• I’m Just George – (Eventually) Living in a Decentralized Identity World

    In June 2025 I presented a talk at Identiverse 2025 about decentralized identity called I’m Just George – Living in a Decentralized Identity World. Today I presented a slightly updated version of this talk to an internal audience at McDonald’s as part of our Tech Talks series. The title and pop culture references were inspired by the song “I’m Just Ken” from the Barbie movie, which my daughter was playing essentially on repeat when I started thinking about this topic.

    As the world of digital identity continues to rapidly evolve, one of the developments I’m most interested in is the concept of decentralized identity and verifiable credentials. While standards and implementations are still early, decentralized identity systems promise enhanced security, privacy, and user control. In this post we’ll explore what decentralized identity is, why it matters, and how it’s helping shape the future of authentication, trust, and digital credentials.

    What is Enterprise Identity like today?

    Infographic showing the high-level flow of data in an enterprise workforce identity management platform

    Traditional enterprise workforce identity systems are typically centralized systems that utilize source systems like HR and workforce management to drive user identity lifecycle events. These identities are governed by Identity Governance & Administration (IGA), stored in directories, and used to access applications via single sign-on.

    All user information needed as part of the identity and access management (IAM) processes needs to be stored and moved around these central systems, often leading to security and privacy concerns.

    What Is Decentralized Identity?

    Infographic showing the roles of Issuer, Holder, and Verifier in a decentralized identity flow

    Decentralized identity is a system where individuals control their personal information without relying on a central authority. Using distributed ledger technologies, users can create and manage digital identities securely and privately. Key features include:

    • Enhanced Security & User Privacy: Individuals manage and control how their identity data is shared and used. Strong cryptography reduces the risk of data breaches and unauthorized access.
    • Verifiable Credentials: Digital certificates stored in a user’s identity wallet are issued and signed by trusted entities. These credentials prove specific things about the user like their age or education.
    • Distributed and Secure: Decentralized identity uses distributed technologies such as blockchain and distributed ledgers to ensure privacy, security, and tamper-proof credentials.
    • Interoperable: Interoperability protocols are being developed by standards bodies to ensure decentralized identity can work seamlessly across different platforms.

    Ken is me.

    —barbie (2023)

    In this model, Issuers (e.g., governments, universities, banks) provide credentials, Holders (users) store them, and Verifiers (employers, online shops) request proof.

    • Issuers: Issue credentials to users (the Holder) and verify the credential when requested by the Verifier.
    • Holders: Owners of verifiable credentials (the users). The Holder receives the credential from an Issuer and stores it in their identity wallet. They present the credential when prompted by a Verifier.
    • Verifiers: A Verifier (for instance, an employer) requests credentials from Holders and verifies them with the Issuer for authenticity and validity.

    The simulation is real enough to fool anyone.

    —ready player one (2018)

    There are several emerging threats that decentralized identity and verifiable credentials can help mitigate:

    • Deepfakes in Hiring: Fraudulent job candidates use deepfakes for scams and cyberattacks.
    • Executive Impersonation & Financial Fraud: Attackers create fake videos or audio to trick employees into transferring funds or sharing sensitive data.
    • Phishing & Social Engineering: Deepfake-enhanced emails and calls increase the risk of credential theft.
    • Disinformation & Reputational Damage: Fabricated media can harm brands and public trust.
    • Bypassing Biometric Security: Deepfakes can spoof facial recognition, granting unauthorized access.

    It’s not what you know, it’s what you can prove.

    —Training day (2001)

    Decentralized identities and verifiable credentials help address these challenges:

    • Immutable Verification: Decentralized identity creates tamper-proof records of identity credentials that can be cryptographically verified, making it harder for bad actors to impersonate someone using deepfake videos or audio.
    • Eliminating Central Points of Failure: With decentralized identity, identity data is stored across a network, reducing the risk of a single point of failure that deepfake creators could exploit.
    • Selective Disclosure & Zero-Knowledge Proofs: Users can verify their identity without exposing unnecessary personal information. This prevents attackers from obtaining details that could be used to create more convincing deepfakes.
    • Credentialed Authenticity for Content Creators: Journalists, influencers, and public figures can digitally sign their content using decentralized identity, proving that videos or statements genuinely come from them. This can help counter misinformation spread through manipulated media.
    • Automated Fact-Checking & Authentication: AI-driven tools can cross-check a person’s decentralized identity with their digital presence, flagging potential deepfake content in real time before it spreads widely.

    You don’t need to see his identification.

    —star wars: episode IV – a new hope (1977)

    How can enterprises benefit from decentralized identities in the future?

    • Employee Credentials: Enhance hiring processes by verifying new hires quickly by checking digital degrees, certificates, or background checks.
    • Training and Compliance: Employee internal training certifications can generate digital credentials that can be verified by internal process and access systems.
    • Partner & Supplier Trust: Third party suppliers and vendors can share compliance documents as Verified Credentials without exposing underlying data.
    • Digital Onboarding: Streamline onboarding and continuously verify external workers.
    • Cross-Company Credentials: Enterprise ecosystems can issue membership or accreditation Verified Credentials (e.g., certified partner of a company) which can be validated via shared registries or trust networks.

    We must think not as individuals but as a species.

    —interstellar (2014)

    One of the challenges with decentralized identity and verified credentials is that they typically require the user to have a smart phone and use an identity wallet to store credentials. While smartphones are becoming more widely used, not everyone has one. Additionally, in enterprise scenarios, not all users will be issued work smartphones and the user of personal devices for work activities cannot typically be mandated.

