The Digital Identity Event Horizon

Saal 5
Cade Diehm
Despite years of information security innovation, user safety continues to decay and digital systems remain vulnerable. The reason: most attacks exploit a flawed first principle of digital identity, built on entrenched assumptions about presentation, authentication, enforcement, and trust. As societies digitize and digital identity becomes the endpoint for all contact between citizens, institutions, and infrastructure, this collective failure to imagine new designs will shatter how we cultivate social trust. How else can this state of affairs, where no single attribute of a person can escape the reach of bad actors, be brought to an end? Drawing on unprecedented access to individuals across the digital identity landscape and organisations developing the next wave of identity solutions, The Digital Identity Event Horizon presents New Design Congress' analysis of the core emerging socio-technical threats inherent in all digital identity systems, and lays the case for why proposed solutions will not address these threats without radical rethinking.
What happens when threat modelling becomes reality? This is the story of a research team caught in the mask-off moment for digital identity, documenting the technology's inherent dangers at the exact moment its weaponised design revealed itself. Over four years, New Design Congress conducted eight case studies across implementations ranging from national biometric schemes to Web3 zero-knowledge proofs. More than 45 participants, including law enforcement officers, military personnel, information security researchers, CEOs, and activists, spoke candidly about digital identity's failure modes. The resulting 600+ citations documented a fundamental problem: the Cartesian vulnerability. "I authenticate, therefore I am" - when proving identity becomes inseparable from possessing identity, social-engineering attacks become inevitable. When identity infrastructure becomes a single point of failure, it tears at the fabric of society itself. Since 2021, New Design Congress has applied adversarial security research methodology to the question of flawed digital identity: its definitions, implementations, and implications. From FaceID to BankID, from Facebook to the fediverse, from Worldcoin to the world's passports, this is an exhaustive study of the opportunities and risks that emerge from how we represent entities in the information age. At the centre is a core hypothesis: today's digital identities are inherently vulnerable to attack, and this leads to brittle digital societies. This talk presents the threats and findings for the first time. It is for anyone who still believes today's technologies can safely represent humans. The report it is based on, The Digital Identity Event Horizon, is a landmark adversarial study that names the concrete harms of digital identity directly, establishes a working definition, introduces a threat modeling framework for evaluating any scheme, and presents ten key findings and fourteen recommendations, with many immediately implementable across policy, design, and governance. The report will be soft-launched at https://newdesigncongress.org/en/report/2026/the-digital-identity-event-horizon.

Additional information

Type Talk
Language English

More sessions

12/27/25
Diego Salazar
CDC Triangle
Welcome and presentation of the CDC.
12/27/25
Security
Jade Sheffey
Zero
The Great Firewall of China (GFW) is one of, if not arguably the most advanced Internet censorship systems in the world. Because repressive governments generally do not simply publish their censorship rules, the task of determining exactly what is and isn’t allowed falls upon the censorship measurement community, who run experiments over censored networks. In this talk, we’ll discuss two ways censorship measurement has evolved from passive experimentation to active attacks against the Great ...
12/27/25
Ethics, Society & Politics
Katika Kühnreich
One
While the extreme right is on the rise in many countries and climate change is unrolling, a promising future seems to be written: According to Elon Musk, Sam Altman, and some other “tech bros” it is to leave the dying planet to go to space. With the help of something called “A(G)I”. But what kind of future is the one that is promised? And what is the connection between power cycles of tech company owners and people who's believes can be called fascist? As we moved power through data in ...
12/27/25
Hardware
Kauz
Fuse
OpenAutoLab, an open source machine, that is capable of processing contemporary color and black-and-white films for analogue photography, is being presented here. It made its first public appearance at 37C3 and was already seen there in action, but had no organized talk or proper presentation. Now it is better documented, waits to be built by more people and to be further developed by the community. This talk is about motivation behind developing OpenAutoLab and about the technical decisions ...
12/27/25
Art & Beauty
Nicolas Rougier
Ground
Typography is the art of arranging type to make written language legible, readable, and appealing when displayed. However, for the neophyte, typography is mostly apprehended as the juxtaposition of characters displayed on the screen while for the expert, typography means typeface, scripts, unicode, glyphs, ascender, descender, tracking, hinting, kerning, shaping, weigth, slant, etc. Typography is actually much more than the mere rendering of glyphs and involves many different concepts. If glyph ...
12/27/25
CDC Triangle
Electronic hacker badge for the Critical Decentralization Cluster, featuring the TROPIC01 secure element with an ESP32-S3 microcontroller. Meant to be used for workshops and prototyping. It can also be worn as a mobile badge. Features an e-paper display with frontlight, a JST connector for single-cell LiPo batteries and a 12-button keypad. Designed with KiCad and released as open-hardware. https://github.com/riatlabs/cdc-badge
12/27/25
Ethics, Society & Politics
Joschi Wolf
Fuse
Das Klima-Update vom FragDenStaat Climate Helpdesk.