Interview: Building Decentralized Identity with DID Standards
A conversation with Dr. Leena Das on decentralized identity (DID), standards work, implementation challenges, and how DID can change onboarding across web3.
Interview: Building Decentralized Identity with DID Standards
Decentralized Identity (DID) promises portable, privacy-preserving identity across apps and blockchains. We spoke with Dr. Leena Das, a lead contributor to DID specifications and implementations, about the standards work, key challenges, and real-world adoption paths.
Q: Can you briefly explain what DIDs are?
Dr. Leena Das:
"A DID is a globally unique identifier controlled by the user. It's resolvable to a DID Document that contains cryptographic material and service endpoints. The key idea is that users control their identifier, and can authenticate or present credentials without a central authority."
Q: How do DIDs differ from traditional identity?
Leena: Traditional identity models rely on centralized providers issuing credentials (e.g., social login, federated identity). DIDs flip that: the user owns identifiers and can present verifiable credentials from various issuers, preserving privacy and portability.
Q: What are the main technical challenges?
Leena: Interoperability is complex — many DID methods implement different on-chain or off-chain resolvers. Another challenge is key recovery: users need practical mechanisms to recover from lost keys without reintroducing centralized recovery points. Finally, UX remains a major hurdle; people expect simple onboarding, and DID flows need to match that experience.
Q: How does privacy fit into DID?
Leena: Privacy is fundamental. DIDs couple with verifiable credentials that can be selective and minimized. Zero-knowledge proofs are emerging as a tool to allow credential verification without revealing unnecessary details, and that's an active area of research and implementation.
Q: Real-world adoption — where is DID gaining traction?
Leena: Wallets and enterprise onboarding are early adopters. Identity for gaming, healthcare, and supply chain traceability are promising verticals. Governments are experimenting with DID pilots for citizen identity, but legal recognition varies by jurisdiction.
Q: How should projects approach DID adoption?
Leena: Start with standards-compliant implementations. Use existing credential schemas where appropriate, prioritize key recovery patterns that don't centralize control, and focus on UX. For consortiums, shared governance around credential schemas helps avoid fragmentation.
Q: Where do you see DID in five years?
Leena: I expect broader adoption in enterprise and consumer apps with better UX. We'll see more composable identity stacks where credentials are portable across ecosystems. I also foresee regulatory frameworks beginning to recognize verifiable credentials for certain KYC-lite use cases.
Closing thoughts
Decentralized identity is a long-term infrastructure project. Standards like DID and verifiable credentials provide a foundation, but real adoption requires an ecosystem of interoperable wallets, credential issuers, and privacy-preserving verification mechanisms. As Dr. Das highlights, progress will come from incremental, standards-aligned deployments that prioritize the user's control and safety.
If you'd like the interview transcript or pointers to open-source DID libraries and sample implementations, we can compile resources and a starter kit for developers and product teams.
Related Reading
- How Beauty Creators Can Use Bluesky's 'Live Now' Badge to Boost Sales
- Age Ratings, Online Features, and Safety Settings: What Parents Need to Know About Indie Games on Steam
- Designing Ceremony Soundscapes with Indie and Emerging Artists (and How to License Them)
- Podcast Launch Kit: Templates Inspired by Ant & Dec’s 'Hanging Out' Move
- Best Robot Vacuums for Homes with Obstacles: Dreame X50 vs Competitors
Related Topics
Unknown
Contributor
Senior editor and content strategist. Writing about technology, design, and the future of digital media. Follow along for deep dives into the industry's moving parts.
Up Next
More stories handpicked for you
After the Reality Labs Cutbacks: Where Investors Should Reposition Metaverse Bets
What Meta’s Workrooms Shutdown Means for Metaverse NFT Custody
Detecting Fake Creator Accounts Used to Mint Deepfake NFTs — A Technical Detection Guide
Preparing Funds for Regulatory Shock: Contingency Plans if Exchanges Withdraw Support for a Bill
How to Build a Decentralized Identity Recovery System That Doesn’t Rely on Email
From Our Network
Trending stories across our publication group