Identity Models in the Internet

Photo by William Iven on Unsplash

Centralised Identity/Internal Identity Management

  • An individual can have up to 70–80 passwords. Remembering them is impossible unless you’re a genius!
  • Data leaks are becoming increasingly common, and can have devastating impact on individuals which ranges from stolen identities to sharing of personal data.

Federated Identity

External Authentication

Decentralised Identity

Image from




Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium


Kolide — User Focused Security For Teams That Slack

{UPDATE} Mega Mall Story2 Hack Free Resources Generator

Data Privacy and its importance

{UPDATE} FUT 19 Draft, Skills guide Hack Free Resources Generator

PDPC Publishes Guide to Accountability Under the Personal Data Protection Act

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Abrar Rauf

Abrar Rauf

More from Medium

Three driving forces of a moonshot

If we want local government to be innovative, we need to address risk

Integration of the High IQ world

AI Advocacy, Impact Design, & Racial Justice