Our solutions are based on the Digital ID Protocol

Digital ID is an internet protocol, initially developed by our co-founder Kaspar Etter, for which Synacts provides a reference implementation. It constitutes an identity layer for the internet and a semantic alternative to the World Wide Web. It allows you to prove your identity towards others and to look up attributes of others in a decentralized manner. Being freely extensible with services, Digital ID aims to supersede proprietary platforms by establishing a framework of open standards. digitalid.net

The Digital ID Protocol allows to build secure, private, and highly user-friendly online services

  • Usability
    No Logins As authentication is part of the protocol, no logins or accounts are required besides your identity
    Global Identity A unique identifier allows the identification of users across organizational boundaries
    Access Control Information can be disclosed to all users with a certain attribute (attribute-based access control) Authorization can be delegated to a group of users by issuing roles (role-based access control)
    Reduced Spam As the senders of messages are authenticated (and certified), spam is a thing of the past
    Automation With smart services, interactions that now require human involvement can be fully automated
    Consistency The adoption of new services is simplified by using the same concepts across many services
    Unified State Instead of managing them separately, attributes and contacts are shared among all services
    Offline Work Thanks to extensive caching and flexible synchronization, you do not always have to be online
    Compatibility Due to standardized services, data can be exchanged across providers and implementations
    Aggregation As all the data is stored semantically, clients can aggregate information in a meaningful way
  • Privacy
    No Intermediaries There is no centralized platform and you can take full control with self-hosting
    Selective Sharing You decide what information you want to disclose with fine-grained access control
    Anonymity Anonymous credentials guarantee a minimal disclosure of personal information like identity
    No Calling Home Once a credential is issued, the host is no longer involved in a client’s communication
    No Wrong Consent Storing the known contacts minimizes the risk of disclosing your identity unintendedly
  • Security
    Confidentiality All communication uses end-to-end encryption
    Integrity All relevant communication is authenticated
    Availability Due to the decentralized architecture, there is no single point of failure
    No Passwords Instead of human-generated passwords, the protocol uses strong cryptographic keys
    No Phishing Authentication is part of protocol and thus never done in an adversarial environment
    Authorization Clients are authorized according to the principle of least privilege to restrict potential misuse
    Revocation In case a client is lost, its authorization can be revoked from any client with more privileges
    Single Logout As no session state is maintained for services, a revocation results in a complete logout
  • Trust & Compliance
    Accountability All actions are cryptographically signed, which ensures liability and non-repudiation
    Authenticity Trusted authorities can confirm the correctness of attributes by issuing certificates
    Data Control If you do not trust any existing hosting provider, you can host your data yourself
    No Framing Digital ID allows to detect any misbehavior (except information leakage) by hosting providers
    Regulations Correct behavior by all parties is enforced by legal contracts and potential sanctions
    Auditing All actions that affect the state of an identity have to be logged and can thus be traced back
    Liability Since all actions are cryptographically signed, everyone can be held liable for their actions
    Modularity Due to their modular design, you are free to use only the services that comply with your rules
    Sovereignty You decide who hosts your data and where the storage facilities are located
    BYOD Employees can use the same apps for private and business use with separated hosting
  • Freedom
    Openness The Digital ID protocol is publicly documented and can be implemented by anyone
    Extensibility Everyone can define new attributes and services that extend the capabilities of the protocol
    Independence Due to standardized access, you are independent from both hosting and software providers