    As an industry we need to think about how to support these users. Here are some suggested alternatives, though they may not work for all situations:

    • Physical Identity Cards with Cryptographic Features: Organizations can issue printed credentials embedded with QR codes or NFC chips that securely store identity data, allowing users to verify themselves at kiosks or service points.
    • Secure Paper-Based Alternatives: Verified credentials can be printed as tamper-proof certificates that users carry and present when needed. These can be scanned and verified against decentralized registries.
    • SMS & USSD-Based Solutions: For users with basic mobile phones, enterprises can provide identity verification through SMS-based authentication or USSD codes, ensuring accessibility without requiring smartphone apps.
    • Shared/Public Kiosk Access: Identity terminals in banks, retail locations, or government offices can help users access their credentials securely without requiring personal devices.
    • Assisted Credential Management: Enterprises can set up support centers where personnel assist users in retrieving or presenting credentials on their behalf, ensuring inclusivity while maintaining security.
    • Identity Custodianship: Trusted agents or institutions (like banks, local government offices, or nonprofits) can act as custodians of decentralized identities, enabling users to authenticate securely without personal digital devices.

    Leeloo Dallas, multipass.

    —The Fifth Element (1997)

    Key standards driving decentralized identity:

    Even if you can’t make it perfect, you can make it better.

    —Barbie (2023)

    Expect innovations that bridge decentralized identity, verifiable credentials, and mobile digital wallets into a single, trusted identity framework.

    Over the next few years, a significant focus will be on bridging decentralized identity standards like W3C Verifiable Credentials (VCs), eIDAS 2.0, and mobile driver’s licenses (mDLs) to create comprehensive digital identity ecosystems within standard digital wallets. Several trends point to this convergence:

    • Collaboration between regulatory bodies and tech developers
    • Standardized verification frameworks
    • Global adoption of digital wallets: Governments and enterprises are deploying identity wallets for citizens and employees, making interoperability between standards essential.
    • Regulatory push (eIDAS 2.0 & global initiatives): The EU’s EUDI Wallet will incorporate Verifiable Credentials, setting a precedent for other regions to follow. The U.S. and various governments are exploring mDLs that align with decentralized identity principles.
    • Convergence of centralized and decentralized approaches: eIDAS 2.0 enforces a trusted, regulated identity framework, while W3C VCs enable self-sovereign, user-controlled identity. The challenge ahead will be harmonizing these models to balance trust, compliance, and user autonomy.
    • Cross-platform identity verification: Enterprises and governments will prioritize interoperability, ensuring that credentials work across different wallets, regions, and applications.
    • Authentication beyond borders: Users will demand global trust frameworks allowing mobile driver’s licenses, passports, and financial credentials to work seamlessly across different ecosystems.

    To make this future a reality, there needs to be:

    • Collaboration between regulatory bodies and tech developers (governments, OpenID Foundation, W3C, Hyperledger).
    • Standardized verification frameworks that allow users to present credentials without vendor lock-in.
    • Improved wallet security to prevent fraud and unauthorized credential use.

    Be prepared.

    —The Lion King (1994)

    Technology leaders must prepare for transformations driven by:

    Decentralized identity will transform how users control and share personal data. While mainstream adoption may take time, progress is accelerating, especially in financial services and healthcare.

    Consumers, employees, and partners are increasingly demanding that enterprises and other entities protect their data and their privacy. Governments are stepping in with regulations to ensure this. Deepfakes and AI are pushing us toward a zero-trust world where verification is essential.

    The world is changing. Decentralized identity may not impact you immediately, but it’s coming. Start asking questions, reading, and learning to stay ahead of the curve.

    The world is changing. Can you feel it?

    —The Lord of the Rings: The Two Towers (2002)

    Further Reading


  • Network Dashboard for Windows Phone Mango Now Available

    I’m proud to introduce our latest Windows® Phone application, Network Dashboard! Network Dashboard is now available for download via the Windows Phone Marketplace. Network Dashboard provides a quick and easy way to see the current status of your Wi-Fi and Mobile Data features as well as one tap access to configuration options for Wi-Fi, Mobile…


  • How to Use the PhotoChooserTask

    This is a quick post to show some code around how to use a PhotoChooserTask for Windows Phone programming: private BitmapImage OriginalImage = new BitmapImage(); private void btnAddPicture_Click(object sender, EventArgs e) { PhotoChooserTask pix = new PhotoChooserTask(); pix.Completed += new EventHandler<PhotoResult&rt;(OnCameraCaptureCompleted); pix.ShowCamera = true; pix.Show(); } private void OnCameraCaptureCompleted(object sender, PhotoResult e) { if (e.TaskResult…


  • Some pictures and video from MIX11

    To be honest, I didn’t spend much time taking pictures or video at MIX11 because I was spending my time listening and learning about what’s coming with the Windows Phone update scheduled for later this year, codenamed “Mango.” However, I figured that I’d share some of the pictures and video that I did capture. Here…


  • Windows Phone 7 will reformat a locked MicroSD card!

    When I first purchased my Samsung Focus I put a 16GB MicroSD card in it.  Unfortunately, I had a hardware issue with the phone and had to return it to AT&T to exchange it for a new one.  At the time I thought my MicroSD card was dead until I could find someone with an…


  • Visual Basic Support Now Available for Windows Phone 7 Development

    The Windows Phone 7 Development Team announced today the immediate availability of the RTW (Release To Web) version of the Visual Basic for the Windows Phone Developer Tools. For the initial release, this version requires Visual Studio 2010 Professional and only supports Silverlight projects.


  • Firmware upgrade instructions for Seagate ST31500341AS 1.5TB drives

    Well, my Drobo is finally up and running and working really well after having to flash the firmware on all four Seagate drives due to some problems with the version that came on the drives initially.  Apparently, the Seagate ST31500341AS drives with part numbers 9JU138-300 and 9JU138-336 with firmware SD15, SD16, SD17, SD18 or SD19…