By Tatiana Revoredo and Rodrigo Borges
In the first days of existence, our arrival to the world is registered in a Civil Registry Office, which, on behalf of the State, issues a birth certificate. This is our first identity in society.
From then on, the main facts of our civil life (marriage, death, among others) are also registered in a notary’s office, and complemented by other documents, such as ID and Individual Taxpayer Registry, issued with the function of identifying the same person before different legal facts (enrollment in institutions of education, assistance at health care units, opening of bank account, for example).
If there is a need or interest in driving vehicles, we will need to obtain a Driver’s License, a document intended to identify and certify we are qualified for driving.
Our “collection” of documents, however, will not be exhausted at this point. If we wish to travel to other countries, then it is necessary to issue an identify that is valid abroad – the Passport[1].
Here, it is also important to highlight the large volume of “investments” annually made by companies in mechanisms for identifying clients and partners, especially financial institutions, given compliance rules [2] and the multiple documents and certificates issued by agencies for identification of the same person.

In seconds, we can send an email to the other side of the world, but we spend hours waiting for the issuance of a second copy of our Identity Card or renewing our Driver’s License. This does not make any sense! It is necessary to optimize the collection of personal data and accelerate its verification, as well as change the way of storing and making this information available, returning ownership and possession of data related to civil identity to individuals, who are the actual owners of their personal information.

Despite the lack of knowledge of many people, such replacement of the traditional system of analogical identity by a system of universal and digital identification is already possible with the use of blockchain technology which, despite being at embryonic stage (similar to that of the early years of Internet), has been successfully used in Estonia whose population, more specifically 97.9%, has a unique and digital identity [4].

In addition, there is considerable improvement in security with management of identification through blockchain, which given its decentralization, hampers the penetration of hackers in the identity system, thus avoiding any malicious modification of identity information by third parties, or even restricting the population to access identification documents, especially passport, as occurred in countries under a dictatorial regime, or in situation of civil war.

There are several types of blockchains, classified as “open” or “closed”, depending on how they approach their security model and threats. Blockchains may also be either public or private[5], permissioned or permissionless, with various governance structures and rules that may be implemented in several existing platforms, which allow the use of this technology for a wide variety of purposes, with applications to a wide range of audiences.
Considering the secrecy and security required to implement and manage a single, digital, sovereign and universal identity, such requirements would only be achieved through Distributed Ledger Technology (DLT), which may be closed or open permissioned blockchain [6], in which only authorized users have access to all data and may include or suppress information and change the network.

The debate is long, and will certainly require regulation at international level, so that blockchain technology enables creation of a unique, digital and universal identification system for the benefit of the whole society, really able to avoid abuses by governments and companies, and allowing citizens to exercise full power over their own personal data.
By Tatiana Revoredo and Rodrigo Borges
This article was originally published at Coinschedule Blog.
References
[1] Guzmán, Liana Douillet. In: Oxford Blockchain Program: What are some key applications of blockchain technology, both in the financial services industry and beyond. University of Oxford, 2018.
[2] For example, among the obligations imposed on financial institutions to prevent the use of financial system for the practice of money laundering, it is important to identify, keep updated, and retain customer data for at least five years, from the first day of the year following the closure of current accounts or operations (Law 9.613 / 98, article 10, § 2 and Circular Letter BACEN 2,852/98, article 3)
[3] “(…)a new business model that uses information and technology as communication facilitators, data transfers, and business transactions. ” Revoredo, Tatiana. In: Digitalization of society: The Internet Economy(impacts and reflexes in current society). Linkedin. September 25, 2017. Last access on 4/5/2018.
[4] E-estonia. In: e-identity. Enterprise Estônia. Last access on April 03, 2018.
[5] Jayachandran, Praveen. In: Blockchain Explained – The difference between public and private blockchain. Published by IBM Blockchain Blog on May 31, 2017. Last access on April 03, 2018.
[6] Shrier, David. In: Oxford Blockchain Program: Transforming enterprise business models”. University of Oxford. 2018.