Digital identity

A digital identity is information on an entity used by computer systems to represent an external agent. That agent may be a person, organization, application, or device. ISO/IEC 24760-1 defines identity as "set of attributes related to an entity".[1]

The information contained in a digital identity allows for assessment and authentication of a user interacting with a business system on the web, without the involvement of human operators. Digital identities allow our access to computers and the services they provide to be automated, and make it possible for computers to mediate relationships.

The term "digital identity" also denotes certain aspects of civil and personal identity that have resulted from the widespread use of identity information to represent people in an acceptable and trusted digital format in computer systems.

Digital identity is now often used in ways that require data about persons stored in computer systems to be linked to their civil, or national, identities. Furthermore, the use of digital identities are now so widespread that many discussions refer to "digital identity" as the entire collection of information generated by a person’s online activity. This includes usernames and passwords, online search activities, birth date, social security, and purchasing history.[2] Especially where that information is publicly available and not anonymized, and can be used by others to discover that person's civil identity. In this wider sense, a digital identity is a version, or facet, of a person's social identity. This may also be referred to as an online identity.[3] With self-sovereign identity (SSI) the user has a means of generating and controlling unique identifiers as well as some facility to store identity data.

The legal and social effects of digital identity are complex and challenging. However, they are simply a consequence of the increasing use of computers, and the need to provide computers with information that can be used to identify external agents.


A critical problem in cyberspace is knowing with whom one is interacting. Using static identifiers such as password and email there are no ways to precisely determine the identity of a person in digital space, because this information can be stolen or used by many individuals acting as one. Digital identity based on dynamic entity relationships captured from behavioral history across multiple websites and mobile apps can verify and authenticate an identity with up to 95 percent accuracy.[4]

By comparing a set of entity relationships between a new event (e.g., login) and past events, a pattern of convergence can verify or authenticate the identity as legitimate where divergence indicates an attempt to mask an identity. Data used for digital identity is generally anonymized using a one-way hash, thereby avoiding privacy concerns. Because it is based on behavioral history, a digital identity is very hard to fake or steal.

Related termsEdit

Subject and entityEdit

A digital identity may also be referred to as a digital subject or digital entity and is the digital representation of a set of claims made by one party about itself or another person, group, thing or concept.[5][6]

Attributes, preferences and traitsEdit

Every digital identity has zero or more identity attributes. Attributes are acquired and contain information about a subject, such as medical history, purchasing behaviour, bank balance, age and so on.[7] Preferences retain a subject's choices such as favourite brand of shoes, preferred currency. Traits are features of the subject that are inherent, such as eye colour, nationality, place of birth. While attributes of a subject can change easily, traits change slowly, if at all. Digital identity also has entity relationships derived from the devices, environment and locations from which an individual transacts on the web.

Rhetorical aspectsEdit

Digital rhetoricEdit

The term digital identity is used in the academic field of digital rhetoric to denote identity as a "rhetorical construction."[8] Digital rhetoric is concerned with how identities are being formed, negotiated, influenced, or challenged in ever-evolving digital environments. Being aware of different rhetorical situations is complex in digital spaces but it is important for effective communication as some scholars argue that individuals’ ability to evaluate rhetorical situations is necessary for constructing an appropriate identity under different rhetorical circumstances.[9][10][11] In addition to that, physical and digital identities cannot be separated and visual affordances shape the representation of physical identity in online spaces.[12] As Bay argues, “what we do online now requires there to be more continuity—or at least fluidity—between our online and off-line selves.”[12] In positioning of digital identity in rhetoric, the scholars pay attention to how issues of race, gender, agency, and power are manifested in digital spaces. Some radical theorists "posited that cyberspace would liberate people from their bodies, blur the lines between human and technology."[13] Other scholars theorized that this ‘‘disembodied’’ communication "could free society from discrimination based on race, sex, gender, sexuality, or class."[14] Even more, the construction of digital identity is also tied to the network. This can be seen from the practices of reputation management companies which work on creating positive identity, so that personal or company's accounts show up higher in various search engines.[8]

Technical aspectsEdit


Digital identities can be issued through digital certificates, which act the same way passports do in the physical world. They contain data which is associated with a user, and are issued with legal guarantees by a recognized certification authority (CA).

