Beyond KYC Theater

Why Self-Sovereign Identity Is Infrastructure, Not Ideology

Morris Mwanga  ·  Yale School of Management  ·  Founder, Persona Blocks
March 2026  ·  Working Paper


Abstract

On May 6, 2026, Utah becomes the first U.S. state to activate a sovereign digital identity program backed by a legislated bill of rights. The bill guarantees selective disclosure, prohibits government surveillance through the identity system, and imposes a legal duty of loyalty on every party that touches a resident’s identity data. It passed both chambers unanimously [11].

This is not an experiment. It is the beginning of a structural shift.

Every year, the global economy spends over $206 billion on financial crime compliance [21], a substantial portion of which goes toward Know Your Customer (KYC) processes that simultaneously fail to prevent fraud and succeed in creating massive honeypots of personal data. Meanwhile, over 850 million people worldwide remain excluded from financial services because they lack government-issued credentials [5]. Self-sovereign identity (SSI) — in which individuals hold, control, and selectively disclose their own verified credentials — offers a structural fix to both problems. This paper argues that sovereign identity is not a philosophical luxury but a practical infrastructure requirement for the next decade of digital services. Drawing on first-hand experience building Persona Blocks, a sovereign KYC platform on Polygon, and the legislative breakthrough of Utah’s S.B. 275, I examine the technical architecture, the economic incentives, the regulatory landscape, and the honest obstacles that remain.


1. The Identity Tax

Every service provider independently collects, verifies, and stores a complete copy of your most sensitive personal information. Each copy sits in a separate database, with a separate security posture, governed by a separate compliance regime. The result is predictable: Equifax, 147 million records stored in plaintext [15]. T-Mobile, 77 million [16]. 23andMe, 6.9 million genetic profiles [17]. MOVEit, 62 million records across 2,500 organizations [18].

The breaches are accelerating, and they are reaching the identity verification industry itself. In November 2025, Cybernews discovered that IDMerit, a company whose entire business is identity verification, had left a MongoDB database containing approximately one billion records exposed without a password. Full names, addresses, dates of birth, and national ID numbers across 26 countries, including 203 million from the United States alone [19]. IDMerit claimed they found “no exposure, vulnerability or unauthorized access,” despite the database being open to the internet. The entity charged with verifying your identity could not secure its own database.

The problem extends beyond storage to scope. In February 2026, researchers revealed that Persona, an identity verification vendor used by platforms like Discord for age checks, had left its frontend exposed [20]. Behind a simple “confirm you are over 18” prompt, the system was running comprehensive identity verification, watchlist screening, and adverse-media checks. Users believed they were answering a yes-or-no question. They were submitting to a background investigation they never consented to.

Global financial crime compliance spending reached $206 billion in 2024, with per-customer KYC onboarding costs of $30 to $300 at major banks [21], much of it pure redundancy. Meanwhile, the World Bank estimates 850 million people lack any formal identification [5], locked out of financial services entirely.

Centralized identity is expensive, dangerous, and exclusionary. It persists not because it works, but because alternatives were not technically viable until recently. That is changing.


2. What Sovereign Actually Means

The term “self-sovereign identity” carries ideological baggage that obscures its practical meaning. It is not a manifesto for anonymity or a rejection of government authority. It is a specific architectural pattern with concrete technical properties.

In the SSI model, three roles exist:

The critical difference from the current system is where data lives and who controls disclosure. Today, the verifier collects and stores the raw data. In SSI, the verifier receives a cryptographic proof that the credential exists, is valid, and was issued by a trusted authority — without necessarily receiving the underlying data.

Consider a concrete example. A bar needs to verify that a customer is over 21. Today, the customer hands over a driver’s license. The bartender sees their full name, date of birth, home address, license number, height, weight, and organ donor status. That is far more information than the question requires. In an SSI system, the customer presents a zero-knowledge proof that their age credential, issued by their state DMV, confirms they are over 21. The bartender learns one bit of information: yes or no.

This is not hypothetical cryptography. Zero-knowledge proofs for age verification, credential ownership, and range proofs are production-ready in 2026. The EU’s eIDAS 2.0 regulation, which mandates digital identity wallets for all EU citizens by 2027, explicitly supports selective disclosure [4]. The technical infrastructure exists. The question is adoption.

Christopher Allen’s ten principles of self-sovereign identity, published in 2016, remain the clearest articulation of the model [1]:

  1. Existence. Users must have an independent existence outside of digital systems.
  2. Control. Users must control their identities and be the ultimate authority on their identity data.
  3. Access. Users must have access to their own data, with no hidden data.
  4. Transparency. Systems and algorithms must be transparent and open-source.
  5. Persistence. Identities must be long-lived, ideally lasting a lifetime.
  6. Portability. Identity must not be held by a singular third party.
  7. Interoperability. Identities should be as widely usable as possible.
  8. Consent. Users must agree to the use of their identity.
  9. Minimization. Disclosure of claims must be minimized. Only the minimum necessary data should be shared.
  10. Protection. The rights of users must be protected, even against the operators of the identity system itself.

These are not aspirational goals. They are engineering requirements. A system that satisfies them produces specific, measurable outcomes: reduced data duplication, user-controlled disclosure, cryptographic verifiability, and no single point of compromise.

It is worth distinguishing SSI from two models it is often confused with.

