years, digital trust looked like SSL certificates, hashed passwords, multi-factor authentication (MFA), and well-behaved cookies. But when it comes to proving who you are, we need more than MFA or security questions. We need proof.
With identity-related breaches accounting for 80% of all security incidents in 2023, security leaders, tasked with protecting an organization's assets and its people, need confidence. Confidence in the identity, authorization, and intent of users and systems across the complex ecosystems they oversee.
At the same time, user trust is falling. Friction, false positives, and data breaches have conditioned people to be skeptical — even as systems ask them to authenticate, verify, and trust with increasing frequency.
How did we get here? Infrastructure has failed to evolve at the pace of threats, or identity systems are outdated (or worse, non-existent). When identity is brittle, everything else crumbles.
Most traditional identity and access management (IAM) stacks weren’t built for an internet of deepfakes, zero-day exploits, and AI-powered attackers. Here are some of the culprits:
Weak passwords and MFA fatigue: major targets for phishing, reuse, and social engineering
Centralized databases: Juicy targets for attackers and single points of failure
Siloed identity systems: Every platform has a different version of “you,” creating risk and friction
Synthetic identity fraud — entirely fake people constructed from partial real data — is now one of the fastest-growing forms of financial crime, with the potential to cost billions globally in the coming years. If identity-related security doesn’t evolve, security teams have an uphill battle ahead:
Signal overload: Thousands of authentication signals, tokens, and session anomalies to triage
Compliance chaos: Navigating evolving frameworks like NIST 800-63, GDPR, and eIDAS 2.0
User dissatisfaction: Logins, resets, and friction that drive abandonment and reduce trust
Legacy systems treat identity like a simple login screen. But today, identity must be living, verifiable proof — not just a stored record.
Verifiability as the new trust layer
The solution isn’t stronger passwords or more factors. It’s an evolution of how we think about security to include human-relevant properties and a new perspective referred to as proof-based identity.
Old Model: Trust the user
New Model: Trust the math
Verifiable digital credentials (VDCs) allow users, employees, and systems to present cryptographically signed, privacy-preserving proof of identity, authorization, affiliation, or knowledge.
Legacy Identity | Verifiable Identity |
Static, central claims | Portable, cryptographically verifiable digital credentials |
Trust the issuer | Trust the cryptographic proof |
Federated SSO | User-held digital wallets |
Central honeypots | Distributed, consent-based trust |
These models remove the need for constant re-verification, enabling access control that’s portable, programmable, and provable without unnecessarily exposing sensitive data.
Why this matters more than ever
We’re entering a pivotal moment for maturing security technologies and best practices to hoist stronger human identity into the digital sphere so that services can cryptographically verify your human identity. If we don’t act, we’re at risk of falling further behind:
AI threatens identity at scale: LLMs can impersonate people with astonishing realism
Fraud is rising fast: Identity-based scams are becoming harder to detect and more expensive to fix
Regulators are stepping in: From eIDAS 2.0 in the EU to evolving standards in the US, organizations will soon be required to verify more — and store less.
Meanwhile, users are demanding privacy, transparency, and control over their digital selves. The shift to verifiable, user-controlled identity isn’t a nice-to-have — it’s inevitable.
It’s time to reinforce the trust layer
The good news: We know where to start. Digital trust isn’t a UX problem. It’s a structural one. And with AI entering the mainstream, we need to take more measures to protect ourselves online.
We need to stop retrofitting old models and start building identity systems that are secure by design, portable by default, and verifiable at every touchpoint.
Verifiable digital credentials represent more than a new feature set. They’re the foundation for a new kind of trust online, one that scales, protects, and adapts.
Sign up for updates to stay in the loop and learn more about verifiable digital credentials.