Diane, a victim of identity theft in Minnesota, told NBC News:

“It’s been a nightmare. My husband and I would have survived better had our house burned to the ground, or if we had been burglarized or robbed at gunpoint. There would have been less hassle, less stress, and less indignation,’ she said. “It caused the death of our marriage and of everything we’ve known to be safe and secure. I have no hope or faith or trust in anybody anymore.”

David Crouse, a victim of identity theft, stated: “It really ruined me. It ruined me financially and emotionally.”

The…


Most people are not aware that almost all government agencies rely upon data brokers to verify their users’ identities online. For communities that don’t have a presence in records, this arrangement completely excludes them from online access to their government. This status quo is unacceptable.

To solve this problem, ID.me committed to a mission of “No Identity Left Behind.” The approach involves two simple steps. First, expand access to identity verification so communities that lack online access (i.e international users, recent immigrants, people who’ve changed their name) can verify online through a video chat process. …


Passwords are the most universally annoying part of login. And, as our digital economy explodes, the password problem is only getting worse. Many organizations now require identity verification and two-factor authentication to deliver high-value services. Unfortunately, those trusted logins are theirs, not yours. Because your own data and login can’t move with you, you’ll need to create a new password and re-verify who you are at every single website you visit.

Clearly, this model isn’t sustainable. The amount of daily friction tied to password management and identity verification reduces access for people and increases costs for businesses. The result is…


This is the fifth post in a five part series. I recommend you start with Part 1: Claiming Your Unique, Digital Identity, Part 2: Identity proofing, data matching, and why the SSN is still important, Part 3: Tokenizing identities or the Credit Card 2.0 model for identity, and Part 4: Data minimization and consent before reading this post.

To move past social security numbers and static identifiers to secure digital credentials, a robust ecosystem of decentralized, digital credential providers. Decentralization ensures there is no “one login to rule them all” that would centralize all of your data and see all…


This is the fourth post in a five part series. I recommend you start with Part 1: Claiming Your Unique, Digital Identity, Part 2: Identity proofing, data matching, and why the SSN is still important, and Part 3: Tokenizing identities or the Credit Card 2.0 model for identity before reading this post.

When you walk into a bar, a bouncer will ask to see your drivers license. If you choose to show that person your credential, then you will expose all of the information on the front of that card: Name, Date of Birth, Address, Height, Weight, Eye Color, Hair…


This is the third post in a five part series. I recommend you start with Part 1: Claiming Your Unique, Digital Identity and Part 2: Identity proofing, data matching, and why the SSN is still important before reading this post.

Credit and debit cards form an interesting, basic model for identity. Banks have regulatory requirements to verify the identities of their customers and must, by law, gather three of four data elements: Name, Date of Birth, Social Security Number, and Address. …


This is the second post in a five part series. I recommend you start with Part 1: Claiming Your Unique, Digital Identity before reading this post.

Two-factor authentication – the practice of adding a one-time code to a phone or a native app like Google Authenticator on top of a password -- is a relatively well-known term to consumers. Less well known is the term “identity proofing”: the process of establishing trust in the relationship between a legal identity and the user controlling the online account. …


Americans feel more helpless than ever in the wake of the Equifax breach. With the sensitive personal information of 143 million people — more than half of all American adults — now available to criminals, there is little the average American can do to prevent their own identity from being hijacked and used against them. …


Blockchain enjoys a tremendous amount of hype in the market. Unfortunately, the hype around blockchain can obfuscate the actual capabilities and limitations of the new protocol. As with any new innovation, the most important question is: what problem does this innovation solve?

With respect to digital identity, there are five important problems blockchain fails to address:

  1. Immutability
  2. Synthetic Identity
  3. Identity Verification
  4. Demographics
  5. Standardization

Immutability

The blockchain is essentially a trusted, public ledger that uses a decentralized network of nodes to verify the integrity of a given transaction. On paper (and to idealists), a public blockchain enables a more democratic world…


With Civic’s recent sale of 33 million worth of tokens, I thought it important to share my thoughts about identity, blockchain, and token offerings (I’ve shared some thoughts about blockchain and identity here in this post).

The Civic token sale is an interesting point to start given the amount of money raised for the company and the recent, spectacular rise of ICOs (Initial Coin Offerings). To contribute value, an identity platform needs to have scale in three key areas to establish network effects: organizations that issue identity, organizations that need to consume identity, and related attribute providers that add enhanced…

Blake Hall

Founder & CEO of ID.me. Leading a talented team focused on increasing trust in digital transactions. Iraq Combat Veteran.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store