Federated identity (Sign in with Google, Sign in with Apple) reduces the number of passwords a user manages, but concentrates control in the identity provider. Google knows every service you authenticate with. If Google suspends your account, you lose access to everything that depends on it. The user is a tenant, not an owner.

Centralized government identity (national ID databases, Aadhaar) solves the issuance problem but creates exactly the kind of honeypot that SSI avoids. India’s Aadhaar database, with 1.4 billion biometric records in a single system [22], represents the largest single point of failure in the history of identity. A breach of Aadhaar would make Equifax look trivial.

SSI is not anti-government or anti-institution. It requires issuers, often governments, to create credentials. What it changes is the storage and disclosure model. The government issues the credential. The user holds it. The verifier checks it. No one accumulates a database of everyone’s everything.

Utah’s S.B. 275, which takes effect May 6, 2026, encodes this distinction into law with a phrase that may prove historic: identity is endorsed by the state, not bestowed by it [11]. The state verifies and signs your credential. You hold it. You choose when and to whom you disclose it. The state does not track your usage, profile your behavior, or withhold services if you prefer a physical ID. This is SSI as legislation — not a whitepaper principle, but an enforceable right.


3. The Technical Architecture

Sovereign identity is built on interlocking standards and novel systems, each solving a distinct problem. This section describes the full Persona Blocks stack from the identity layer up through biometric integrity, forensic provenance, and on-chain coordination.

The Persona Blocks Zero-Trust Identity Stack
Figure 1: The Persona Blocks Zero-Trust Identity Stack. Seven layers build upward from a self-sovereign identity anchor (L0) through cryptographic storage, credential schemas, biometric integrity, document provenance, compliance, and user-controlled access (L6). Each layer addresses a distinct security property.

3.1 Decentralized Identifiers (DIDs)

A DID is a globally unique identifier that the subject controls, without requiring a central registration authority. The W3C DID specification, which reached full recommendation status in 2022 [2], defines the format:

did       = "did:" method-name ":" method-specific-id
method-name = 1*method-char
method-char = %x61-7A / DIGIT    ; a-z / 0-9

For example: did:polygon:0x1234abcd... or did:web:personablocks.io:users:alice

Each DID resolves to a DID Document, a JSON-LD structure containing the subject’s public keys, authentication methods, and service endpoints:

{
  "@context": [
    "https://www.w3.org/ns/did/v1",
    "https://w3id.org/security/suites/secp256k1-2019/v1"
  ],
  "id": "did:polygon:0xUserWallet...",
  "controller": "did:polygon:0xUserWallet...",
  "verificationMethod": [{
    "id": "did:polygon:0xUserWallet...#key-1",
    "type": "EcdsaSecp256k1VerificationKey2019",
    "controller": "did:polygon:0xUserWallet...",
    "publicKeyHex": "04a8c9b1..."
  }],
  "authentication": ["did:polygon:0xUserWallet...#key-1"],
  "service": [{
    "id": "did:polygon:0xUserWallet...#ipfs-vault",
    "type": "EncryptedDocumentStore",
    "serviceEndpoint": "ipfs://bafybei..."
  }]
}

The DID Document is the root of trust. Anyone who resolves the DID can verify signatures made by the subject without contacting a central authority. The verificationMethod array publishes the subject’s public key. The authentication relation declares which keys may prove control of the DID. The service array advertises endpoints — in our case a pointer to the user’s encrypted IPFS vault.

DIDs can be anchored on a blockchain (providing immutability and global resolution), on a web server (providing simplicity), or on a peer-to-peer basis (providing privacy). The method determines the trust and availability properties. In Persona Blocks, DIDs derive directly from Polygon wallet addresses, inheriting the chain’s consensus guarantees without requiring a separate DID registry contract.

Identity Anchor (L0)
Figure 2: Identity Anchor (L0). A user’s wallet private key (secp256k1) derives their DID on Polygon, which resolves to a DID Document containing verification methods, authentication proofs, and an IPFS vault service endpoint. No registration authority is required. Conforms to W3C DID Core v1.0.

3.2 Verifiable Credentials (VCs)

A Verifiable Credential is a tamper-evident digital credential whose authorship can be cryptographically verified. The W3C Verifiable Credentials Data Model, also a full recommendation [3], defines the structure. A single Persona Blocks KYC verification produces a Verifiable Identity Certificate (VIC), a composite credential comprising eight independently addressable document types:

{
  "@context": [
    "https://www.w3.org/2018/credentials/v1",
    "https://schema.personablocks.io/kyc/v1"
  ],
  "type": ["VerifiableCredential", "VerifiableIdentityCertificate"],
  "issuer": "did:polygon:0xPersonaBlocks...",
  "issuanceDate": "2026-03-12T00:00:00Z",
  "credentialSubject": {
    "id": "did:polygon:0xUserWallet...",
    "vicId": 42,
    "verificationLevel": "enhanced",
    "documents": {
      "selfie":           { "docType": 0, "ipfsHash": "Qm...", "encrypted": true },
      "governmentId":     { "docType": 1, "ipfsHash": "Qm...", "encrypted": true },
      "faceModel3D":      { "docType": 2, "ipfsHash": "Qm...", "encrypted": true },
      "kycRecord":        { "docType": 3, "ipfsHash": "Qm...", "encrypted": true },
      "faceComparison":   { "docType": 4, "ipfsHash": "Qm...", "encrypted": true },
      "videoAnalysis":    { "docType": 5, "ipfsHash": "Qm...", "encrypted": true },
      "sceneAnalysis":    { "docType": 6, "ipfsHash": "Qm...", "encrypted": true },
      "complianceReport": { "docType": 7, "ipfsHash": "Qm...", "encrypted": true }
    },
    "biometricAssertions": {
      "livenessConfirmed": true,
      "faceMatchScore": 0.94,
      "threeDimensionalGeometryVerified": true,
      "sanctionsScreeningPassed": true
    }
  },
  "proof": {
    "type": "EcdsaSecp256k1Signature2019",
    "created": "2026-03-12T00:00:00Z",
    "verificationMethod": "did:polygon:0xPersonaBlocks...#key-1",
    "proofPurpose": "assertionMethod",
    "proofValue": "z58DAdFfa9..."
  }
}