Trust, authentication and authorizationEdit

In order to assign a digital representation to an entity, the attributing party must trust that the claim of an attribute (such as name, location, role as an employee, or age) is correct and associated with the person or thing presenting the attribute (see Authentication below). Conversely, the individual claiming an attribute may only grant selective access to its information, e.g. (proving identity in a bar or PayPal authentication for payment at a web site). In this way, digital identity is better understood as a particular viewpoint within a mutually-agreed relationship than as an objective property.


Authentication is a key aspect of trust-based identity attribution, providing a codified assurance of the identity of one entity to another. Authentication methodologies include the presentation of a unique object such as a bank credit card, the provision of confidential information such as a password or the answer to a pre-arranged question, the confirmation of ownership of an e-mail address, and more robust but relatively costly solutions utilizing encryption methodologies. In general, business-to-business authentication prioritises security while user to business authentication tends towards simplicity. Physical authentication techniques such as iris scanning, handprinting, and voiceprinting are currently being developed and in the hope of providing improved protection against identity theft. Those techniques fall into the area of Biometry (biometrics). A combination of static identifiers (username & passwords) along with personal unique attributes (biometrics), would allow for multi factor authentication. This process would yield more creditable authentication, which in nature is much more difficult to be cracked and manipulated.

Whilst technological progress in authentication continues to evolve, these systems do not prevent aliases from being used. The introduction of strong authentication[citation needed] for online payment transactions within the European Union now links a verified person to an account, where such person has been identified in accordance with statutory requirements prior to account being opened. Verifying a person opening an account online typically requires a form of device binding to the credentials being used. This verifies that the device that stands in for a person on the Web is actually the individuals device and not the device of someone simply claiming to be the individual. The concept of reliance authentication makes use of pre-existing accounts, to piggy back further services upon those accounts, providing that the original source is reliable. The concept of reliability comes from various anti-money laundering and counter-terrorism funding legislation in the USA,[15] EU28,[16] Australia,[17] Singapore and New Zealand[18] where second parties may place reliance on the customer due diligence process of the first party, where the first party is say a financial institution. An example of reliance authentication is PayPal's verification method.


Authorization is the determination of any entity that controls resources that the authenticated can access those resources. Authorization depends on authentication, because authorization requires that the critical attribute (i.e., the attribute that determines the authorizer's decision) must be verified.[citation needed] For example, authorization on a credit card gives access to the resources owned by Amazon, e.g., Amazon sends one a product. Authorization of an employee will provide that employee with access to network resources, such as printers, files, or software. For example, a database management system might be designed so as to provide certain specified individuals with the ability to retrieve information from a database but not the ability to change data stored in the database, while giving other individuals the ability to change data.[citation needed]

Consider the person who rents a car and checks into a hotel with a credit card. The car rental and hotel company may request authentication that there is credit enough for an accident, or profligate spending on room service. Thus a card may later be refused when trying to purchase an activity such as a balloon trip. Though there is adequate credit to pay for the rental, the hotel, and the balloon trip, there is an insufficient amount to also cover the authorizations. The actual charges are authorized after leaving the hotel and returning the car, which may be too late for the balloon trip.

Valid online authorization requires analysis of information related to the digital event including device and environmental variables. These are generally derived from the hundreds of entities exchanged between a device and business server to support an event using standard Internet protocols.

Digital identifiersEdit

Digital identity fundamentally requires digital identifiers—strings or tokens that are unique within a given scope (globally or locally within a specific domain, community, directory, application, etc.). Identifiers are the key used by the parties to an identification relationship to agree on the entity being represented. Identifiers may be classified as omnidirectional and unidirectional.[19] Omnidirectional identifiers are intended to be public and easily discoverable, while unidirectional identifiers are intended to be private and used only in the context of a specific identity relationship.

Identifiers may also be classified as resolvable or non-resolvable. Resolvable identifiers, such as a domain name or e-mail address, may be dereferenced into the entity they represent, or some current state data providing relevant attributes of that entity. Non-resolvable identifiers, such as a person's real-world name, or a subject or topic name, can be compared for equivalence but are not otherwise machine-understandable.

There are many different schemes and formats for digital identifiers. The most widely used is Uniform Resource Identifier (URI) and its internationalized version Internationalized Resource Identifier (IRI)—the standard for identifiers on the World Wide Web. OpenID and Light-weight Identity (LID) are two web authentication protocols that use standard HTTP URIs (often called URLs), for example. A Uniform Resource Name (URN) is a persistent, location-independent identifier assigned within the defined namespace.

