--- robots: noindex, nofollow --- # Revisiting #4: More Than a Digital Shadow - Revising Principle #1 "Existence" *— Article 4 in the "Revisiting the Ten Principles of Self-Sovereign Identity" Series (2025)* (see [Overview](https://hackmd.io/oUIM9j8TTa-wvhBvvO5vZA)) # More Than a Digital Shadow - Revising Principle #1 "Existence - Revisiting the Ten Principles of Self-Sovereign Identity (part four) # Outline ## I. Introduction: Why Revisit "Existence" ? - Principle 1 is the ethical root of SSI: it defines who has standing in a digital identity system. - When misunderstood, it leads to architectures where **personhood is conditional on credentials**, and **dignity is contingent on machine legibility**. - Over the last decade, too many systems have treated visibility as a prerequisite for inclusion — reducing individuals to data shadows. - We must reassert: **existence is not granted by systems**. It is recognized — or violated — by how systems are built. - This rewrite grounds Principle 1 in human dignity, legal precedent, global philosophy, and design accountability. ## II. The Original Principle: What It Meant in 2016 - **Original phrasing:** > “Users must have an independent existence.” — [Path to SSI](https://www.blockchaincommons.com/articles/Path-to-SSI/) - Intended meaning: - Identity must precede any digital or institutional encoding. - Existence must never be dependent on being known, recorded, or verified. - Rooted in resistance to Aadhaar-like systems where lack of a number = denial of service or rights. ## III. What It Became: Misreadings and Misuses ### Technical Misreadings - **IEEE (2020):** > “...to assert her existence in the digital domain.” — [IEEE Paper](https://ieeexplore.ieee.org/document/9277476) - **CSSPS IP1 (2022):** > “...associate individual users’ identities with their unique identifiers.” — [CSSPS](https://ieeexplore.ieee.org/document/9875265) - These statements imply that **being encoded is being real**, rather than one possible interface for already-existing human identities. ### Real-World Exclusion Scenarios - **Worldcoin** requires a retina scan to issue a "proof-of-personhood" token. - **Wallet-only DAOs** deny governance rights to those without cryptographic keys. - **Biometric ID-only aid systems** exclude migrants and refugees lacking “recognized” traits. - **Credential-based logins** replace relationships with schema compliance. - **Schemas that erase** nonbinary, Indigenous, or pseudonymous identities. > These systems **turn existence into compliance**, forcing people to become legible or be left out. ## IV. Global, Philosophical, and Legal Reframing ### From Cartesian to Ubuntu > “I think, therefore I am.” — Descartes > “A person is a person through other persons.” — [Michael Onyebuchi Eze, *Aeon*](https://aeon.co/ideas/descartes-was-wrong-a-person-is-a-person-through-other-persons) - Western frameworks see identity as internally self-contained. Ubuntu sees it as relational and contextual. - SSI must protect **identity that emerges through connection**, not just identity that can be cryptographically asserted. ### Decolonial and Social Justice Anchors > “Being excluded from the registry is tantamount to being denied existence.” — [Ruha Benjamin](https://www.ruhabenjamin.com/race-after-technology) - Systems that treat digital records as the precondition for humanity repeat the violence of colonial bureaucracies and modern surveillance capitalism. ### Legal Foundation for Pre-System Personhood - **UDHR Article 6:** > “Everyone has the right to recognition everywhere as a person before the law.” - **ICCPR Article 16:** > “Everyone shall have the right to recognition as a person before the law.” - These provisions affirm that **legal and moral standing must be unconditional** — even if digital systems cannot yet "see" the person. ## V. Rewriting Principle 1: A 2025 Version ### Flawed Interpretations: | Source | Misreading | |---------------|---------------------------------------------------------------| | IEEE (2020) | Existence = encoding characteristics in the digital domain | | CSSPS IP1 | Existence = mapped to public identifiers | | Web3 patterns | Existence = key/wallet control, proof-of-humanity | ### Rewritten Principle: > **Existence** > Every person has an identity that exists before and beyond any digital system. > > Digital identity systems must recognize and respect this pre-digital personhood. They must not require public visibility, database registration, or formal identifiers to validate someone's right to exist, act, or relate. > > A self-sovereign system must affirm dignity, not demand disclosure. > It must honor the right to be pseudonymous, private, plural, and even offline. ## VI. Design and Governance Implications ### Privacy-by-Existence - Systems must enable: - Pseudonymous, unregistered access to services - Voluntary and revocable visibility - Analog fallback paths and social claims - Narratives over numbers — relationships over registries ### Challenge the Legibility Fallacy > *To be unreadable to a machine is not to be unreal.* - Design for: - Intermittent presence - Plural self-representation - Emergent reputation — not predefined identity schemas ### Encoding is Not Ontology - Interoperability is about *format alignment*, not *identity definition*. - Encoding is a **tool for systems**, not **a condition for existence**. - Use privacy-preserving tech (ZKPs, blinded credentials) to **enable participation without forced visibility**. ### Dignity-by-Design Checklist | Audit Question | Yes / No | |----------------|----------| | Can users participate without generating a DID or wallet? | | | Are pseudonymous or partial interactions fully supported? | | | Are any services gated behind mandatory credentialing? | | | Is registration a requirement before relationship? | | | Are off-chain, analog, or informal identities accepted? | | | Is there clear support for plural and non-normative identity schemas? | | > Failing any of these means **the system risks encoding exclusion**. ### AI and Synthetic Identity Boundary - Principle 1 applies only to **natural persons**. - AI agents can act, but cannot be excluded in a way that violates dignity. - **Do not conflate programmability with personhood.** > An agent can interact. Only a person can be erased. ## VII. Integration with Other Principles - **Control (P2):** Requires a subject with innate standing. - **Consent (P4):** Depends on presence not contingent on registration. - **Access (P5):** Must be available without encoding. - **Cognitive Liberty (Article 2):** Tied to identity that exists even without system awareness. ## VIII. Conclusion: Being Before Encoding - Principle 1 isn’t just the first — it’s the root. - It reminds us that no system, however decentralized or cryptographic, should **replace personhood with profile data**. - In a decade where biometric proofs, key-based voting, and synthetic agents proliferate, we must preserve a space for **the quiet, the undocumented, the plural, the private**. > “Digital identity must never be a precondition for dignity. Systems must bow to the person, not the other way around.” > — [AKASHA Forum](https://forum.akasha.org/t/generative-identity-beyond-self-sovereignty/90) ## IX. Appendix: Interpretive Timeline for Principle 1 | Interpretation | Summary | Risk | |----------------------|--------------------------------------------------------|------------------------------------------------| | Original (2016) | Every person has identity, independent of systems | Too minimal — left room for misinterpretation | | IEEE (2020) | Identity = encoded digital characteristics | Legibility replaces dignity | | CSSPS IP1 (2022) | Existence = linked to identifiers | Reduces existence to compliance | | Revised (2025) | Identity precedes systems; must be protected from coercive visibility | Upholds personhood, plurality, and privacy |