The Mask-Off Moment for Digital Identity

CDC Triangle
Cade Diehm
Digital identity is sold as a path to trust, inclusion, and "digital empowerment." In practice, it is a brittle control surface: a set of design choices that decide who is seen, who is excluded, and who can be targeted at scale. Born from a landmark research project, _The Digital Identity Event Horizon_, this talk describes the 2025 "mask-off moment" for digital identity: the point where multiple comforting narratives collapse and the core use of identity systems as population-management infrastructure becomes hard to deny. Using short vignettes from New Design Congress case-study work (Estonia, the US, Australia, Gaza, and others), it shows how ambiguity, vendor incentives, and governance theatre turn identity into fraud-permissive, coercion-ready infrastructure In response to this decline, this talk concludes proposes a working model of the digital self as a socio-technical system with six properties: serialisation, custodianship, presentation, authentication, authorisation, and assetisation, and offers new framing and threat models to help understand how digital identity creates brittle societies.
Despite decades of cryptography, security practice, and best practice deployment, digital identity remains the weakest link in systems design because its core terms stay vague while its consequences are concrete. What does it actually take to assemble a digital identity? What do different implementations share, even when they claim to be radically different? And what happens when those definitions are left elastic enough to serve whoever holds power? "The mask-off moment" tracks the convergence of capability (biometrics, sensors, AI triage, mass digitisation), institutional incentives (risk scoring, eligibility gates, compliance automation), and political will. The result is an emerging form of bureaucratic violence we are not prepared to name, much less govern. This talk traces how digital identity became weapon-ready through optimistic framing and opportunistic ambiguity, then offers a concrete frame to interrogate any proposal: what it will do on its best day, what it will do on its worst day, and which parts of the system will be impossible to “add accountability to later.” The intended audience is policymakers, technologists, designers, and civil-society people who are tired of vague promises and want a usable model that survives contact with reality.

Additional information

Type Talk
Language English

More sessions

12/27/25
Diego Salazar
CDC Triangle
Welcome and presentation of the CDC.
12/27/25
Security
Jade Sheffey
Zero
The Great Firewall of China (GFW) is one of, if not arguably the most advanced Internet censorship systems in the world. Because repressive governments generally do not simply publish their censorship rules, the task of determining exactly what is and isn’t allowed falls upon the censorship measurement community, who run experiments over censored networks. In this talk, we’ll discuss two ways censorship measurement has evolved from passive experimentation to active attacks against the Great ...
12/27/25
Ethics, Society & Politics
Katika Kühnreich
One
While the extreme right is on the rise in many countries and climate change is unrolling, a promising future seems to be written: According to Elon Musk, Sam Altman, and some other “tech bros” it is to leave the dying planet to go to space. With the help of something called “A(G)I”. But what kind of future is the one that is promised? And what is the connection between power cycles of tech company owners and people who's believes can be called fascist? As we moved power through data in ...
12/27/25
Hardware
Kauz
Fuse
OpenAutoLab, an open source machine, that is capable of processing contemporary color and black-and-white films for analogue photography, is being presented here. It made its first public appearance at 37C3 and was already seen there in action, but had no organized talk or proper presentation. Now it is better documented, waits to be built by more people and to be further developed by the community. This talk is about motivation behind developing OpenAutoLab and about the technical decisions ...
12/27/25
Art & Beauty
Nicolas Rougier
Ground
Typography is the art of arranging type to make written language legible, readable, and appealing when displayed. However, for the neophyte, typography is mostly apprehended as the juxtaposition of characters displayed on the screen while for the expert, typography means typeface, scripts, unicode, glyphs, ascender, descender, tracking, hinting, kerning, shaping, weigth, slant, etc. Typography is actually much more than the mere rendering of glyphs and involves many different concepts. If glyph ...
12/27/25
CDC Triangle
Electronic hacker badge for the Critical Decentralization Cluster, featuring the TROPIC01 secure element with an ESP32-S3 microcontroller. Meant to be used for workshops and prototyping. It can also be worn as a mobile badge. Features an e-paper display with frontlight, a JST connector for single-cell LiPo batteries and a 12-button keypad. Designed with KiCad and released as open-hardware. https://github.com/riatlabs/cdc-badge
12/27/25
Ethics, Society & Politics
Joschi Wolf
Fuse
Das Klima-Update vom FragDenStaat Climate Helpdesk.