Copyright © 2025 World Wide Web Consortium . W3C ® liability , trademark and permissive document license rules apply.
Abstract
The
use
of
digital
identity
for
web
users
presents
many
opportunities
for
abuse.
This
risk
is
heightened
when
legal
names
or
identities
are
involved.
This
document
explores
some
of
these
risks,
with
a
focus
on
the
presentation
of
government-issued
digital
credentials.
Misuse
of
these
systems
risks
doing
irreparable
harm
to
come.
individual
autonomy
online.
This is a draft TAG finding and does not yet represent TAG consensus.
APIs
that
facilitate
access
to
verifiable
claims
about
identity,
such
as
the
proposed
Digital
Credentials
API
,
are
starting
to
be
developed
and
deployed.
National
digital
identity
systems
are
being
legislated
in
a
A
large
number
of
jurisdictions.
jurisdictions
are
starting
to
create
digital
identity
systems
for
their
citizens.
The
Federated
Identity
Working
Group
includes
this
an
API
for
accessing
these
systems
as
a
chartered
deliverable.
These
Digital
identity
APIs
represent
provide
a
convenient
way
for
websites
to
access
proof
of
legal
identity,
backed
by
large-scale
government
projects
in
multiple
jurisdictions.
identity.
This
convenience
leads
to
a
range
of
implications
for
privacy,
as
noted
in
a
recent
objection
to
the
formation
of
the
Federated
Identity
Working
Group.
Group
[
OBJECTION
].
A
number
The
TAG
believes
that
the
addition
of
serious
concerns
were
raised
government-issued
digital
credentials
to
the
web
has
great
potential
to
cause
the
harms
listed
in
this
the
objection:
A
The
report
produced
by
the
W3C
Council
[
COUNCIL-REPORT
(which
included
members
of
the
TAG)
found
]
also
acknowledged
these
concerns
to
be
serious
problems
and
valid.
Despite
this,
the
working
group
was
allowed
to
form,
though
the
council
report
recommended
included
a
recommendation
that
the
group
seriously
consider
these
factors
as
they
develop
concerns
be
addressed
in
the
API.
work
of
the
Working
Group.
The TAG believes that the addition of government-issued digital credentials to the web has great potential for harm.
The benefits of digital credentials must be aligned with the web user's needs . Following our established principles for privacy , this includes providing people the tools to understand and control how their personal information is collected and used. A browser — or user agent — plays an essential role in mediating these types of requests and ensuring that people have agency.
The web should not become a platform that demands your government-issued identity documents, in the course of its normal operation. Use of such credentials should be exceptional, only when required, and always on a person's own terms.
The TAG therefore encourages contributors to pay special attention to the societal impact of digital credentials.
Before
examining
the
harms,
it
is
important
to
understand
why
sites
seek
identity
information
from
visitors.
There
are
multiple
reasons
that
a
site
might
seek
to
ask
for
proof
of
legal
identity.
Often,
there
are
multiple
reasons
that
a
site
seeks
to
identify
a
visitor.
Motivations that tend to produce user-beneficial outcomes include:
These uses are not necessarily directly felt by people who are required to present credentials, but they can provide a societal benefit that outweighs the costs to individuals. Each of these still carries the potential for abuse.
There are also motivations for which requesting identification is not justified and those that are outright harmful to end user interests:
This
list
That
is,
while
at
least
some
of
these
goals
are
beneficial,
the
use
of
identity
documents
is
far
from
exhaustive.
Often,
there
not
appropriate.
Any
benefits
are
multiple
reasons
not
justified
by
the
cost
that
a
site
seeks
people
pay
in
terms
of
losing
their
ability
to
identify
a
visitor.
control
the
identity
they
present
[
PRIVACY-PRINCIPLES
].
Other
goals
are
inherently
objectionable.
Once
someone
has
provided
an
identifier,
legal
identity,
sites
are
technically
able
to
use
identifiers
in
any
way
they
choose.
Technical
privacy
protections
that
might
be
implemented
in
a
browser
cannot
help.
Legal
protections
might
apply
to
misuse
of
identifying
information,
but
that
depends
on
effective
detection
and
enforcement.
