The State of Digital Identity
The State of Digital Identity
Dropbox 2012 Breach
2018 2019
The Internet Today
Millions of
Digital Service Providers
Billions of users
Millions of businesses
Consumers and Businesses Have Moved Their Data to the Cloud
Millions of
Digital Service Providers
Billions of users
Millions of businesses
The problem of the Internet Today
•
•
•
•
•
•
•
•
The Problem is Getting Worse, Not Better
Digital accounts
doubling every 5 years
200
2025
400
2020
2015
1072010
48
2005
3+
People are using more devices than
ever
145M 1.5B
427
M
120
M
145M1.1B150M
100
M
500
M
340M
92
M
Personal Credential as main attack vector to penetrate an organization
Isn’t this already solved?
Identity is not part of Internet Technology
Expansion of Internet
A Hard Problem to Solve
Users are platform agnostic
Identity is a cross-platform problem
MostTech giants structurally challenged
Being cross platform is critical Apple
25%
Google/ Microsoft
23%
Apple, Google,
Microsoft
15%
Apple
Google
13%
Google
10%
Microsoft
8%
Apple
Microsoft
6%
Platform of interaction of Dashlane users
Biometry is not a solution
Biometry as the future of digital identity?
Centralized vs. Decentralized Identity
Recent breaches (Facebook, Google…) show the limits of a
centralized Identity system.
With centralized identity and SSO solutions (From Facebook
Connect to Okta), breaches are a question of when not if. How
much leaks then is the real question
© 2019 Dashlane Inc. All rights reserved. | 15
Credential Hygiene
The Toothbrush…
• We give you the tool and tell you how to use it.
• This is on you, to make the effort to brush your teeth.
• Manage your « credential hygiene ».
…and the Seatbelt.
• Even if it is a constraint, you are better off putting your seatbelt on in case
something happens.
• Password Managers are not perfect, but like a seatbelt it is better using than
not doing anything.
Behavioral
change is hard
GasPowered
98%
GlobalAutoSales2018
EV
2%
• Dashlane secures
your data locally to your device using advanced
encryption. Dashlane never sees your data.
• Users maintain ownership and local control of their
data.
• Decentralized by design.
• Independent from BigTechs
Giving control to users
Universality PrivacySimplicity
Looking at the future
• Emergence of Standardized Identity Protocols
• Apple and Google providing proprietary solutions
• WebAuthn promoted by W3C for the web
• Decentralized identity systems
• Self-sovereign identity,
• Blockchain decentralized user-controlled identity, unproven yet
• Digital Identity Providers: third-party solutions that help users manage
digital identity.
“ Convenience
decides everything
”
–Ev Williams
ThePower of Convenience
What can you do
Questions
Start brushing your teeth and try Dashlane
Get 6 months premium
with the code SPARKTHECHANGE

More Related Content

PDF
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
PDF
TechSoup Connect Texas: Creating a Tech Stack Built Around QBO
PPTX
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
PDF
What Open Source Is and How Your Nonprofit Can Benefit
PDF
Microsoft Program Offering Webinar January 2022
PDF
Microsoft Cloud Solutions for Nonprofits
PDF
Assess Your Organization's Digital Capability
PDF
Microsoft program offerings webinar 2021.11.09
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
TechSoup Connect Texas: Creating a Tech Stack Built Around QBO
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
What Open Source Is and How Your Nonprofit Can Benefit
Microsoft Program Offering Webinar January 2022
Microsoft Cloud Solutions for Nonprofits
Assess Your Organization's Digital Capability
Microsoft program offerings webinar 2021.11.09

What's hot (19)