Digital Object ArchitectureEdit

Digital Object Architecture (DOA)[20] provides a means of managing digital information in a network environment. A digital object has a machine and platform independent structure that allows it to be identified, accessed and protected, as appropriate. A digital object may incorporate not only informational elements, i.e., a digitized version of a paper, movie or sound recording, but also the unique identifier of the digital object and other metadata about the digital object. The metadata may include restrictions on access to digital objects, notices of ownership, and identifiers for licensing agreements, if appropriate.

Handle SystemEdit

The Handle System is a general purpose distributed information system that provides efficient, extensible, and secure identifier and resolution services for use on networks such as the internet. It includes an open set of protocols, a namespace, and a reference implementation of the protocols. The protocols enable a distributed computer system to store identifiers, known as handles, of arbitrary resources and resolve those handles into the information necessary to locate, access, contact, authenticate, or otherwise make use of the resources. This information can be changed as needed to reflect the current state of the identified resource without changing its identifier, thus allowing the name of the item to persist over changes of location and other related state information. The original version of the Handle System technology was developed with support from the Defense Advanced Research Projects Agency (DARPA).

Extensible Resource IdentifiersEdit

A new OASIS standard for abstract, structured identifiers, XRI (Extensible Resource Identifiers), adds new features to URIs and IRIs that are especially useful for digital identity systems. OpenID also supports XRIs, and XRIs are the basis for i-names.

Risk-based authenticationEdit

Risk-based authentication is an application of digital identity whereby multiple entity relationship from the device (e.g., operating system), environment (e.g., DNS Server) and data entered by a user for any given transaction is evaluated for correlation with events from known behaviors for the same identity.[21] Analysis are performed based on quantifiable metrics, such as transaction velocity, locale settings (or attempts to obfuscate), and user-input data (such as ship-to address). Correlation and deviation are mapped to tolerances and scored, then aggregated across multiple entities to compute a transaction risk-score, which assess the risk posed to an organization.

Policy aspectsEdit

There are proponents of treating self-determination and freedom of expression of digital identity as a new human right.[citation needed] Some have speculated that digital identities could become a new form of legal entity.[22]

Taxonomies of identityEdit

Digital identity attributes—or data—exist within the context of ontologies.

The development of digital identity network solutions that can interoperate taxonomically-diverse representations of digital identity is a contemporary challenge. Free-tagging has emerged recently as an effective way of circumventing this challenge (to date, primarily with application to the identity of digital entities such as bookmarks and photos) by effectively flattening identity attributes into a single, unstructured layer. However, the organic integration of the benefits of both structured and fluid approaches to identity attribute management remains elusive.

Networked identityEdit

Identity relationships within a digital network may include multiple identity entities. However, in a decentralised network like the Internet, such extended identity relationships effectively require both (a) the existence of independent trust relationships between each pair of entities in the relationship and (b) a means of reliably integrating the paired relationships into larger relational units. And if identity relationships are to reach beyond the context of a single, federated ontology of identity (see Taxonomies of identity above), identity attributes must somehow be matched across diverse ontologies. The development of network approaches that can embody such integrated "compound" trust relationships is currently a topic of much debate in the blogosphere.

Integrated compound trust relationships allow, for example, entity A to accept an assertion or claim about entity B by entity C. C thus vouches for an aspect of B's identity to A.

A key feature of "compound" trust relationships is the possibility of selective disclosure from one entity to another of locally relevant information. As an illustration of the potential application of selective disclosure, let us suppose a certain Diana wished to book a hire car without disclosing irrelevant personal information (utilising a notional digital identity network that supports compound trust relationships). As an adult, UK resident with a current driving license, Diana might have the UK's Driver and Vehicle Licensing Agency vouch for her driving qualification, age and nationality to a car-rental company without having her name or contact details disclosed. Similarly, Diana's bank might assert just her banking details to the rental company. Selective disclosure allows for appropriate privacy of information within a network of identity relationships.

A classic form of networked digital identity based on international standards is the "White Pages".

An electronic white pages links various devices, like computers and telephones, to an individual or organization. Various attributes such as X.509v3 digital certificates for secure cryptographic communications are captured under a schema, and published in an LDAP or X.500 directory. Changes to the LDAP standard are managed by working groups in the IETF, and changes in X.500 are managed by the ISO. The ITU did significant analysis of gaps in digital identity interoperability via the FGidm, focus group on identity management.

