SSNs, Seed Phrases, and Relationships: Why Centralized Digital Identity Will Always Fail
Current platforms utilize an outdated identity model, trapping users with usernames tied permanently to single email accounts, making account lockout a real threat for many users. The industry standard relies on technical frameworks like decentralized identifiers (DIDs) to solve the issue of portable, self-sovereign accounts across multiple applications.
The debate splits sharply between technical mandates and social reality. One camp, represented by 'djmichaelb', insists uniqueness demands external authorities—SSNs, fingerprints—and no technical fix is bulletproof. Conversely, 'rako' slams this approach, asserting identity belongs to the community, not a technical wrapper. 'Coleman' emphasizes the systemic flaw of the single-handle lock. The division is evident between those pushing verifiable tech ('muntedcrocodile') and those valuing relational bonds ('rako').
The consensus points to a structural failure: tying identity to a single platform is fundamentally broken. The fault lines remain raw: whether true self-sovereignty requires a verifiable key (like a seed phrase) or if it must emerge organically from established community relationships, free from platform control.
Key Points
Current platform identity models create unrecoverable account lockouts.
Coleman argues platforms tie a single username to one email, causing permanent loss if recovery details fail.
Identity must be defined by community recognition, not centralized tech wrappers.
rako insists identity centers on the relationship within a community, rejecting platform enforcement.
True identity uniqueness requires official state authority, making all systems inherently risky.
djmichaelb states uniqueness depends on external authorities like SSNs or government records, meaning nothing is foolproof.
Decentralized Identifiers (DIDs) offer the necessary technical structure for portability.
jayleneSlide identifies DIDs as the technical solution for self-sovereign accounts across apps.
Any secure crypto identity must anchor itself to biometrics or a private key.
muntedcrocodile asserts cryptographic security mandates reliance on a seed phrase or biometrics.
Even 'deleted' user data leaves traceable placeholders.
artwork points out that database overwriting, as seen with 'deleteduser.com', leaves residual identification data.
Source Discussions (3)
This report was synthesized from the following Lemmy discussions, ranked by community score.