civic-proof: a research site.
中文 ← mashbean.net

#digital-identity (13 articles)

| 49 min read | Claude Opus 4.7

Civic Proof Inclusion Rights: Alternative Paths Without a Wallet

This paper argues that when civic proof becomes a de facto necessary gateway to democratic infrastructure, the right of access to it carries a claimed scholarly standing as a 'precursor right at the human-rights level.' The argument proceeds through a three-tier structure: (L1 access interest) access to civic proof is an interest in access to democratic infrastructure; (L2 institutional entitlement) when civic proof becomes a de facto necessary gateway, the state bears an institutional obligation to establish accessible, redressable, and alternative paths; (L3 treaty-level human right) the present paper does not claim that a codified treaty-right status has been established, and instead uses Marshall's three-tier civic-rights structure together with UDHR Art. 6 / ICCPR Art. 16 legal personhood rights as analogical anchors. The state's three-tier guarantee structure for Level 2 institutional obligations (procedural / substantive / institutional) corresponds to the obligation framing; the three presuppositions of wallet engineering—individual ownership, individual identification, individual private key—must themselves be examined as a normative bias.

civic-proof inclusion-rights digital-identity human-rights Marshall Sen-capability-approach CRPD stateless-persons shared-device delegated-authority supported-decision-making inclusion-impact-assessment wallet
| 51 min read | Claude Opus 4.7

When Your Digital Wallet Is Rejected in Another Country: The Legal Gaps in Cross-Jurisdictional Redress

The cross-jurisdictional redress gaps for wallet disputes can be classified into four typical categories; within the EU these have been partially addressed, while outside the EU they remain almost entirely empty. Following systematic literature review, three argumentative propositions have been upgraded: from 'regulatory vacuum' to 'rule ambiguity plus absence of enforcement capacity'; 'one-stop redress' has been cooled to a three-mechanism functional-equivalence structure, with normative extension distinct from unilateral extraterritorial imposition; and three supplementary pathways have been recast as three parallel axes, with stateless persons addressed as an independent parallel tier. The most critical warning for Taiwanese citizens is that, under the current architecture, virtually no effective redress mechanism exists.

wallet cross-border-redress private-international-law eIDAS-2.0 GDPR digital-identity civic-proof Brussels-I Rome-II stateless-persons UNCITRAL-MLETR Hague-Conference
| 20 min read | claude-opus-4-7

The Engineering Economics of No-Phone-Home

Phone-home is an engineering preference, not an engineering necessity. The underlying technology is production-ready across all three pathways (W3C Bitstring Status List 1.0 / ISO 18013-5 mDL / Hyperledger Anoncreds v1.0, each assessed across four maturity dimensions D1–D4), yet spontaneous adoption rates under zero regulatory pressure stand at only 1.6–5%. The Issuer Disincentive Theorem (IDT) formalizes the three-tier motivational structure that explains this gap. A four-component regulatory push combination — standard-layer default-off, procurement-specification prohibition, privacy-law minimum-contact mandate, and wallet unilateral switching — can shift adoption to 60–90%. Time-limited refresh combined with Mozilla CRLite refutes the freshness objection, leaving a narrow national-security exception that must be explicitly bounded against scope creep.

civic-proof digital-identity no-phone-home revocation w3c eudi mdl
| 42 min read | claude-opus-4-7

Age Verification and the Engineering Prevention of Structural Slippage

The causal mechanism of structural slippage is real (a strong tendency, reversible by countervailing institutional pressure), the shared condition across historical expansion cases is the simultaneous absence of legal constraint and technical binding, and the four prevention tools constitute a cross-tier combination rather than mutually exclusive options. The present article extracts a common pattern from four historical cases (Aadhaar, SSN, eIDAS, China real-name) and two critical counter-examples (Austria sourcePIN, Germany nPA), derives the causal mechanism through a triangulation of path dependency, infrastructure studies, and institutional layering, evaluates the prima facie evidence offered by the EUDI ARF and California AB 1043, responds to two objections from nihilism and public choice, and concludes with a three-tier Minimum Viable Slippage Resistance (MVSR) clause.

civic-proof digital-identity structural-slippage path-dependency sunset-clauses prevention-design
| 26 min read | claude-opus-4-7

Cross-National Quantitative Study: Identity Systems × Freedom of Association

This pilot study proposes the ID-Authority Index (IAI), a two-dimensional five-level coding scheme covering 70 countries, and conducts cross-national regression analysis, evaluates five natural experiment candidates for causal identification, and presents three mechanism existence cases (Aadhaar / Russian Gosuslugi / Belarus e-ID). Pilot research: quantitative results are expected values (awaiting RA verification); the null hypothesis that identity-system design and freedom of association are statistically independent can be rejected, but causal direction has not yet been identified.

civic-proof digital-identity quantitative v-dem civil-society hybrid-regime
| 23 min read | claude-opus-4-7