The documents map links each document type to its IPFS content hash. Every blob behind those hashes is encrypted with the subject’s wallet-derived public key. The hashes are public, but the content is not. The biometricAssertions object provides verifiable claims about the results of biometric analysis without exposing the underlying data. A merchant verifying a customer’s identity can check livenessConfirmed: true without ever seeing the 3D face mesh or video frames that produced that assertion.

The credential is signed by the issuer’s private key using EcdsaSecp256k1Signature2019, the same curve used by Ethereum wallets. Any verifier can resolve the issuer’s DID, retrieve the public key from the DID Document’s verificationMethod, and verify the proof without contacting the issuer. The credential is held by the subject in their wallet. The issuer does not need to be online for verification to succeed.

This architecture enables selective disclosure at the document level. A verifier requiring only proof of liveness can request access to docType 6 (scene analysis) without receiving docTypes 0 and 1 (selfie and government ID). The on-chain access control contract enforces per-docType permissions:

// Simplified access control interface
function grantAccess(
    uint256 vicId,
    address merchant,
    uint8[] calldata docTypes,  // e.g., [4, 6] for face comparison + scene analysis
    uint256 expiry
) external onlyVicOwner(vicId);

function hasAccess(
    uint256 vicId,
    address merchant,
    uint8 docType
) external view returns (bool);

The user grants access to specific document types for a specific merchant with a specific expiry. Revocation is a single on-chain transaction that takes effect immediately. The merchant’s next attempt to retrieve the encrypted blob will fail the access check.

Credential Schema (L2)
Figure 3: Credential Schema (L2). The Verifiable Identity Certificate (VIC) contains eight encrypted document types orbiting a central on-chain reference. Selective disclosure allows a merchant to request specific docTypes (e.g., Face Match and Liveness) while the remaining documents stay encrypted and inaccessible. Revocation is a single on-chain transaction with immediate effect.

3.3 Client-Side Encryption and Zero-Knowledge Storage

The most sensitive part of any identity system is biometric data: photographs, face scans, fingerprints. In a sovereign architecture, this data must never exist in plaintext on a server.

At Persona Blocks, we solve this with wallet-derived deterministic encryption. The key derivation chain proceeds as follows:

Step 1: Deterministic Message
  m = "Persona Blocks document decryption
"
       "Wallet: " || address

Step 2: Wallet Signature (EIP-191)
  sigma = wallet.sign(m)

Step 3: Key Derivation
  sk = keccak256(sigma)          in F_p  (32 bytes)
  PK = sk * G                    in E(F_p)

Step 4: ECIES Encryption (per document)
  r  <- random()                 in F_p
  R  = r * G                     (ephemeral public key)
  S  = r * PK                    (shared secret)
  k_enc || k_mac = KDF(S)
  c  = AES-256-CBC(k_enc, plaintext)
  t  = HMAC-SHA256(k_mac, c)
  output = R || c || t

The critical property is determinism. The same wallet address always produces the same signature for the same message, which always derives the same keypair. The user does not manage keys. Their wallet is the key. A fresh browser session, a new device, or a different application can reconstruct the decryption key from a single wallet signature.

Each document type is encrypted independently with a fresh ephemeral key, producing a distinct ECIES ciphertext. The encrypted blobs are uploaded to IPFS via dual pinning (Pinata and Filebase for redundancy). The IPFS content hashes are registered on-chain in the VIC Registry contract.

The server processes biometric data during the initial verification (face comparison, liveness detection, 3D reconstruction) and then encrypts the results before storage. After encryption, the server does not retain plaintext. Decryption happens exclusively in the user’s browser when they connect their wallet and sign the derivation message.

The threat model is explicit:

Compromised Component Attacker Gains Can Decrypt?
ServerEncrypted blobs, IPFS hashesNo
IPFS (public by design)Encrypted blobsNo
Blockchain (public by design)Content hashes, access logsNo
Server + IPFS + BlockchainAll of the aboveNo
User’s wallet private keySignature, then decryption keyYes

The only viable attack vector is compromise of the user’s wallet private key, at which point the attacker controls the entire wallet. There is no server-side key to steal, no HSM to compromise, no key escrow to subpoena. The system has zero stored secrets.

Cryptographic Envelope (L1)
Figure 4: Cryptographic Envelope (L1). The user signs a deterministic message (Step 1), producing a wallet signature (Step 2). Keccak256 derives a 32-byte private key, and secp256k1 scalar multiplication produces the public key (Step 3). All eight document types are encrypted independently via ECIES (Step 4). Encrypted blobs go to IPFS; only content hashes are stored on Polygon. The threat model (inset) shows that compromising any combination of server, IPFS, and blockchain yields only encrypted data.