PDF
Getting Ready for an Audit: Everything You Need to Know
PDF
TechSoup Tour: How to Access Donations, Discounts, and Services
PPTX
Webinar - Navigating Payment Processing for Nonprofits - 2015-07-23
PDF
The 2019 State of Grantseeking: Benchmarks and Trends
PPTX
Webinar: Go On A Hardware Safari With Idealware-2017-02-16
PDF
Microsoft Program Offerings Oct 5, 2021
PPTX
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
PDF
Nintex Workflow Cloud
PPTX
How to consolidate Citrix Monitoring in a Single Pane of Glass
PPTX
Webinar - Should You Upgrade to Adobe Creative Cloud? - 2017-02-23
PDF
TechSoup Microsoft Program Offerings December 20201
PDF
So You Signed Up for Office 365 - Now What??
PDF
Can DevOps and ITSM be BFFs?
PDF
Microsoft Program Offering- Your Questions Answered
PDF
The Human Side of Productivity
PDF
WeWork Connect: Shaping Confluence to Reflect Our Culture
PDF
Avoiding Cloud Computing Planning & Implementation Failure
PPT
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
PPTX
Dynamics Day 2016 keynote: Achieving true platform productivity
Getting Ready for an Audit: Everything You Need to Know
TechSoup Tour: How to Access Donations, Discounts, and Services
Webinar - Navigating Payment Processing for Nonprofits - 2015-07-23
The 2019 State of Grantseeking: Benchmarks and Trends
Webinar: Go On A Hardware Safari With Idealware-2017-02-16
Microsoft Program Offerings Oct 5, 2021
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
Nintex Workflow Cloud
How to consolidate Citrix Monitoring in a Single Pane of Glass
Webinar - Should You Upgrade to Adobe Creative Cloud? - 2017-02-23
TechSoup Microsoft Program Offerings December 20201
So You Signed Up for Office 365 - Now What??
Can DevOps and ITSM be BFFs?
Microsoft Program Offering- Your Questions Answered
The Human Side of Productivity
WeWork Connect: Shaping Confluence to Reflect Our Culture
Avoiding Cloud Computing Planning & Implementation Failure
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Dynamics Day 2016 keynote: Achieving true platform productivity
Ad

Similar to The State of Digital Identity (20)

PDF
Digital Identities
PDF
Identity in the Internet Age
PPTX
Jan Keil - Identity and access management Facts. Challenges. Solution
PDF
eMarketer Webinar: The Future of Digital Identity
PDF
Future of digital identity programme summary - 19 mar 2019 lr
PPTX
Identity is key - Robin Gorris
PDF
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
PDF
Do I Know You? Identity on the Internet and the Question of Trust
PDF
The future of digital identity initial perspective
PPT
Mature Digital Trust Infrastructure - Are we there yet?
PPTX
Blockchain Possibilities: Identity, Privacy, and Advertising
PDF
Australian Payments Network - Digital Identity
PDF
The Future of Identity - OpenID Summit 2020
PDF
Identity Live Sydney: Identity Management - A Strategic Opportunity
PDF
Transformation from Identity Stone Age to Digital Identity
PPTX
Evolution of identity Stoyan Kenderov - MAC 2014 conference
PPTX
Iot privacy vs convenience
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PDF
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Digital Identities
Identity in the Internet Age
Jan Keil - Identity and access management Facts. Challenges. Solution
eMarketer Webinar: The Future of Digital Identity
Future of digital identity programme summary - 19 mar 2019 lr
Identity is key - Robin Gorris
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Do I Know You? Identity on the Internet and the Question of Trust
The future of digital identity initial perspective
Mature Digital Trust Infrastructure - Are we there yet?
Blockchain Possibilities: Identity, Privacy, and Advertising
Australian Payments Network - Digital Identity
The Future of Identity - OpenID Summit 2020
Identity Live Sydney: Identity Management - A Strategic Opportunity
Transformation from Identity Stone Age to Digital Identity
Evolution of identity Stoyan Kenderov - MAC 2014 conference
Iot privacy vs convenience
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Ad

More from Dashlane (12)