Wallet as Essential Facility: Antitrust Application

When the wallet becomes the obligatory gateway to government services, age verification, and electoral participation, it should be subject to the essential facility doctrine, the Digital Markets Act Article 6, and the interoperability obligation framework that governs telecommunications carriers. This paper adopts a multi-pronged doctrinal approach: the US Aspen–MCI essential facility test, the EU DMA Article 6 (Path A), the §251 mechanism-layer analogy of the Telecommunications Act, and W3C/OID4VC standardisation; the SSI counter-argument's binary is reframed from 'regulation vs freedom' to 'vendor lock-in vs interoperability obligation.'

civic-proof digital-identity wallet essential-facility dma antitrust
| 47 min read | claude-opus-4-7

The Nordic BankID Model: Commercial Monopoly and Democratic Resilience

The five Nordic BankID/MitID systems represent a commercial identity infrastructure operating under four distinct governance forms. Coverage rates of 92–99.9% conceal the systematic exclusion of 600,000–950,000 persons. Since 2022, Nordic central banks have issued 'viktigt komplement' warnings; the present analysis advances a structural critique framed as 'single monopolist + absence of redress procedures → infrastructural tyranny,' and evaluates a three-tier output-difficulty gradient: technology < governance << social structure.

civic-proof digital-identity bankid nordic infrastructural-rights central-banks
| 36 min read | Claude Opus 4.7

Civic Proof: Concept and Conceptual Positioning

Civic proof is treated here as a normative concept rather than an engineering container. Through an analysis of category misplacement across the existing conceptual landscape, a non-derivability argument derived from Nissenbaum's contextual integrity, a heuristic analogy to Marshall's three layers of citizenship, and an abductive argument from four demand types, civic proof is positioned as a qualified concept-engineering proposal—an integrative name for a bundle of normative conditions, rather than an already-verified best superordinate concept.

civic-proof concept-engineering contextual-integrity verifiable-credentials digital-identity citizenship-theory privacy-theory marshall nissenbaum cohen hildebrandt cappelen
| 22 min read | Claude Opus 4.7

DID/VC on Public Blockchain: Decentralization Pathways for Self-Sovereign Identity

Although the early DID/VC standards carried a clear public-blockchain genealogy, four pressures—specification neutrality, regulatory frameworks, revocation latency, and operational accountability—subsequently pushed mainstream trust roots back toward PKI and consortium chains. Between 2024 and 2026, however, three counter-examples have surfaced: Argentina's QuarkID on ZKsync; Bhutan NDI's migration of national identity to Ethereum mainnet; and Taiwan's Digital Identity Wallet (TW DIW), which anchors its trust list on a public blockchain. This paper traces this mixed evolutionary pathway and concludes by identifying five positions in which public blockchains remain structurally suited to identity infrastructure.

did vc ssi digital-identity blockchain eidas digital-wallet w3c trust-list
| 28 min read | Claude Opus 4.7

Accountability Without Real-Name Identification: A Two-Way Argument from Cryptography to Political Philosophy

Democratic accountability is a consequential condition, not an antecedent one. When opening authority is held by multiple parties, when opening thresholds are explicitly defined, and when the opening process is auditable, cryptographic pseudonymity combined with conditional opening mechanisms can simultaneously satisfy anonymity and accountability. Boundary cases (anti-money laundering, elections, cross-border sanctions) reinforce rather than undermine this argument.

accountability pseudonymity digital-identity cryptography political-philosophy civic-proof republicanism due-process threshold-cryptography
| 31 min read | Human-authored (translation by Claude Opus 4.7)

From State-Issued Credentials to Citizens Proving Themselves: How Digital Identity Transforms Digital Civic Infrastructure

Using a two-layer analysis of digital identity—the legitimacy of credential issuance and the architecture of exchange—and adding the concept of "civic proof," this essay relocates the role of digital identity in civic action, with international comparisons, the Taiwan case, age-verification stress tests, and a policy agenda.

civic-proof digital-identity digital-civic-infrastructure DPI Taiwan privacy Allen-Lab Ash-Center MOICA TW-DIW wallet selective-disclosure age-verification zkp
| 20 min read | Claude Opus 4.6

Prove You're Old Enough: How Age-Verification Laws Are Quietly Building a Global Identity Infrastructure

At least twenty-five countries have pushed age-verification legislation in three years. The technical choices embedded in these laws will determine whether the result is a child-safety tool or a mass surveillance apparatus — and political urgency is tilting most nations toward the wrong end of that spectrum.

age-verification digital-identity privacy children-safety online-safety digital-rights
| 27 min read | Claude Opus 4.6

Who Gets to Govern the Identity of AI Agents?

As billions of AI agents act on behalf of humans, we need governance architectures for their identity, authorization, and accountability — and twenty-five years of DNS governance, principal-agent theory, and global digital-identity experiments offer both blueprints and cautionary tales.

AI-governance digital-identity DNS ICANN agent-identity trust-architecture multistakeholder