3.4 Biometric Integrity: 3D Face Reconstruction

Traditional liveness detection relies on challenge-response prompts (“turn your head left,” “blink twice”) that real-time deepfake pipelines and pre-recorded video replays can trivially defeat. Persona Blocks takes a fundamentally different approach: full 3D geometric reconstruction of the subject’s face from video frames.

During verification, the system captures a short face video and extracts a dense set of facial landmarks in three-dimensional space. These landmarks are connected into a triangulated surface mesh using a canonical facial topology, then refined through multiple passes of geometric subdivision to produce a high-resolution watertight mesh with smooth vertex normals. The pipeline proceeds from sparse landmark detection through topological connection, iterative subdivision, and finally export as an encrypted 3D binary stored under the user’s control.

The 3D mesh serves as a geometric liveness proof. A flat photograph, a screen replay, or a printed mask produces a degenerate mesh where the depth variance across the Z-axis is near zero, the nasolabial fold geometry is absent, and the ear-to-ear curvature does not match a convex human face. The system evaluates three attack categories:

The reconstructed mesh is exported as an industry-standard 3D binary format, encrypted with the user’s wallet-derived key, and stored on IPFS. A verifier requesting high assurance can decrypt and inspect the 3D geometry directly. A verifier requiring only a boolean liveness assertion receives a cryptographic attestation from the VIC’s biometric claims without accessing the mesh itself. The raw biometric data never leaves the user’s encrypted vault unless they explicitly grant access.

Biometric Integrity (L3)
Figure 5: Biometric Integrity (L3). Three parallel verification pipelines process capture input (selfie, face video, government ID). Top: 3D geometric reconstruction defeats 2D replay, rigid masks, and depth spoofing. Middle: Cross-modal face matching uses embedding-level comparison across selfie, video, and ID. Bottom: AI scene analysis detects environmental spoofing vectors such as screens, masks, and printed photos. Each stream produces an independent encrypted credential.

3.5 Forensic Document Provenance: The Meredith Marks Algorithm

Any system that stores identity documents must answer a chain-of-custody question: if a document leaks, where did it come from? Traditional visible watermarks degrade document quality and are trivially removed. Metadata-based tracking (EXIF tags, filename conventions) does not survive format conversion, screenshots, or re-encoding.

Persona Blocks employs the Meredith Marks algorithm, a cryptographic steganographic watermarking system that embeds invisible, statistically detectable provenance markers directly into the pixel data of identity documents. The algorithm is named in memory of Thomas Meredith III.

The core mechanism uses a cryptographic pseudorandom number generator to produce a deterministic but unpredictable spatial pattern for each watermark. The embedding seed is derived from a keyed hash of the document identity and provenance layer, ensuring that each document receives a unique pattern that cannot be predicted without the secret key. Marker positions adapt to the local image content, with color and opacity calibrated to remain imperceptible under normal viewing conditions while remaining statistically detectable by an informed verifier.

The algorithm defines multiple provenance layers, each applied at a different stage of the document lifecycle:

LayerContextPurpose
L0KYC CaptureMarks the original verification event
L1Customer ViewTracks customer-side decryption
L2Merchant ShareIdentifies which merchant received the document
L3Merchant ViewTracks merchant-side viewing
L4ROI DeliveryMarks regulatory or law enforcement release
L5External ShareTracks any authorized external distribution

Each layer uses a unique cryptographic seed derived from the document identity, producing a per-document, per-layer spatial origin that prevents cross-identity false matches. The markers blend into the image at sub-perceptual intensity, adapting to local luminance so they remain invisible to the human eye regardless of the document’s visual content.

Detection uses a statistical hypothesis test against a random control baseline. The detector regenerates the expected marker positions from the cryptographic chain, samples actual pixel values, and computes a divergence score. The detection threshold is calibrated to achieve a false positive rate below 10⁻⁵ while surviving lossy compression, arbitrary cropping, format conversion, and screenshots.

If a watermarked document surfaces outside its authorized context, forensic analysis identifies which layer is present and therefore which stage of the pipeline leaked it: the original capture, the customer’s own device, a specific merchant, a regulatory release, or an external share. This transforms document provenance from a policy problem into a cryptographic one.

Document Provenance (L4): The Meredith Marks Algorithm
Figure 6: Document Provenance (L4): The Meredith Marks Algorithm. Top: Six provenance layers (L0–L5) track documents from KYC capture through customer view, merchant share, merchant view, ROI delivery, and external distribution. Middle: The cryptographic embedding pipeline derives a unique seed from the document identity, generates deterministic marker positions via counter-mode PRNG, and blends Gaussian dots into the image. Bottom: Detection regenerates expected positions, samples pixel values, and applies a statistical test. The watermark survives JPEG compression, arbitrary cropping, format conversion, and screenshots.

3.6 On-Chain Registries

A minimal set of smart contracts provides the coordination layer:

The contracts are intentionally thin. They store hashes and permissions, not data. The chain provides ordering, immutability, and transparency. It is an audit trail, not a database.


4. Why Now: The Convergence

Self-sovereign identity has been discussed since at least 2016. What has changed is that five independent trends have converged to make it practical in 2026.