Implementations of X.500[2005] and LDAPv3 have occurred worldwide but are primarily located in major data centers with administrative policy boundaries regarding sharing of personal information. Since combined X.500 [2005] and LDAPv3 directories can hold millions of unique objects for rapid access, it is expected to play a continued role for large scale secure identity access services. LDAPv3 can act as a lightweight standalone server, or in the original design as a TCP-IP based Lightweight Directory Access Protocol compatible with making queries to a X.500 mesh of servers which can run the native OSI protocol.

This will be done by scaling individual servers into larger groupings that represent defined "administrative domains", (such as the country level digital object) which can add value not present in the original "White Pages" that was used to look up phone numbers and email addresses, largely now available through non-authoritative search engines.

The ability to leverage and extend a networked digital identity is made more practicable by the expression of the level of trust associated with the given identity through a common Identity Assurance Framework.

Security issues and privacyEdit

Several writers have pointed out the tension between ubiquitous services that consume digital identity on the one hand and privacy on the other.[23][24][25][26][27]

If services gather and store data linked to a digital identity, and if that digital identity can be linked to a user's real identity, then services can learn a great deal about individuals by recording and sharing data. GDPR is one attempt to address this concern using regulation.

Many systems provide privacy-related mitigations when analyzing data linked to digital identities. One common mitigation is data anonymization, such as hashing user identifiers with a cryptographic hash function. Another popular technique is adding statistical noise to a data set to reduce identifiability, such as with differential privacy.

While a digital identity allows consumers to transact from anywhere and more easily manage various ID cards, it also poses a potential single point of compromise that malicious hackers can use to steal all of that personal information.[28]

Legal issuesEdit

Clare Sullivan presents the grounds for digital identity as an emerging legal concept.[29] The UK's Identity Cards Act 2006 confirms Sullivan's argument and unfolds the new legal concept involving database identity and transaction identity. Database identity refers to the collection of data that is registered about an individual within the databases of the scheme and transaction identity is a set of information that defines the individual's identity for transactional purposes. Although there is reliance on the verification of identity, none of the processes used are entirely trustworthy. The consequences of digital identity abuse and fraud are potentially serious, since in possible implications the person is held legally responsible.[29]

Business aspectsEdit

Corporations have begun to recognize the potential of the internet to tailor their online presence to each individual customer. Purchase suggestions, personalised adverts and other tailored marketing strategies are a great success to businesses. Such tailoring however, depends on the ability to connect attributes and preferences to the identity of the visitor.[30] For technology to enable direct value transfer of rights and non-bearer assets, human agency must be conveyed, including the authorization, authentication and identification of the buyer and/or seller, as well as “proof of life,” without a third party.[31]

National digital identity systemsEdit

Variance by jurisdictionEdit

While many facets of digital identity are universal owing in part to the ubiquity of the Internet, some regional variations exist due to specific laws, practices and government services that are in place. For example, digital identity in Australia can utilize services that validate driving licences, passports and other physical documents online to help improve the quality of a digital identity, also strict policies against money laundering mean that some services, such as money transfers need a stricter level of validation of digital identity.

Digital identity in the national sense can mean a combination of single sign on, and/or validation of assertions by trusted authorities (generally the government).

European UnionEdit

On June 3, 2021, the European Commission proposed a framework for a European Digital Identity. It is planned to be available to citizens, residents, and business within the EU. While it should be suitable for online and offline private and public services, it can be used by participants for personal identification or to provide confirmation about specific personal information. Benefits included are the EU wide recognition of every digital identity card, a secure way on how to control the amount of data and information the user wants to share with the services as well as the simple operation via digital wallets using several mobile devices. [32] [33]


In Australia, MyGov/MyGovID and Australia Post DigitaliD provide a means of single sign on. MyGov currently only supports government agencies, whereas Australia Post's DigitaliD solution supports private institutions.


China's Resident Identity Card cross referencing to other services (banking, Internet service providers etc] acts as a pseudo Digital Identity system.


Estonia's Identity Card is a sophisticate digital ID system that can be used by governments and some third parties for authentication.


In India, Aadhaar card is used as a digital ID service, mainly for government institutions.


