In 2005 Kim Cameron warned us what would happen if we did nothing about identity.

We look at the problems and how to make his 7 laws of identity real and work for the mess we're now in.

Kim Cameron in 2025. Image courtesy of Doc Searls on Flickr https://www.flickr.com/photos/docsearls/albums/251251/
$9 Trillion
The global cost of fraud online in 2024 up 80% since 2019.
400k
Trafficked people forced to scam online in camps on the Thai - Myanmar border.
17.4 Billion
User records exposed by hackers in the first 6 months of 2025 alone.

" The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft and deception which will cumulatively erode public trust in the Internet. "

Kim Cameron
Architect of Identity, Microsoft Corporation

The Internet isn't a Vault

Why is it seemingly so easy to industrialise fraud and identity crime? The problem is incredibly complex and has its roots back as far as the 18th Century. Decisions taken over decades in good faith have layered one upon the other to create the mother of all unintended consequences.

Read more

Two Decades of Neglecting the Digital Identity Crisis

Kim Cameron's work was foundational, but a lot has happened in the intervening 20 years. Now not only do we need to implement his rules, we have to solve the problems caused by doing nothing for 2 decades.

Read more

The Future of Trust

In his paper, Kim Cameron called for an identity layer for the internet. Self has spent six years researching and developing a solution to that challenge. Here, we look at what that is.

Read more

Built for developers

SDK Examples
Mobile SDKs allowing you to build secure and user-friendly applications for Android and iOS and server-side SDKs designed for robust backend integrations.
Documentation
Clear, well-documented APIs and SDKs for popular languages/frameworks, and plenty of examples, to significantly reduce development time and effort.
Sandbox
Our Sandbox mimics production, including APIs and authentication flows to ensure your testing reflects a real world use case. Develop integrations without concerns about production stability or conflicts, innovate and release on shorter cycles.

Blog

Securing Crypto
For crypto to be able to transition into the 'real world' it's speed and power at processing transactions will need to be met by equally powerful checks on senders and receivers of funds.
Simplifying Liveness
Really good UX ensures processes like checking liveness don't get in the way of the user as they try to do something. We explore how liveness at Self has evolved.
Digital Identity is Creepy
Digital identity is more than just a tool; it's a reflection of who we are. The pervasive and often opaque ways in which our identities are managed can feel invasive and, frankly, creepy.