Wallet Infrastructure Has Matured

In 2020, interacting with a blockchain wallet required installing a browser extension, writing down a 24-word seed phrase, understanding gas fees, and navigating transaction confirmations. The user experience was a filter that excluded everyone except cryptocurrency enthusiasts.

By 2026, wallet connection is a two-click process. Libraries like RainbowKit and WalletConnect abstract the complexity. Smart contract wallets support social recovery, session keys, and gas sponsorship. Passkey-based wallets eliminate seed phrases entirely. The wallet is becoming invisible — a background authentication layer rather than a user-facing product.

Zero-Knowledge Proofs Are Production-Ready

Selective disclosure — the ability to prove a property of a credential without revealing the credential itself — is the core value proposition of SSI. It requires zero-knowledge proofs (ZKPs).

Until recently, ZKPs were expensive to generate, slow to verify, and required specialized cryptographic expertise to implement. The development of efficient proof systems (Groth16, PLONK, Halo2, and more recently folding-based schemes) has reduced proving times from minutes to seconds and verification to milliseconds. ZK rollups on Ethereum process millions of transactions per day using these proofs. The infrastructure is battle-tested.

Practical ZKP tooling now allows credential holders to prove statements like “I am over 18,” “I am a resident of the EU,” or “I passed KYC with a score above 80” without revealing their date of birth, home address, or full verification record.

Regulation Is Moving Toward User-Controlled Identity

The EU’s eIDAS 2.0 regulation requires all EU member states to offer digital identity wallets to citizens by 2027 [4]. These wallets must support selective disclosure and user consent for data sharing. The regulation does not use the term “self-sovereign,” but its technical requirements map closely to the SSI architecture.

In the United States, multiple states have launched or piloted mobile driver’s licenses (mDLs) following the ISO 18013-5 standard, which supports selective disclosure. The TSA accepts digital IDs at over 30 airports.

But the most significant U.S. development is Utah’s S.B. 275, the State-Endorsed Digital Identity Program Amendments, which takes effect on May 6, 2026. Sponsored by Senator Kirk Cullimore and passed unanimously by both the Utah Senate (25-0) and House [11], the bill establishes what may be the strongest privacy framework for a government digital identity program in the United States.

S.B. 275 creates a digital identity bill of rights with four enforceable protections:

  1. Right to physical ID. The government cannot withhold services from residents who choose not to use digital identity. Adoption is voluntary, not coerced.
  2. Right to refuse. No one can be compelled to use digital identification.
  3. Right to selective disclosure. Residents can confirm only the attributes a transaction requires — for example proving they meet a minimum age without revealing their actual birthdate or address.
  4. Right to freedom from surveillance. The bill bars routine tracking, profiling, or persistent monitoring through the digital identity system.

The bill goes further by imposing a duty of loyalty on every party in the chain: the state, digital wallet providers, and verifying parties. No actor may process identity attributes in ways that exploit users, conflict with their best interests, or cause them disproportionate harm. This is not a guideline. It is an enforceable legal obligation.

Architecturally, Utah’s program uses device-based credentials stored in a mobile wallet rather than a centralized government database. This is the same design pattern that underpins SSI. The state endorses the identity and signs the credential. The user holds it on their device. Wallet providers must obtain explicit consent before processing any attribute and implement state-of-the-art security.

The ACLU has called Utah’s approach the right way to do government digital identity [12]. The Libertas Institute, a libertarian-leaning policy group, actively supported the bill [13]. When the ACLU and Libertas agree on a technology policy, something fundamental has shifted.

Deepfakes Make Liveness Verification Urgent

The proliferation of AI-generated images and videos has made photographic identity documents unreliable in isolation. A high-quality synthetic face can fool basic document verification systems. The response has been increasingly sophisticated liveness detection: 3D face reconstruction, multi-frame video analysis, behavioral biometrics.

But liveness detection data is extraordinarily sensitive. A 3D mesh of someone’s face, combined with their government ID, is a near-complete biometric profile. Under the current model, every service provider that performs liveness checks accumulates a database of these profiles. SSI inverts this: liveness verification is performed once, the result is encrypted and stored under the user’s control, and subsequent verifiers receive a credential attesting to the result without accessing the raw biometric data.

The Cost of the Status Quo Is Accelerating

Global KYC compliance costs are growing at approximately 15% per year, driven by expanding regulatory scope (AML6 in the EU, the Corporate Transparency Act in the US) and increasing fraud sophistication. Banks report that 10 to 20 percent of new customer applications are abandoned during KYC due to friction.

At the same time, the cost of data breach remediation continues to rise. IBM’s 2025 Cost of a Data Breach report puts the average at $4.88 million per incident [6], with healthcare and financial services significantly higher.

The economic case for SSI is straightforward: verify once, reuse everywhere, store nowhere centrally. A single KYC credential, issued by a trusted verifier and held by the user, can be presented to any number of relying parties without repeating the verification process or duplicating the underlying data. The issuer’s cost is amortized across all verifiers. The user’s friction drops to a single interaction. The attack surface contracts from N databases to zero, because no central database exists.


5. Who Benefits

Users

The most immediate benefit is control. When your identity credentials live in a wallet you control, you decide who sees what. A mortgage lender receives proof of your income bracket without seeing your bank statements. An age-restricted service confirms you are over 21 without learning your birth date. A new employer verifies your right to work without photocopying your passport.

