You do not own your digital identity. Your Google account belongs to Google. Your Facebook profile belongs to Meta. Your credit history belongs to Equifax, Experian, and TransUnion. Your medical records belong to your healthcare provider’s IT vendor. Every digital credential that constitutes “you” in the online world is stored in a database controlled by an organization that is not you, governed by terms of service you did not negotiate, and subject to deletion, modification, or disclosure at the discretion of the controlling party.
Self-sovereign identity is the assertion that this arrangement is not merely inconvenient. It is architecturally wrong. The framework, articulated most comprehensively by Christopher Allen in his 2016 essay “The Path to Self-Sovereign Identity,” proposes that digital identity should follow the same principle as physical identity: it belongs to the individual, is controlled by the individual, and cannot be unilaterally revoked by any institution.
This is not a product pitch. It is a design philosophy that determines every architectural decision in systems that take it seriously, including Stealth Cloud.
The Evolution of Digital Identity
Understanding SSI requires understanding what it replaced. Digital identity has progressed through four models, each representing a different locus of control.
Model 1: Siloed Identity (1990s-2000s)
Each service maintains its own user database. You create a username and password for every site. Your identity at Amazon has no relationship to your identity at eBay. Control is distributed but fragmented. The user manages hundreds of credentials with no interoperability.
Model 2: Federated Identity (2005-2015)
Identity providers (Google, Facebook) centralize authentication. “Sign In With Google” replaces hundreds of passwords with a single account. Control shifts from the user to the identity provider. Convenience increases. Privacy decreases. The identity provider becomes a surveillance intermediary, observing every authentication event across every relying party.
Model 3: User-Centric Identity (2010-2020)
OpenID, OAuth, and similar protocols give users nominal control over what data is shared. Consent screens appear. Scope selections are presented. But the identity data still resides in the provider’s database. The user can consent to sharing, but cannot prevent the provider from storing, analyzing, or disclosing the data. The “user-centric” label is aspirational rather than architectural.
Model 4: Self-Sovereign Identity (2016-present)
The identity data resides with the user. Credentials are issued by authorities but stored in the user’s identity wallet. The user presents credentials to verifiers directly, without involving the issuer. No central database holds the user’s identity. No identity provider mediates access. The user is sovereign over their identity data in the same way they are sovereign over the contents of their physical wallet.
The 10 Principles of Self-Sovereign Identity
Christopher Allen’s framework defines ten principles that an identity system must satisfy to be considered self-sovereign. These principles are not aspirational goals. They are design constraints.
1. Existence
Users must have an independent existence. An SSI system recognizes that the person exists independently of the digital identity. The digital identity is a representation, not a replacement. This principle rejects systems where “you” are defined entirely by your database entry.
2. Control
Users must control their identities. The user decides which credentials to store, which to present, and which to revoke. No entity can unilaterally modify, suspend, or delete the user’s identity. This is the principle that directly contradicts federated identity: Google can suspend your Google account. No one can suspend your self-sovereign identity wallet.
3. Access
Users must have access to their own data. Any claims or data associated with the identity must be accessible to the user. There are no hidden attributes, no secret scores, no opaque algorithms determining identity properties. This contrasts sharply with credit scoring systems, where the data is about you but not fully accessible to you.
4. Transparency
The systems and algorithms governing identity management must be transparent. Open standards, open-source code, and auditable operations. The W3C DID specification and Verifiable Credentials standard are explicit implementations of this principle.
5. Persistence
Identities must be long-lived. A user’s identifier should persist as long as the user wishes, independent of any organization’s continued existence. This is why blockchain-anchored identifiers are favored in SSI: a did:ethr identifier persists as long as the Ethereum network exists, which is determined by a distributed community rather than a corporate entity.
6. Portability
Information and services about identity must be transportable. A user must be able to move their identity credentials between wallets, between devices, and between ecosystems. No vendor lock-in. If your identity wallet provider goes bankrupt, you can export your credentials and import them elsewhere. This requires open data formats, which the W3C standards provide.
7. Interoperability
Identities should be as widely usable as possible. Credentials issued by one entity should be verifiable by any entity, regardless of the technology stack. The Verifiable Credentials Data Model and DID standards enable cross-platform interoperability, though practical interop remains a work in progress.