Tracking practices are moving away from largely hidden mechanisms — like cookies — to systems that require the use of stable identifiers. Once identifying information is provided, sites might then assume that they have consent to use identifiers for a range of purposes. Of course, without a viable alternative, any consent to use identifiers is a fiction.
Perhaps
the
most
serious
consequence
of
obtaining
an
identifier
is
that
sites
are
then
able
to
trade
information
across
any
site
contexts
where
a
person
has
provided
that
same
identifier.
This
enables
tracking,
a
form
of
surveillance,
where
people
their
activities
across
multiple
contexts,
both
on-
and
off-line,
gathered
into
profiles.
These
identifier,
online
or
offline.
The
resulting
profiles
are
then
used
for
many
purposes
including
advertising,
credit
ratings,
and
market
analysis.
The
TAG
has
long
regarded
regards
unsanctioned
tracking
as
unacceptable
and
has
advocated
for
technical
measures
that
curtail
these
practices.
Notably,
the
The
TAG
has
also
unequivocally
condemned
cross-site
cookies
and
called
for
browsers
to
disable
them
.
Positive
trends
from
browsers
in
recent
years
include
a
range
of
other
technical
measures,
including
reductions
in
fingerprinting,
state
partitioning,
and
navigation
tracking
mitigations
.
These
technical
Technical
measures
to
prevent
tracking
are
consistent
with
the
TAG's
documented
principles
for
privacy
.
These
principles
articulate
why
privacy
is
essential
to
maintaining
personal
autonomy.
The
same
high-level
principles
are
shared
by
the
many
jurisdictions
that
have
implemented
data
protection
legislation.
The
goal
of
data
protection
is
to
protect
a
person's
rights
over
how
data
about
them
is
used.
In
part
due
to
these
protections,
tracking
practices
are
moving
away
from
largely
hidden
mechanisms
—
like
cookies
—
to
human
interactions
based
on
consent.
That
is,
sites
ask
people
Absent
the
ability
to
identify
themselves.
Once
identifying
information
is
provided,
request
legal
identity,
sites
might
then
assume
that
they
have
consent
to
use
that
information
ask
for
a
range
of
purposes.
Identity
information
might
be
provided
as
other
identifiers,
like
an
email
address
address,
credit
card,
mailing
address,
or
phone
number.
However,
more
sites
also
seek
to
obtain
legal
names
or
other
identifying
information.
Unauthenticated
systems
might
Those
identifiers
could
offer
people
the
ability
to
choose
how
they
wish
more
privacy
options,
to
be
identified.
varying
degrees.
For
instance,
email
services
that
can
provide
temporary
or
site-specific
aliases
offer
a
way
to
create
wholly-new
or
site-specific
identities
enable
the
creation
of
context-specific
addresses
on
demand.
The
same
Similar
aliasing
is
achievable
for
other
types
of
identifiers
that
are
in
common
use,
though
it
can
be
both
significantly
harder
and
more
expensive.
No
such
flexibility
is
not
an
option
possible
when
providing
a
it
comes
to
legal
identity.
A
streamlined
process
for
providing
verifiable
identity
reduces
the
cost
of
requesting
and
providing
that
information.
In
turn,
this
might
will
make
sites
that
would
otherwise
not
ask
for
information
choose
to
take
advantage
of
reduced
friction
to
make
a
request.
Though
increasing
friction
might
not
be
worthwhile,
other
mechanisms
might
be
used
to
disincentivise
requests
for
legal
identity.
A
method
that
might
alter
the
costs
for
site
operators
is
described
in
4.1
7.1
Authorizing
Sites
.
The
architecture
specified
in
the
European
Union’s
digital
identity
eIDAS
regulation
envisions
not
only
Normalizing
the
issuance
practice
of
digital
providing
identity
credentials
to
individuals,
but
also
the
explicit
authorization
websites
risks
serious
harm.
Providing
any
form
of
businesses
and
service
providers
that
will
request
those
credentials.
These
entities
(known
as
"relying
parties")
must
be
registered
and
approved
by
external
identity
issuers,
before
they
are
granted
permission
to
request
only
specific
types
of
information.
This
design
is
intended
to
ensure
that
businesses
and
agencies
cannot
request
arbitrary
personal
data,
and
that
their
ability
to
do
so
is
constrained,
transparent,
and
subject
to
oversight.