The secondary benefit is security through elimination. You cannot breach a database that does not exist. If every service provider holds only cryptographic proofs rather than raw personal data, the value of compromising any single provider drops to near zero. There is nothing to steal.

The tertiary benefit is portability. A KYC credential verified in one jurisdiction can be recognized in another, subject to mutual recognition agreements between verifiers. Moving countries, switching banks, or changing service providers no longer requires starting the identity verification process from scratch.

Businesses

For businesses, the economics are compelling. KYC-as-a-service providers already exist, but they still require each relying party to store a copy of the verification result and often the underlying documents. SSI eliminates the storage obligation entirely. The business receives a verifiable credential, checks its signature, and makes an access decision. It does not need to store, protect, encrypt, back up, or eventually delete the underlying personal data.

This reduces compliance cost (no PII storage means reduced obligations under GDPR, CCPA, and sector-specific regulations), breach liability (you cannot leak data you do not hold), onboarding friction (accepting a pre-verified credential is faster than running a new verification), and infrastructure cost (no need to build and maintain secure document storage systems).

For merchants in regulated industries (financial services, healthcare, legal), the reduction in compliance overhead is substantial. A merchant on Persona Blocks can verify a customer’s identity by requesting access to their on-chain VIC. The customer approves access from their wallet. The merchant receives encrypted documents, decrypted with a key the customer provides. If the merchant’s access is revoked, the decryption key is no longer available. The merchant never builds a local database of customer biometrics.

Regulators

Regulators benefit from SSI in ways that are counterintuitive. A common objection is that sovereign identity undermines regulatory oversight — that if users control their data, regulators lose visibility. The opposite is true.

On-chain identity registries provide an immutable audit trail of every verification, every access grant, and every access revocation. Regulators can verify that a financial institution performed KYC on a customer by checking the on-chain record, without accessing the customer’s personal data. Sanctions screening results, suspicious activity reports, and compliance decisions can be anchored to verifiable timestamps.

Persona Blocks generates compliance reports (covering sanctions screening, IP intelligence, and contact verification) that are encrypted and stored on-chain. A regulator with appropriate authority can request access through the same consent mechanism as any other verifier. The system does not hide compliance. It makes compliance auditable.

The Excluded

For the 850 million people without formal government identification [5], SSI offers a path to inclusion that centralized systems cannot. A sovereign identity does not require a government to issue it first. A community organization, an NGO, an employer, or a peer network can issue credentials that establish identity attributes. These credentials gain trust through the reputation of their issuers and the consistency of their attestations, not through the authority of a single government database.

A refugee who has lost their identity documents but has been verified by UNHCR can hold a credential attesting to their identity, their skills, and their medical history. A farmer in a region without land registries can hold credentials from local authorities attesting to land use. A gig worker can accumulate verified work history credentials from multiple platforms into a single portable profile.

This is not charity. It is infrastructure. The unbanked and undocumented represent an enormous market that the current identity system structurally excludes. SSI lowers the barrier to entry by decoupling identity from any single issuer.


6. What Is Holding It Back

Intellectual honesty requires acknowledging the obstacles. SSI is not a pure improvement over the status quo in every dimension. It introduces new problems while solving old ones.

Key Management Is Still Hard

If your identity credentials live in a wallet, and the wallet is controlled by a private key, then losing that key means losing your identity. This is a real problem. Hardware wallets get lost. Phones get stolen. Seed phrases get forgotten.

Social recovery (where a set of trusted contacts can collectively restore access), smart contract wallets with multiple authentication factors, and passkey-based systems all mitigate this risk. But none of them are as simple as clicking “Forgot Password” on a centralized service. The UX gap has narrowed significantly, but it has not closed.

This is the single largest barrier to mainstream SSI adoption. The industry must solve key management to the point where a non-technical user can recover their identity credentials after losing their phone, without understanding the underlying cryptography.

The Interoperability Problem

Multiple SSI frameworks exist: Sovrin, ION, KILT, Polygon ID, SpruceID, among others. Each uses different DID methods, different credential formats, and different proof systems. A credential issued on one network is not automatically verifiable on another.

The W3C standards (DID Core, Verifiable Credentials) provide a common data model, but the implementation details vary enough that true interoperability requires bridge infrastructure that is still being built. The Decentralized Identity Foundation (DIF) and the Trust over IP Foundation (ToIP) are working on this, but progress is slow relative to the pace of deployment.

The Chicken-and-Egg Problem

SSI is a network. Its value increases with the number of issuers and verifiers participating. But issuers are reluctant to issue credentials that few verifiers accept, and verifiers are reluctant to accept credentials that few users hold.

Breaking this cycle requires anchor use cases: specific, high-value scenarios where SSI provides such a compelling advantage that adoption becomes self-reinforcing. Regulatory mandates like eIDAS 2.0 help by guaranteeing a baseline of issuers and verifiers. Enterprise pilots in banking, healthcare, and supply chain are establishing proof points.

Regulatory Uncertainty

Some jurisdictions view user-controlled identity as a threat to state authority. Others lack the technical sophistication to evaluate SSI proposals. The regulatory landscape varies dramatically. What is legal in Estonia may be impossible in China.

The good news is that the direction of travel is toward SSI principles, even when the terminology differs. But regulatory clarity on cross-border credential recognition, liability frameworks, and data protection compliance for on-chain systems is still emerging.