8. Consent
Users must agree to the use of their identity. Credential presentation must be an active, informed choice. No passive data collection, no background verification without the user’s knowledge. This is where SSI diverges from soulbound tokens as currently implemented: SBTs are publicly readable without the holder’s consent. SSI credentials are presented only with the holder’s explicit authorization.
9. Minimization
Disclosure of claims must be minimized. When a credential is presented, it should reveal the minimum information necessary for the interaction. If a service needs to know you are over 18, the credential presentation should prove you are over 18 without revealing your date of birth, name, or any other field. Zero-knowledge proofs are the technical mechanism for this principle.
10. Protection
The rights of users must be protected. When there is a conflict between the needs of the identity network and the rights of individual users, the network must err on the side of preserving individual freedom. This principle is a philosophical stake in the ground: identity infrastructure serves people, not the other way around.
The SSI Technical Stack
Translating these principles into running code requires a layered technical architecture. The SSI stack has matured significantly since 2016.
Layer 1: Decentralized Identifiers
DIDs provide the addressing layer. Each user has one or more DIDs that serve as their identifier in the SSI ecosystem. DIDs are created without permission from any authority, are cryptographically verifiable, and can be resolved to a DID Document describing the holder’s cryptographic capabilities.
Layer 2: Verifiable Credentials
Verifiable Credentials (VCs) are the claims layer. An issuer (university, employer, government) creates a digitally signed credential asserting facts about the subject. The subject stores the credential in their identity wallet. When needed, the subject presents the credential (or a ZK proof derived from it) to a verifier. The verifier checks the issuer’s signature without contacting the issuer.
Layer 3: Identity Wallets
The identity wallet is the user-facing application that manages DIDs, stores VCs, and generates presentations. It is the SSI equivalent of a crypto wallet, but for credentials instead of tokens. Major implementations include Spruce’s SpruceID, Microsoft’s Authenticator (with Entra Verified ID), and the EU Digital Identity Wallet reference implementation.
The EU Digital Identity Wallet is the most significant development in the SSI wallet space. Under eIDAS 2.0, all EU member states must provide digital identity wallets to their citizens by 2026. The architecture reference framework published by the European Commission describes a wallet that holds government-issued credentials, supports selective disclosure, and works across all EU member states. An estimated 450 million Europeans will have access to SSI-compatible identity wallets within the regulatory timeframe.
Layer 4: Trust Frameworks
The trust layer answers: “Why should I trust this credential?” Verifiable Credentials prove who issued them. Trust frameworks determine whether the issuer is legitimate. Government trust frameworks recognize specific issuers (accredited universities, licensed medical boards). Industry frameworks establish credential standards for specific sectors. Decentralized trust frameworks use reputation and staking mechanisms.
SSI in Practice: Successes and Failures
The SSI ecosystem has produced both genuine adoption and cautionary lessons.
Successes
EU Digital Identity. The eIDAS 2.0 regulation represents the largest commitment to SSI infrastructure ever made. Pilot programs across 26 member states are testing cross-border credential verification for education, healthcare, finance, and government services. The technical architecture is built on W3C standards with selective disclosure capabilities.
COVID-19 credential initiatives. The pandemic accelerated SSI adoption as governments needed verifiable health credentials that respected privacy. The WHO’s Smart Vaccination Certificate framework and the EU Digital COVID Certificate both drew on SSI principles, though implementations varied in their adherence to minimization and user control.
Corporate onboarding. Microsoft’s Entra Verified ID has processed over 100 million credential verifications, primarily for employee onboarding and partner verification. The system uses DIDs and VCs to enable background checks and certification verification without centralized databases of employee PII.
Failures and Lessons
Sovrin Network. The Sovrin Foundation, one of the earliest SSI-dedicated networks, filed for dissolution in 2022 after failing to achieve financial sustainability. The lesson: SSI infrastructure requires sustainable business models, not just technical elegance. The Hyperledger Indy codebase it was built on continues to see enterprise use, but the governance and funding model failed.
