๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page

Was this helpful?

  1. Privacy Engineering Field Guide Season 2
  2. Introduction to Privacy Engineering for Non-Techs
  3. Chapter 1 : Digital Identities

What is identity?

PreviousChapter 1 : Digital IdentitiesNextAuthentication Flows

Last updated 1 year ago

Was this helpful?

What is identity? ๐Ÿ‘€

Identity distinguishes individuals from one another. Psychology defines it as comprising qualities, beliefs, and personality traits. Sociology encompasses aspects such as culture, history, and religion.

Historically, identity was established through local knowledge, but as people started to move, seals of local authorities, baptism records, and birth certificates were used as proof of identity.

In the early days of banking, identity was a matter of local knowledge, rooted in the bonds of close-knit communities. As people ventured across the landscape, the seals of local authorities vouched for their authenticity.

Then came the era of baptism records and town clerks, where birth certificates became the certificates of registry. In the burgeoning era of census, identity records became the receipts of our inclusion. Birth certificates and passports, relatively recent practices, came into full swing in the 1980s.

Identity is Contextual

The Ship of Theseus, a legendary vessel from the annals of Western philosophy. This shipโ€™s prow graced the seas of Athens, victorious in countless naval battles, etching a memorable legacy. But over centuries, the ship faced decay, parts replaced, and eventually, every plank and beam was renewed. The enigma lingered: Is it still the same ship?

The answer, remarkably, lies in the continuity of consciousness, a force that molds our very identity. As we traverse the shores of emerging technology, the quest remains: How do we ascertain the constancy of a person over time? How can we make this intricate puzzle work?

Online identity functions by allowing individuals to maintain different personas across various online services. Each of us has distinct personas for gaming, social media, banking, and other online activities.

Identity in the digital age also involves devices and digital identifiers.

Big tech companies have become intermediaries in managing our digital identities, and many identifiers are fragmented across different online services.

What are the different Models of Digital Identities?

In essence, the first model involves managing separate accounts, the second relies on intermediaries, and the third offers greater control and independence in managing your digital identity.

Centralized Identity:

This is the standard way of managing digital identity, where you have separate accounts for different online services.

It relies on technologies like HTTPS, SSL, and TLS for security. However, it can become challenging to manage multiple accounts efficiently.

Federated Identity:

In this model, an identity provider acts as a middleman. Examples include using social logins like Facebook or Google to access various services.

It introduced standards like SAML, OAuth 2, and OpenID. Challenges arise because you still need intermediaries in relationships, and no single organization covers everything.

Self-Sovereign Identity:

This is a peer-to-peer model where you have an independent and self-sovereign digital identity. Blockchain technology enables this model, eliminating the need for multiple accounts.

Your digital wallet stores credentials and keys, which can be issued by yourself or peers like your employer, passport office, etc. To prove your identity, you establish connections and share credentials, which are verified using a distributed ledger.

The concept of identity is socially constructed and contextual, shaped by societies, families, and various influences. One illustrative example of this is the paradox, which highlights how continuity of consciousness plays a role in defining identity.

Ship of Theseus
๐Ÿ•ต๏ธโ€โ™‚๏ธ
โ“
๐ŸŽญ
As I sat alone in my dimly lit apartment, the sudden flicker of a holographic projection interrupted the solitude. It was an unexpected contact, an incoming message from an unknown source. A figure slowly materialized before me, taking the shape of a woman. It was the manifestation of a โ€œrogue AIโ€, a digital entity that had transcended its programming.
Page cover image