PPTX
Dashlane Triple Track
PDF
Dashlane Engineering Culture Book
PPTX
Dashlane Mission Teams
PDF
Continuous Delivery: releasing Better and Faster at Dashlane
PDF
The Dashlane Agile Journey
PDF
Continuous Learning
PPTX
Portfolio & Roadmap: 2 tools to scale Agile
PDF
U2F in Dashlane
PDF
Using TypeScript at Dashlane
PDF
Scaling an Engineering Team
PDF
Stop Starting Start Finishing
PDF
Dashlane Engineering Meeting Extract
Dashlane Triple Track
Dashlane Engineering Culture Book
Dashlane Mission Teams
Continuous Delivery: releasing Better and Faster at Dashlane
The Dashlane Agile Journey
Continuous Learning
Portfolio & Roadmap: 2 tools to scale Agile
U2F in Dashlane
Using TypeScript at Dashlane
Scaling an Engineering Team
Stop Starting Start Finishing
Dashlane Engineering Meeting Extract

Recently uploaded (20)

PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Modernising the Digital Integration Hub
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
The various Industrial Revolutions .pptx
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPT
What is a Computer? Input Devices /output devices
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPTX
Configure Apache Mutual Authentication
Final SEM Unit 1 for mit wpu at pune .pptx
Module 1.ppt Iot fundamentals and Architecture
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
TEXTILE technology diploma scope and career opportunities
A proposed approach for plagiarism detection in Myanmar Unicode text
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Developing a website for English-speaking practice to English as a foreign la...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Modernising the Digital Integration Hub
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
The various Industrial Revolutions .pptx
Custom Battery Pack Design Considerations for Performance and Safety
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
What is a Computer? Input Devices /output devices
Comparative analysis of machine learning models for fake news detection in so...
Flame analysis and combustion estimation using large language and vision assi...
Benefits of Physical activity for teenagers.pptx
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Configure Apache Mutual Authentication

The State of Digital Identity

  • 1. The State of Digital Identity
  • 5. The Internet Today Millions of Digital Service Providers Billions of users Millions of businesses
  • 6. Consumers and Businesses Have Moved Their Data to the Cloud Millions of Digital Service Providers Billions of users Millions of businesses
  • 7. The problem of the Internet Today • • • • • • • •
  • 8. The Problem is Getting Worse, Not Better Digital accounts doubling every 5 years 200 2025 400 2020 2015 1072010 48 2005 3+ People are using more devices than ever 145M 1.5B 427 M 120 M 145M1.1B150M 100 M 500 M 340M 92 M Personal Credential as main attack vector to penetrate an organization
  • 10. Identity is not part of Internet Technology
  • 12. A Hard Problem to Solve Users are platform agnostic Identity is a cross-platform problem MostTech giants structurally challenged Being cross platform is critical Apple 25% Google/ Microsoft 23% Apple, Google, Microsoft 15% Apple Google 13% Google 10% Microsoft 8% Apple Microsoft 6% Platform of interaction of Dashlane users
  • 13. Biometry is not a solution Biometry as the future of digital identity?
  • 14. Centralized vs. Decentralized Identity Recent breaches (Facebook, Google…) show the limits of a centralized Identity system. With centralized identity and SSO solutions (From Facebook Connect to Okta), breaches are a question of when not if. How much leaks then is the real question © 2019 Dashlane Inc. All rights reserved. | 15
  • 16. The Toothbrush… • We give you the tool and tell you how to use it. • This is on you, to make the effort to brush your teeth. • Manage your « credential hygiene ».
  • 17. …and the Seatbelt. • Even if it is a constraint, you are better off putting your seatbelt on in case something happens. • Password Managers are not perfect, but like a seatbelt it is better using than not doing anything.
  • 19. • Dashlane secures your data locally to your device using advanced encryption. Dashlane never sees your data. • Users maintain ownership and local control of their data. • Decentralized by design. • Independent from BigTechs Giving control to users Universality PrivacySimplicity
  • 20. Looking at the future • Emergence of Standardized Identity Protocols • Apple and Google providing proprietary solutions • WebAuthn promoted by W3C for the web • Decentralized identity systems • Self-sovereign identity, • Blockchain decentralized user-controlled identity, unproven yet • Digital Identity Providers: third-party solutions that help users manage digital identity.
  • 21. “ Convenience decides everything ” –Ev Williams ThePower of Convenience
  • 23. Questions Start brushing your teeth and try Dashlane Get 6 months premium with the code SPARKTHECHANGE