Italy's SPID can be used as a digital ID for public and private institutions, and rates as the most extensive national digital ID at this time (2021).


Monaco citizens and residents can get a digital ID for public institutions and access of telecom or electricity services since June 2021.


Singapore's SingPass is being extended to National Digital Identity (NDI), for government services, though the intent is to extend it to private institutions. The corporate login version is called CorpPass.

United KingdomEdit

The UK's GOV.UK Verify allows only a few third parties to validate assertions.

United StatesEdit

While no ubiquitous digital identity service exists, US Social Security numbers act as a national identity number and can be validated by authorised private institutions using the government's Social Security Number Validation Service (SSNVS).


There is an online ID card available in Germany. The user can identify himself securely on the internet, at vending machines or several citizen terminals. Thereby business and authority matters can be easily worked out electronically to save time, cost and money.[34] In the framework of a competition called "Schaufenster Sichere Digitale Identitäten", the German Federal Ministry of economy and energy created a project, called "IDunion". This project was launched on April 1st 2021 and aims to create the opportunity for inhabitants to get easier access to education, mobility, e-government, industry, health care and much more.[35]


Ukraine has introduced online ID cards in April 2020 and is going to equate them to the paper documents. Ukrainian citizens will be able to use an app called Diia for identification purposes. [36] Ukraine plans to fully legalize the use of online ID documents on August 23, 2021, and every user will be able to choose whether to use the paper documents or digital ones as for authorities will not be able to demand paper documents from citizens if they have digital ones. Digital identity can be used not only for provision of public and government services but also to receive deliveries, confirm age in supermarkets and open new bank accounts. [37]

Digital deathEdit

Digital death refers to a phenomenon of people having accounts in Internet even after their death. Digital death is concerned with several ethical issues of how the information stored by the deceased person may be used or stored or given to the family members. It also may result in confusion as social media have automated features such as birthday reminders, and uncertainty of the willingness of the deceased person to pass their personal information to the third party. Majority of social media don't have a clear legislation regarding the digital death. Right now there are many companies that have a service of securing digital identities after death, or passing it to the family legally.[38]