This
depends
on
having
a
system
for
transparency:
relying
parties
should
provide
information
regarding
the
data
that
they
will
request,
if
any,
in
order
needs
to
provide
their
services
and
the
reason
for
the
request.
be
an
exceptional
process.
Transparency
contributes
to
accountability
by
making
For
example,
it
possible
for
users
to
understand
who
is
asking
for
what,
and
under
what
legal
authority.
This
safeguard
mitigates
against
some
of
the
risks
associated
with
digital
credentials.
However,
it
does
not
eliminate
the
need
for
scrutiny,
particularly
with
regard
to
proportionality
of
use,
user
control,
and
the
risk
of
such
mechanisms
becoming
normalized
across
the
web.
Nevertheless,
we
recommend
that
the
specification
authors
look
entirely
inappropriate
to
such
mechanisms
use
government-issued
credentials
as
a
guide
for
mitigating
potential
harms
in
this
area.
login
credential,
even
if
credentials
are
used
during
account
creation.
That digital credentials might be used to track people is not a fancy of science fiction, it is the lived experience of a very large number of people.
In India, the Aadhaar national identity scheme was introduced as a way to enable access to government services, like health, welfare, and food assistance. Though the legislation originally included the option for Aadhaar to be used by non-government actors, that provision (Section 57) was ruled unconstitutional by the Supreme Court in 2018.
In
2025,
the
Indian
government
has
enabled
wide
use
of
Aadhar
for
any
entitiy,
entity,
expanding
the
set
of
recognized
reasons
to
include
"
promoting
ease
of
living
for
residents
".
As
a
result,
the
roughly
1
billion
Indian
participants
in
the
Aadhaar
program
are
potentially
subject
to
surveillance
through
the
use
of
their
unique
12
digit
identifier,
which
links
fingerprints
and
iris
scans
to
name
and
other
personal
details.
Despite
Aadhar
use
being
optional
in
law,
even
prior
to
this
change,
its
use
was
refusals
to
do
business
were
widespread
in
employment
and
other
non-government
interactions.
4.3
Multiple
National
Credentials
Individuals
with
more
than
one
nationality,
when
traveling
across
international
borders,
have
This
further
highlights
the
choice
of
which
credential
(passport)
to
assert.
For
example,
a
person
is
generally
required
to
present
a
passport
need
for
the
country
they
entering
if
they
accountability,
but
also
demonstrates
that
there
are
a
citizen
of
strong
incentives
that
country,
even
if
they
hold
other
passports.
When
entering
a
country
in
which
they
do
not
hold
citizenship,
individuals
with
multiple
nationalities
have
motivate
the
choice
use
of
asserting
whichever
nationality
is
more
convenient
(for
example,
one
legal
identity
where
they
would
not
have
to
obtain
a
visa
prior
to
traveling).
The
systems
that
support
digital
passport
credentials
–
and
therefore
enable
these
assertions
to
move
to
the
digital
domain
–
should
not
behave
any
differently.
Some
countries
already
provide
web
apps
(such
as
Visit
Japan
Web)
that
enable
people
to
pre-register
their
passports
by
entering
passport
data
manually,
and
national
authorities
will
likely
build
these
web
apps
to
take
advantage
of
digital
credentials
when
they
become
available.
It's
vital
that
national
authorities
are
not
able
to
query
or
enumerate
what
credentials
may
exist
and
equally
important
that
end
users
remain
in
control
of
what
information
it
is
provided.
5.
Centralization
of
Trust
Centralisation
of
trust
can
lead
to
a
fragmented
web,
where
access
available.
Privacy
therefore
depends
on
which
authorities
a
site
or
user
is
willing,
or
able,
to
work
with.
This
risks
excluding
marginalized
people.
For
example,
a
visitor,
migrant,
or
refugee
may
not
be
able
to,
or
may
not
feel
safe
to,
use
credentials
from
their
country
of
origin.
Especially
where
major
platforms
only
recognize
a
narrow
set
of
issuers,
or
only
recognize
issuers
tied
to
a
specific
jurisdiction.
The
choice
of
jurisdiction
is
not
often
something
that
a
user
can
choose,
but
instead
one
dictated
by
factors
outside
of
their
control.