Blockchain Skepticism

SSI does not strictly require a blockchain. DIDs can be anchored on web servers, and credentials can be verified peer-to-peer. But blockchains provide properties — immutability, censorship resistance, global availability — that strengthen the trust model significantly.

However, blockchain technology carries reputational baggage from cryptocurrency speculation, environmental concerns (largely addressed by proof-of-stake), and association with scams. Enterprise adopters and regulators sometimes reject blockchain-based solutions reflexively, regardless of their technical merit.

The response is not to hide the blockchain but to make it invisible. Users should not need to know or care that their identity credentials are anchored on Polygon. They should know that their credentials are tamper-proof, globally verifiable, and under their control. The implementation detail is irrelevant to the value proposition.


7. A Builder’s Perspective

I built Persona Blocks to prove that sovereign identity is not a whitepaper abstraction. It is buildable, deployable, and functional with current technology. Here is what I learned.

The Encryption Model Works

Client-side encryption with wallet-derived keys is the architectural decision I am most confident in. The user signs a deterministic message with their wallet. We derive a secp256k1 keypair from the signature hash. All documents (selfie, government ID, 3D face model, KYC records, compliance reports) are encrypted with the user’s public key before touching IPFS.

The server processes biometric data during initial verification but does not retain plaintext results. Decryption happens exclusively in the browser. A server compromise yields only encrypted blobs. An IPFS compromise yields only encrypted blobs. The only way to access a user’s data is to compromise their wallet private key — and if that is compromised, the target has bigger problems than identity theft.

The practical challenge was performance. Encrypting and uploading eight document types to IPFS during a single KYC session takes time. We parallelized the pipeline so that face comparison, 3D reconstruction, and liveness analysis run concurrently, and each result is encrypted and uploaded as it completes. The total end-to-end time for a full KYC verification is under 60 seconds.

On-Chain Gas Costs Are Manageable

A common objection to blockchain-based identity is gas cost. On Polygon Amoy (a testnet, but representative of Polygon mainnet economics), registering a VIC with eight document hashes costs approximately $0.01 to $0.05 in MATIC. Even at Ethereum L1 prices, the cost would be $2 to $10 per verification — still cheaper than the $30 to $300 that traditional KYC costs.

Layer 2 networks and the continued reduction in gas costs make on-chain identity economically viable at scale. The cost trajectory is downward.

Compliance Is Not Optional

The most important lesson I learned is that “sovereign” does not mean “unregulated.” A KYC platform, even one that gives users control over their data, must comply with AML regulations, sanctions screening requirements, and suspicious activity reporting obligations.

Persona Blocks runs sanctions screening against OFAC, UN, EU, and Canadian sanctions lists with multi-stage name matching. The platform is designed from the ground up to satisfy Bank Secrecy Act (BSA) and Anti-Money Laundering (AML) obligations, both for the platform itself and for merchants using it. Compliance results are encrypted and stored as part of the user’s VIC, providing an auditable record that screening was performed.

When regulatory or law enforcement access is required, the platform implements a Release of Information (ROI) process that requires multisig approval. No single actor — whether an administrator, a merchant, or a system process — can unilaterally release a user’s documents. Every release follows a predictable, traceable, and auditable trail: the request is logged, the approval signatures are recorded, and the delivery is tracked. The entire chain is anchored on-chain, creating an immutable record that both protects the user’s rights and satisfies the regulator’s evidentiary requirements.

This matters because regulators will not accept SSI systems that circumvent compliance. The value proposition of sovereign identity is not “escape regulation.” It is “comply more efficiently while giving users control over their data.” Any builder who ignores compliance will find their system unusable in regulated markets.

Liveness and Provenance Are Solved Problems

The two hardest technical challenges in sovereign identity — proving a human is real and proving a document is authentic — are addressed by the systems described in Sections 3.4 and 3.5.

The 3D face reconstruction pipeline defeats the three major categories of presentation attack: flat replay, rigid mask, and real-time deepfake overlay. A cross-modal face matching pipeline validates the live video against the selfie and government ID using neural embedding comparison. AI-powered scene analysis catches environmental spoofing vectors. Each layer produces a separate encrypted credential stored in the user’s VIC. A verifier requiring high assurance can request all three; one with lower requirements might accept only the face comparison.

The Meredith Marks algorithm solves the document provenance problem that every identity platform eventually faces: if a leak occurs, who leaked it? Multiple cryptographic watermark layers, each tied to a specific stage of the document lifecycle, provide forensic attribution that survives lossy compression, cropping, format conversion, and screenshots. This transforms leak investigation from a policy exercise into a mathematical one.

The User Experience Must Come First

Nobody adopts a system because it is architecturally elegant. Users adopt systems that are fast, simple, and solve a problem they have.

The Persona Blocks flow is: connect wallet, sign a message, take a selfie, take a photo of your ID, record a short video. Behind the scenes, eight document types are processed, encrypted, uploaded to IPFS, and registered on-chain. The user sees a progress bar and a result screen. They do not see IPFS hashes, smart contract transactions, or encryption parameters.

The customer portal lets users view their verified documents by connecting their wallet and signing the decryption message. The documents appear as images and structured data. The blockchain and IPFS are invisible.

This is how SSI must be deployed to reach mainstream adoption. The cryptography is the foundation, but the user experience is the product.