See alsoEdit


  1. ^ Rannenberg, K. (2011). "ISO/IEC 24760-1: A framework for identity management - Part 1: Terminology and concepts". ISO. Retrieved 2015-12-05.
  2. ^ "What is a Digital Identity? - Definition from Techopedia". Retrieved 2016-10-01.
  3. ^ Global, IndraStra. "Digital Identity – A Gateway to All Other Use Cases". IndraStra. ISSN 2381-3652.
  4. ^ Stachl, Clemens; Au, Quay; Schoedel, Ramona; Gosling, Samuel D.; Harari, Gabriella M.; Buschek, Daniel; Völkel, Sarah Theres; Schuwerk, Tobias; Oldemeier, Michelle; Ullmann, Theresa; Hussmann, Heinrich (2020-07-28). "Predicting personality from patterns of behavior collected with smartphones". Proceedings of the National Academy of Sciences. 117 (30): 17680–17687. doi:10.1073/pnas.1920484117. ISSN 0027-8424. PMC 7395458. PMID 32665436.
  5. ^ "Digital Identity - Eclipsepedia".
  6. ^ Deh, Dragana; Glođović, Danica (2018-09-05). "The Construction of Identity in Digital Space". AM Journal of Art and Media Studies (16): 101. doi:10.25038/am.v0i16.257. ISSN 2406-1654.
  7. ^ Windley, Phillip J. (2005). Digital Identity. O'Reilly Media, Inc. pp. 8–9. ISBN 978-0596008789.
  8. ^ a b Eyman, Douglas (2015). Digital Rhetoric: Theory, Method, Practice. University of Michigan Press. p. 78.
  9. ^ Higgins, E. T. (1987). "Self-discrepancy: a theory relating self and affect". Psychological Review. 94 (3): 319–340. doi:10.1037/0033-295X.94.3.319. PMID 3615707.
  10. ^ Goffman, E. (1959). "The moral career of the mental patient". Psychiatry. 22 (2): 123–142. doi:10.1080/00332747.1959.11023166. PMID 13658281.
  11. ^ Stryker, S. & Burke, P. J. (2000). "The past, present, and future of an identity theory". Social Psychology Quarterly. 63 (4): 284–297. doi:10.2307/2695840. JSTOR 2695840.CS1 maint: multiple names: authors list (link)
  12. ^ a b Bay, Jennifer (2010). Body on >body<: Coding subjectivity. In Bradley Dilger and Jeff Rice (Eds.). From A to <A>: Keywords in markup: Minneapolis: University of Minnesota Press. pp. 150–66.
  13. ^ Marwick, Alice (2013). "Online Identity" (PDF). In John Hartley; Jean Burgess; Axel Bruns (eds.). A Companion to New Media Dynamics. 1 (First ed.). Blackwell Publishing Ltd.
  14. ^ Turkle, S. (1995). "Ghosts in the machine". The Sciences. 35 (6): 36–40. doi:10.1002/j.2326-1951.1995.tb03214.x.
  15. ^
  16. ^ "EUR-Lex - 52013PC0045 - EN - EUR-Lex".
  17. ^ "Anti-Money Laundering and Counter-Terrorism Financing Act 2006".
  18. ^ Affairs, The Department of Internal. "AML/CFT Act and Regulations".
  19. ^ Cameron, Kim (May 2005). "The Laws of Identity". Microsoft.
  20. ^ Kahn, Robert; Wilensky, Robert (May 13, 1995). "A Framework for Distributed Digital Object Services". Corporation for National Research Initiatives.
  21. ^ "Forrester".
  22. ^ Sullivan, Clare (2012). "Digital Identity and Mistake". International Journal of Law and Technology. 20 (3): 223–241. doi:10.1093/ijlit/eas015.
  23. ^ Camp, L. Jean (2004). "Digital Identity". IEEE Technology and Society Magazine. IEEE. doi:10.1109/MTAS.2004.1337889.(subscription required)
  24. ^ Beck, Estee N. (2015). "The Invisible Digital Identity: Assemblages in Digital Networks". Computers and Composition. 35: 125–140. doi:10.1016/j.compcom.2015.01.005. ISSN 8755-4615.
  25. ^ Sullivan, Clare (2013). "Digital identity, privacy and the right to identity in the United States of America". Computer Law & Security Review. 29 (4): 348–358. doi:10.1016/j.clsr.2013.05.011. ISSN 0267-3649.
  26. ^ Holt, Jennifer; Malčić, Steven (2015). "The Privacy Ecosystem: Regulating Digital Identity in the United States and European Union". Journal of Information Policy. 5: 155–178. doi:10.5325/jinfopoli.5.2015.0155. JSTOR 10.5325/jinfopoli.5.2015.0155.
  27. ^ Michael, Salmony (March 2018). "Rethinking digital identity". Journal of Payments Strategy & Systems. 12 (1): 40–57. Retrieved 2018-11-08.
  28. ^ November 22, Tina Orem |; PM, 2019 at 12:31. "Digital Identities Abound & Few Understand How They Work". Credit Union Times. Retrieved 2020-02-24.
  29. ^ a b Sullivan, Clare (2010). Digital Identity. The University of Adelaide. doi:10.1017/UPO9780980723007. ISBN 978-0-9807230-0-7.
  30. ^ Ableson, Hal; Lessig, Lawrence (10 September 1998). "Digital Identity in Cyberspace".
  31. ^ Kameir, Christian. "Council Post: Digital Vending Machines And The Question Of Identity". Forbes. Retrieved 2021-01-16.
  32. ^ "European Digital Identity". European Commission - European Commission. Retrieved 2021-06-04.
  33. ^ "Press corner". European Commission - European Commission. Retrieved 2021-06-04.
  34. ^ "Der Online-Ausweis". Bundesministerium des Innern, für Bau und Heimat (in German). Retrieved 2021-05-29.
  35. ^ Ehneß, Susanne. "Die "Digitale Identität" löst den Ausweis ab". (in German). Retrieved 2021-05-29.
  36. ^ "Ukraine makes digital passports legally equivalent to ordinary ones | KyivPost - Ukraine's Global Voice". KyivPost. 2021-03-30. Retrieved 2021-06-01.
  37. ^ Kitsoft. "Cabinet of Ministers of Ukraine - Ministry of Digital Transformation: Ukraine is the first country in the world to fully legalize digital passports in smartphones". Retrieved 2021-06-01.
  38. ^ "What happens to our online identities when we die?". the Guardian. 2019-06-02. Retrieved 2021-06-05.