This
could
undermine
the
global
and
open
nature
of
the
web.
having
an
equivalently
strong
countervailing
force.
Online
services
that
have
real-name
policies
are
justifiably
controversial.
These
systems
have
historically
resulted
in
excluding
certain
people,
often
due
to
people
having
names
that
systems
do
not
recognize.
The
use
of
legal
identity
provides
very
different
social
dynamics
when
compared
with
pseudonymous
or
anonymous
systems.
A
system
that
relies
Insistence
on
use
of
legal
identity
inevitably
excludes
certain
people,
which
can
be
for
a
central
authority
is
unlikely
to
replicate
the
same
failures.
New
risks
range
of
exclusion
arise:
reasons:
In
some
cases,
such
as
Aadhaar,
Aadhaar
(
5.1
Case
Study:
Aadhaar
),
the
law
recognizes
the
risk
that
people
might
not
be
able
to
produce
evidence
that
they
hold
a
credential
and
forbids
discrimination
against
those
who
do
not
authenticate.
However,
what
matters
is
whether
refusal
is
respected
in
practice.
Even if laws only permit the use of digital credentials as a convenience, there is a risk that no alternative means of access to services are provided. This leads to exclusion.
It should not be possible to refuse service to a person based on their refusal or inability to provide a digital credential. This is aligned with such principles as not revealing when assistive technologies are in use or non-retaliation .
Any
credential
system
therefore
website
that
requests
legal
identifiers
needs
to
carefully
consider
what
decide
which
legal
identities
it
accepts.
The
easiest
way
to
do
this
is
to
trust
the
issuers
of
credentials
that
are
most-used
among
visitors
and
distrust
the
rest.
Another
way
might
happen
if
someone
be
to
choose
government-issued
credentials
from
jurisdictions
in
which
the
site
has
a
legal
presence.
This
risks
centralization
of
trust
in
the
most-used
credentials
and
makes
it
hard
for
any
new
authority
to
become
trusted.
This centralization can lead to a fragmented web, where access depends on which authorities a site or user is willing, or able, to work with.
This
also
risks
marginalizing
people
who
are
unable
to
authenticate
or
they
refuse
to.
obtain
accepted
credentials
for
any
reason.
The
choice
of
jurisdiction
is
not
often
something
that
a
user
can
choose,
but
instead
one
dictated
by
factors
outside
of
their
control.
This
might
include
things
like
non-trivial
induced
failure
rates,
which
could
ensure
that
sites
do
undermine
the
global
and
open
nature
of
the
web.
For
example,
a
visitor,
migrant,
or
refugee
may
not
come
to
assume
that
all
users
are
equally
be
able
to,
or
may
not
feel
safe
to,
use
credentials
from
their
country
of
origin.
Especially
where
major
platforms
only
recognize
a
narrow
set
of
issuers,
or
only
recognize
issuers
tied
to
produce
a
credential.
specific
jurisdiction.
The implementation of identity verification is complex. Sites might choose to delegate to external services to manage the process.
It is possible that a limited number of service providers will be capable of implementing the technical and legal process of gathering and validating credentials. This is presently the case for payments infrastructure, which has high degrees of consolidation.
Centralized control provides opportunities to use — or, depending on perspective, abuse — the power it confers to advance political goals. For instance, centralized control over access to payments infrastructure has been used to refuse business from sex work , legal drugs , and video games .
Open standards and implementations can help reduce this risk of capture. Designing systems and standards to minimize any structural bias that might lead to market consolidation is better.
A
better
understanding
of
why
sites
seek
to
obtain
and
use
identity
is
necessary.
While
the
universality
of
a
generic
solution
is
appealing,
each
use
case
could
depend
on
providing
different
sorts
of
information.
[...
need
to
have
more
on
use
cases
information,
as
discussed
in
here
...]
3.
Uses
for
Identity
Information
.
Each use case might require a different type of solution. Different solutions can have dramatically different privacy characteristics.
For
example,
a
The
properties
of
different
approaches
need
to
be
understood
and
matched
to
needs.
A
possible
data
minimization
approach
might
favor
the
choose
to
use
of
selective
disclosure,
so
that
people
can
choose
what
is
disclosed
to
disclose,
either
accepting
sites.