Complexity barrier. SSI remains too complex for mainstream consumer adoption. Managing DIDs, understanding credential flows, and operating identity wallets requires technical sophistication that most users do not have. The EU Digital Identity Wallet initiative aims to solve this through government-backed, consumer-grade applications, but the usability gap persists in the broader SSI ecosystem.
Interoperability gaps. Despite W3C standards, credentials issued by one system often cannot be verified by another. DID method interoperability is limited. Credential format variations (JSON-LD vs. JWT vs. CBOR) create compatibility issues. The standards exist; the implementations are fragmented.
SSI and Privacy: The Alignment
SSI’s principles align almost perfectly with privacy infrastructure requirements. The minimization principle demands that interactions reveal only necessary information. The control principle ensures the user decides what to share. The consent principle prohibits passive data collection. These are not privacy features bolted onto an identity system. They are the identity system’s foundational design constraints.
For Stealth Cloud, SSI provides the philosophical framework that justifies the architectural decisions. Zero-persistence architecture is an implementation of the minimization principle: if data is not retained, it cannot be over-disclosed. Zero-knowledge authentication is an implementation of the consent and control principles: the user reveals only that they control a key, nothing more.
The relationship between SSI and wallet-based authentication is direct. A SIWE authentication is an SSI interaction stripped to its minimum viable form. The user presents a single credential (proof of key ownership) to a single verifier (the service). No identity provider mediates. No additional data is disclosed. The interaction satisfies all ten SSI principles by virtue of its simplicity.
The GhostPass Connection
GhostPass is Stealth Cloud’s implementation of SSI principles in a production authentication system. The design choices map directly to Allen’s framework:
Existence: GhostPass recognizes that users exist independently of Stealth Cloud. No account is created. No profile is stored. The user exists. The wallet proves they exist. That is sufficient.
Control: The user controls the wallet, the private key, and the decision to authenticate. Stealth Cloud cannot suspend their “account” because there is no account to suspend.
Minimization: GhostPass reveals a wallet address hash. Not the address itself. Not a name. Not an email. The hash cannot be reversed to derive the address. The minimum possible information is disclosed, and even that information is ephemeral.
Consent: Every authentication requires an explicit wallet signature. No passive session renewal. No background re-authentication. Every interaction with Stealth Cloud is an active, conscious choice.
Protection: When the system must choose between operational convenience and user privacy, Stealth Cloud’s architecture is designed so that the privacy-preserving option is the only option. There is no administrative override. There is no backdoor. The architecture protects the user from the operator.
The Path Forward
SSI is no longer a theoretical framework. It is production infrastructure, deployed at national scale in the EU, integrated into enterprise systems by Microsoft and IBM, and underpinning the authentication layer of thousands of decentralized applications.
The remaining challenges are real but tractable:
Usability. Identity wallets must become as intuitive as password managers. This is a design problem, not a cryptographic one. The underlying protocols are mature. The user interfaces are not.
Key management. The “what if I lose my key?” problem is SSI’s most significant user-facing weakness. Social recovery, multi-sig approaches, and hardware wallet integration provide solutions, but no approach has achieved the simplicity of “click forgot password.”
Governance. Who decides which issuers are trusted? In a federated model, the identity provider decides. In SSI, this question is distributed to trust frameworks, which are still nascent. The EU’s approach (government-backed trust lists) is one model. Decentralized reputation systems are another. Neither has proven definitive.
Economic sustainability. SSI infrastructure needs funding. Credential issuance, wallet development, and standards maintenance require ongoing investment. The EU provides government funding. The enterprise market provides commercial revenue. The open-source, community-driven layer remains underfunded.
Despite these challenges, the trajectory is clear. The question is not whether identity will become self-sovereign. The question is whether the transition will be led by privacy-preserving implementations or by surveillance-compatible ones that adopt SSI terminology while violating SSI principles. The technology is agnostic. The implementation is a choice.
The Stealth Cloud Perspective
Self-sovereign identity is not a product category. It is a design constraint. Every system that stores identity data in a database the user does not control has failed the SSI test, regardless of what consent screens it displays. GhostPass implements SSI not by building an identity wallet, but by building an authentication system that needs no identity at all. The most sovereign identity is the one that no server ever possesses.