Editor's Notes

  • #3: A friend of mine was shopping at the Galeries Lafayette, one of the biggest department stores in Paris. After a while, she realized she could not find her bag anymore. She thought she had forgotten it in one of the corner shops but soon realized that it had been stolen. She was very upset. She went to the police to declare the theft before going home. 1 hour later, she got a phone call at home from the Galeries Lafayette. Her bag had been found, dumped in a corner. She could retrieve it from Lost and Founds the next morning between 10 and 12. What a relief! When she arrived the next day at the Galeries, the agent at the Lost & Found was very surprised, since the bag was not there and they had never called her. In the meantime, someone had broken into her home and totally emptied it.
  • #4: Now let me tell you another story. In 2016, Dropbox discovered a hack that took place in 2012. 68 million accounts were stolen. The investigation showed that the hacker had used an employee login and password that were themselves stolen in a previous breach. The employee had used the same password between work and personal websites. Those 2 examples are parallel in the physical and digital world. A small and painful incident can become an even bigger nightmare if you are not careful.
  • #5: This is only getting worse on the Internet. That’s just in the past 18 months: Cambridge Analytica, Equifax breach, Facebook being fined, and many more. Digital Identity is basically Broken!
  • #6: There are billions of users and millions of businesses that rely on the Internet today to access and transact with millions of digital service providers.
  • #7: More and more users move their data to the Cloud, and by doing so, they each time provide a small subset of their digital identity. It is as if you had spread around hundreds of copies of your id card, or your credit card, or even your social security card. Your digital footprint is all over the place. The way Identity is built on the Internet is just plain wrong.
  • #8: In its current state, it is bad for users: you get the constant friction each time you need to register, login, checkout. As a user, you have no idea what data is actually being captured, because on top of personal data you willingly provide, service providers will grab many more details about you: your geographical location, your device type, your browsing history,… Obviously many businesses rely on monetizing that data, either directly for advertisement, profiling, etc. or indirectly. And this becomes uncontrollable since hundreds of copies of your digital identity are scattered across the cloud. But it is actually bad for digital service providers as well. The friction of the sign-up funnels is a key business issue. Regulations is creating increasing risks and liabilities on those providers, think GDPR. Consumers are becoming more and more wary of providers. They feel the Internet has become a dangerous place.
  • #9: Unfortunately, the problem is getting worse for everybody. Not better. People are using more devices than ever, on average 3 or more. We have more digital accounts every year. The number of massive breaches is not stopping: every day the news are filled with more providers being hacked and user data having leaked.
  • #10: Despite that situation, if you look at what users do, most of them resort to crude methods to handle their digital identity. Only 12% use tools such as password management. 86% just memorize simple passwords and reuse them everywhere. 49% write them down on paper. Very few of them really take action. We have kind of given up and accepted that this is the way things are and we support the risk and the burden.
  • #11: Digital Identity was never part of the foundations of the Internet. In the view of the Army with Arpanet or the Academics, this was a trusted network. The technical building blocks (HTML, CSS, JavaScript) did not include a standardized solution to authenticate and handle identity components online. If you look at the evolution of web technology, identity is not part of it.
  • #12: The Internet boomed and it was then too late. Estimates talk about 50 billion connected devices in 2020, all of which will have to handle some form of identity or authentication.
  • #13: Truth is it is a hard problem to solve. Digital Identity should be universal. It should be agnostic of any provider and work cross-platform. Same as you can use your passport to travel to any country in the world, you should have a digital equivalent. But the Internet is completely fragmented. Big Tech Giants, the Apple and Google of the world, cannot solve it on their own. They are focused on protecting their own wall-garden, their little territory, not fixing the broader issue.
  • #14: Biometry was considered as a potential savior, but: 1. biometric systems can be faked. 2. once your biometric data is compromised, what do you do 3. Biometry is a device-specific solution. No standard or shared protocol has emerged. 4. Also it only solves for a small portion of use cases around authentication