Such
a
system
can
accept
the
linkability
risks
or
regarding
those
on
the
basis
of
the
need
for
identifying
information.
Such
a
system
might
instead
avoid
identifying
information,
but
rely
on
linkability
as
critical
an
essential
feature,
because
it
might
be
used
to
ensuring
that
trace
bad
actors
can
be
traced
if
when
necessary.
These
are
very
different
reasons
to
use
the
same
technique,
with
dramatically
different
privacy
and
control
characteristics.
In
contrast,
a
A
system
that
seeks
to
authorize
based
on
certain
traits
—
such
as
a
system
to
authorize
access
to
online
gambling,
something
that
might
be
restricted
by
age
or
past
history
of
susceptibility
—
might
be
best
suited
to
a
zero-knowledge
system
that
provides
strong
unlinkability.
This highlights that there is no single approach that will work in all cases. For a web API, like digital credentials, this is challenging, because such APIs need to serve a range of purposes. However, this highlights that it is unlikely to be clear to the people who need to authorize use of their credentials whether the system they are participating in has adequate safeguards for the situation.
Developing a better understanding of what is appropriate for a given situation will take time. Developing the necessary understanding of different uses of new technology — and then evolving norms to handle those situations — is not something that can be rushed. Deployment is .
Individuals
with
more
than
one
nationality,
when
traveling
across
international
borders,
have
the
choice
of
which
credential
(passport)
to
assert.
For
example,
it
a
person
is
entirely
inappropriate
generally
required
to
use
government-issued
credentials
as
present
a
login
credential,
even
passport
for
the
country
they
entering
if
credentials
they
are
used
during
account
creation.
European
identity
legislation
describes
a
system
that
has
some
potential
to
counteract
the
worst
kinds
citizen
of
abuses
that
come
from
overuse
country,
even
if
they
hold
other
passports.
When
entering
a
country
in
which
they
do
not
hold
citizenship,
individuals
with
multiple
nationalities
have
the
choice
of
identity
credentials.
Entities
asserting
whichever
nationality
is
more
convenient.
The
systems
that
request
EU
support
digital
identity
will
need
passport
credentials
—
and
therefore
enable
these
assertions
to
show
move
to
the
digital
domain
—
should
not
behave
any
differently.
It's
vital
that
they
national
authorities
are
authorized.
That
authorization
will
be
linked
a
public
record
not
able
to
query
or
enumerate
what
credentials
may
exist
and
equally
important
that
includes
end
users
remain
in
control
of
what
information
each
entity
can
request
and
how
they
intend
to
use
it.
Implemented
correctly,
such
a
is
provided.
Any
credential
system
could
bring
transparency
and
accountability.
needs
to
carefully
consider
what
might
happen
if
someone
is
unable
to
authenticate
or
they
refuse
to.
These
systems
carry
risks,
as
demonstrated
by
experience
with
Aadhaar.
A
system
protection
that
was
designed
might
protect
people
who
cannot
provide
a
credential,
for
use
by
government
—
any
reason
,
might
be
to
artificially
induce
a
non-trivial
failure
rate
even
where
non-governmental
use
was
deemed
an
unconstitutional
imposition
on
privacy
—
is
now
open
credentials
are
available
and
valid.
This
might
ensure
that
sites
do
not
come
to
use
by
private
actors.
Even
before
that,
there
were
documented
cases
of
Aadhaar
being
used
assume
that
all
users
are
equally
able
to
disempower
Indian
citizens
.
These
produce
a
credential
and
so
build
systems
can
provide
substantial
benefits,
in
terms
of
improved
access
to
government
services,
banking,
healthcare
and
other
critical
services.
However,
handle
failures.
Any
choice
to
induce
such
failures
needs
to
be
balanced
against
the
resulting
harms
are
not
trivially
justified
by
those
benefits.
potential
for
fallback
mechanisms
to
be
considerably
less
private.
The TAG supports the work on digital credentials. And we also encourage the groups working in this space to consider all the risks associated with these technologies with open eyes, and to develop mitigations where possible. We encourage threat modelling to understand how these technologies can be misused and potentially lead to unintended and negative societal consequences.
In the Ethical Web Principles , we called for putting "internationally recognized human rights at the core of the web platform". We can think of no area of current work where this is more important.