UIID v1 Deep Dive: The Starting Gun for Web 4 and True Digital Sovereignty

Posted on October 24, 2025

UIID v1 Deep Dive: The Starting Gun for Web 4 and True Digital Sovereignty

The digital identity space has just witnessed a foundational shift with the **UIID v1 stable release**, which its developers boldly claim is the **"starting gun for Web 4"** [00:00:06]. For too long, digital identity has been a trade-off between security and convenience, with large corporations holding all the cards [00:00:35]. UIID flips that script, offering a decentralized identity protocol built on DIDs where the user, not the platform, holds the keys, delivering on the promise of true **digital sovereignty** [00:01:02].

This architecture focuses on **mandated separation** to ensure security without sacrificing usability. Understanding this layered approach is key to grasping UIID's power.

Dual Identity Architecture: Core ID vs. Alias ID

The Core ID: The Vault

The **Core ID** is your permanent, unchangeable, sovereign digital self—the absolute root [00:01:55]. It is designed for maximum security, primarily serving for **first-party actions** like setting up MFA or managing app permissions [00:02:14]. Its integrity is paramount: any write action to the Core ID, no matter how minor, is incredibly restricted and **mandatorily triggers a Multi-Factor Authentication (MFA) challenge** [00:03:06]. If MFA is not configured, the request simply fails, full stop [00:03:13].

The Alias ID: The Persona

The **Alias ID** is the flexible, practical part. These are context-specific identities—personas you use for day-to-day activities like gaming, shopping, or secure healthcare [00:03:36]. The benefit is crucial: it enforces **data segmentation**. If an alias is breached, the data can't be easily linked back to your Core ID or other aliases, breaking those data trails [00:04:09]. Furthermore, you retain the ultimate **kill switch**: you can instantly and permanently delete an Alias ID, breaking the connection to the service and effectively enacting your right to be forgotten for that specific relationship [00:04:36].


Uncompromising Security: ZKPs and Granular Control

UIID's stability claims are rooted in a radical shift to **pure cryptographic proof**, making **passwordlessness** the default [00:05:44]. The core technologies are **Zero-Knowledge Proofs (ZKPs)** and **WebAuthn** [00:06:01]. This means you prove you possess the secret key (often tied to your device) without the key itself ever crossing the network [00:06:06]. This fundamentally eliminates the risk of stealing password databases, as there is "no central pot of secrets to steal" [00:06:28].

For governance and trust, UIID builds in transparency through audibility. Users have direct access to detailed **audit log endpoints** (`p/v1/audit/core` and `p/v1/audit/alias`) via the API [00:07:54]. Every single access event is logged, turning the user into the auditor, with an immutable record of which app accessed which data, when, and with what **granular permission scope** [00:08:06]. Furthermore, to add "tunable friction," users can optionally protect sensitive Alias IDs with a **PIN**, requiring a second check even after initial ZKP login [00:13:10]–[00:13:36].

A Foundation for Web 4 Interoperability

By making identity and authenticated data **portable and user-controlled**, UIID v1 breaks the data silos that define the current Web 2 model [00:16:13]. This foundation of verifiable trust allows for complex, regulated processes—think securely moving a verified vaccination record between two different healthcare providers that integrate with UIID [00:16:26]. The key is that the verified claims can move securely using standardized tokens, without either service owning your core identity [00:17:00]. Developers can leverage this powerful system using a familiar **OAuth 2.0 flow**, backed by SDKs for common languages, making advanced decentralized identity accessible and practical for real-world adoption [00:17:51].

Ready to Embrace Digital Sovereignty?

UIID v1 moves decentralized identity from theory to stable, scalable infrastructure.

Explore the Deep Dive on UIID v1

Post a Comment

0 Comments