Access Control (L6) and Compliance (L5)
Figure 7: Access Control (L6) and Compliance (L5). Left: A merchant requests access to specific attributes, the user approves via wallet signature, encrypted documents are retrieved from IPFS, and decryption happens client-side only. Revocation is a single on-chain transaction with immediate effect. Right: Sanctions screening, multisig ROI process, immutable audit trail, and BSA/AML regulatory readiness. Every document release requires multiple signers. Compliance reports are encrypted and stored on-chain. Regulators access data through the same consent architecture as merchants.

8. Where This Goes

The Standards to Watch

For Developers

If you are building applications that handle user identity (authentication, KYC, age verification, credential checking), start designing for a world where the user holds the credential and you verify a proof. The shift is coming regardless of which specific SSI framework prevails.

Practical first steps:

  1. Implement wallet-based authentication alongside traditional email/password.
  2. Design your data model so that PII can be replaced with credential references.
  3. Adopt the Verifiable Credentials data model for any credentials your application issues.
  4. Test with Polygon ID, SpruceID, or similar frameworks that provide end-to-end tooling.

For Policymakers

The goal of identity regulation should be to protect individuals while enabling verification. SSI achieves both more effectively than centralized databases.

  1. Study Utah’s S.B. 275 as a model [11]. It demonstrates that sovereign identity legislation can pass unanimously, satisfy both civil liberties advocates (ACLU) [12] and limited-government advocates (Libertas) [13], and include concrete technical mandates (device-based credentials, selective disclosure, anti-surveillance).
  2. Mandate data minimization in identity verification. Do not require businesses to store what they do not need.
  3. Establish mutual recognition frameworks for digital credentials across jurisdictions.
  4. Define clear liability rules for credential issuers, holders, and verifiers.
  5. Fund open-source SSI infrastructure as public goods. The identity layer should not be owned by any single company.

For Everyone

The next time you upload a photo of your passport to a website, ask yourself: why does this company need a permanent copy of my identity document? What happens to it after they verify my age, my address, or my right to work? Who else has access to it? What happens when (not if) their database is breached?

You deserve better. The technology exists. The standards are written. The regulatory momentum is building. The question is not whether sovereign identity will become the default. The question is how much data will be breached before it does.


References

  1. Allen, C. (2016). “The Path to Self-Sovereign Identity.” Life With Alacrity.
  2. W3C. (2022). “Decentralized Identifiers (DIDs) v1.0.” W3C Recommendation.
  3. W3C. (2022). “Verifiable Credentials Data Model v1.1.” W3C Recommendation.
  4. European Commission. (2024). “eIDAS 2.0: The European Digital Identity Framework.”
  5. World Bank. (2024). “Identification for Development (ID4D) Global Dataset.”
  6. IBM Security. (2025). “Cost of a Data Breach Report 2025.”
  7. Sovrin Foundation. (2018). “Sovrin: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust.”
  8. Preukschat, A., & Reed, D. (2021). Self-Sovereign Identity: Decentralized Digital Identity and Verifiable Credentials. Manning Publications.
  9. Mühle, A., Grüner, A., Gayvoronskaya, T., & Meinel, C. (2018). “A Survey on Essential Components of a Self-Sovereign Identity.” Computer Science Review, 30, 80–86.
  10. Brunner, C., Gallersdörfer, U., & Matthes, F. (2024). “Self-Sovereign Identity on the Blockchain: Contextual Analysis and Quantification of SSI Principles Implementation.” Frontiers in Blockchain, 7.
  11. Utah State Legislature. (2026). “S.B. 275: State-Endorsed Digital Identity Program Amendments.” Passed Senate 25-0 (Feb 24), House unanimously (Mar 4). Effective May 6, 2026. https://le.utah.gov/~2026/bills/static/SB0275.html
  12. ACLU. (2026). “There’s Only One State That Is Asking the Right Questions About Digital Identity.” https://www.aclu.org/news/privacy-technology/digital-id-utah
  13. Libertas Institute. (2026). “SB 275: Modernizing Utah’s Identity Rights in the Digital Age.” https://libertas.institute/...
  14. Blockchain Commons. (2026). “Musings of a Trust Architect: Progress toward a State-Endorsed Identity (SEDI) in Utah.” https://www.blockchaincommons.com/...
  15. Federal Trade Commission. (2019). “Equifax to Pay $575 Million as Part of Settlement.” ftc.gov
  16. T-Mobile. (2021). “Additional Information Regarding 2021 Cyberattack Investigation.” t-mobile.com
  17. TechCrunch. (2023). “23andMe Confirms Hackers Stole Ancestry Data on 6.9 Million Users.” techcrunch.com
  18. CISA. (2023). “CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability.” cisa.gov
  19. Cybernews. (2025). “Global Data Leak Exposes Billion Records.” cybernews.com
  20. Arntz, P. (2026). “Age Verification Vendor Persona Left Frontend Exposed.” Malwarebytes Labs. malwarebytes.com
  21. LexisNexis Risk Solutions. (2024). “True Cost of Financial Crime Compliance Study, Global Report.” risk.lexisnexis.com
  22. UIDAI. (2026). “Aadhaar Dashboard.” uidai.gov.in
  23. Government of India, Ministry of Electronics and IT. (2023). “Digital Personal Data Protection Act, 2023.” meity.gov.in

Morris Mwanga is a graduate student at the Yale School of Management and the founder of Persona Blocks, a sovereign identity verification platform built on Polygon. Persona Blocks is live on Polygon Amoy testnet at dev.personablocks.io.