  • #15: Another hope was that mechanisms such as Facebook Connect or Login with Google would solve the problem. It is definitely a progress for the convenience of users. But using those solutions imply that you trust Big Techs by putting all your eggs in the same basket. Recent breaches around Facebook Connect have shown the limits of a centralized identity model. The size of the target by centralizing the digital identity of millions and millions of users makes it only a question of time before they get massively breached.
  • #16: A few of my own passwords were leaked in the past, in the 2012 Dropbox breach or in the Linkedin breach. Fortunately for me, at the time I had started paying attention to my credential hygiene. I had begun using Dashlane as a password manage. With a Password Manager, I was able to easily generate unique passwords for all my online services. Today I have more than 1000 unique passwords. I don’t know any of them. I just remember my Master Password for Dashlane. That limits the potential impact of those breaches for me. I just need to update the breached password. I still get email scams threatening me because they know one of my old passwords, but I just ignore them.
  • #17: I see the mission of Password Managers very much like that of a dentist. Nobody likes to go to the dentist and brush their teeth every day. Yet this is the best solution to avoid cavities. Dentists show you how to use a toothbrush then it is up to you to have the discipline.
  • #18: Another metaphor I like to use is the car seat belt. Nobody today would think of not putting on a seat belt when driving on the highway. Why shouldn’t we do the same on the digital highway of the Internet? It is better to be safe than sorry, even if it costs us a little.
  • #19: The problem is that users do not care. They hear of so many breaches all the time, that like for Climate Change news, most of them have stopped paying attention and feel they are not concerned. Behavioural change is hard. There are less than 2% of electrical vehicle despite the awareness of the climate critical situation.
  • #20: There is also skepticism, about the fact that password managers are another cloud solution, that could be hacked like any others. In reality, we have built Dashlane such that you remain in total control of your data. Everything happens on your device, where your data is being encrypted, and the key, what we call the Master Password, is known only to you. This zero-knowledge architecture ensures that you are safe as a user, and that Dashlane as a company is never at risk. Our solution is decentralized by design and is not dependent on any ecosystem. We work on all platforms in a universal way. It is important to be independent from the Big Tech. We want to be the Switzerland of Digital Identity. You may have heard of the recent Siri revelations, where Apple confessed on spying Siri conversations for years. Microsoft did the same on Xbox audio chats.
  • #21: How does the future look like? There are 3 main trends in the market today. The emergence of standardized identity protocols. Apple and Google have created their own proprietary solutions in their ecosystem, which already covers most of the mobile world. The W3C is promoting standards like WebAuthn for the web. But we are a long way away from universal solutions. Companies are prototyping with decentralized identity systems. There are concepts like self-sovereign identity, the concept that an individual should own and control their identity without the intervening administrative authorities. Developers also play with Blockchain technology around digital identity. Finally, some third-party solutions like password managers and enterprise SSO solutions try to become “digital identity providers” but this is as of today still a niche market. None of them are perfect. None are universal. https://techcrunch.com/2019/08/22/who-gets-to-own-your-digital-identity/ Appearance of decentralized identity systems: Decentralized Identity Foundation based on Decentralized Identities (DIDs) Concept of Self-Sovereign Identity Blockchain-based identity mechanisms, such as https://www.uport.me/or https://selfkey.org/
  • #22: Technical solutions won’t be enough to repair a broken Digital Identity. We need simpler, easy-to-use solutions that can be adopted by all. In today’s optimized life, security and tech cannot be the only trigger. As Ev Williams, founder of Twitter or Medium, says: “Convenience decides everything”.
  • #23: Our individual efforts can make a collective impact. You can all start by taking baby steps and start using existing tools. I obviously use Dashlane, as a Password Manager. I started using a safer Browser like Brave, that is better for privacy. I decided to delete my Facebook account. I am even currently moving away from Gmail, and using Fastmail, an independent email provider. I am regaining control of my digital identity. Take a step yourself, to improve the management and control of your digital identity, and help us fix and make the Internet a safer place.   If I may use a provocative parallel, it is by running massive campaigns of vaccination, that mankind was able to get rid of diseases, such as smallpox.
  • #24: It is time to start brushing your teeth by trying Dashlane. Thank you.