A legal action involving Coinbase has sparked worries about how technology firms collect and keep biometric data. Nanak Nihal Khalsa contends that using unchangeable biometric identifiers could lead to permanent risks, as they cannot be altered once hacked.
Patchwork of State-Level Privacy Regulations
A new lawsuit against cryptocurrency exchange Coinbase has brought renewed attention to the issue of how technology companies gather and utilize biometric data. While this specific suit alleges that Coinbase hasn’t followed the Biometric Information Privacy Act of Illinois, U.S., it underscores difficulties faced by tech firms catering to customers or users across multiple legal jurisdictions.
Web3 and tech firms are often confident their collection or use of biometric data obtained from customers conforms to the law. However, past instances where even corporate giants like Google were forced to fork out over $1.3 billion to settle data privacy law violations appear to support the idea of having a comprehensive federal privacy law rather than the patchwork of state-level regulations.
For individuals whose sensitive biometric details are collected by leading Web3 firms such as crypto exchanges, the risks are significantly greater. The rising cases of cryptocurrency users with substantial holdings being targeted by criminal groups appear to hint at the possibility that cybercriminals could have access to confidential user information, including biometric data.
As the recent Coinbase cyberattack case demonstrates, allowing non-essential employees access to user data can turn out to be costly in financial terms. Yet, as Michael Arrington, co-founder of Arrington Capital, recently put it, the human cost of this will likely be much higher than the $400 million stolen. This assertion is seemingly backed by the ever incidents in which crypto influencers or holders of significant amounts crypto assets are targeted by armed criminals.
In one recent incident, Festo Ivaibi, the founder of a Uganda-based crypto and blockchain education platform, was abducted by criminals posing as members of the country’s security forces. During the ordeal, the Ivaibi was assaulted by the criminals who seemed to be aware that he had substantial crypto held in his Binance wallet. The founder ultimately lost $500,000 but was left alive to tell the tale. Both the Coinbase cyberattack and the African founder’s encounter demonstrate how sensitive user data is stored and who has access to it matters.
‘Privacy by Architecture, Not Privacy by Hope’
Meanwhile, Arrington’s advocacy for penalties, such as imprisonment for executives of companies mishandling user data, underscores the challenges confronting Web3 and tech firms in managing and safeguarding sensitive customer information. The predicament encountered by companies like Coinbase and others highlights the current gaps in protection for Web3 businesses. Therefore, how can companies maintain the security of Web3 identity systems?
Arrington’s demand for penalties, including jail time for company executives who mismanage user data, illustrates the hurdles faced by Web3 and tech firms in handling sensitive customer information. The predicament experienced by companies like Coinbase and others underscores the insufficient protections currently available to Web3 businesses. Thus, how can companies protect Web3 identity systems?
As a researcher, I advocate for a privacy approach centered on modular architectures that emphasize flexibility and user control over rigidity and extensive biometric reliance. Instead of constraining users within a system where their personal biometric information is collected centrally, this architecture offers more adaptable and self-governed privacy options. This implies that users can decide when and how to authenticate aspects of their identity without necessarily exposing the raw, sensitive data underlying it.
Nanak Nihal Khalsa, a key figure in the creation of the Web3 project Holonym, strongly advocates for this method. In an interview with TopMob, he warned that Know Your Customer (KYC) procedures without privacy-focused architecture, specifically zero-knowledge proofs, are a potential danger waiting to explode. He further emphasized that as long as exchanges and platforms store sensitive user information in centralized databases, they essentially create attractive targets for hackers. Khalsa explained the revolutionary nature of a modular approach.
Adopting a modular strategy for privacy infrastructure significantly alters the balance. Through the use of zero-knowledge proofs and other confirmable identifiers, platforms can fulfill regulatory demands without retaining or directly accessing their users’ highly confidential data. Instead of keeping user identities as files, it becomes about verifying identities through proofs.
The co-founder emphasizes that the importance of addressing such solutions is growing significantly, as the information Web3 companies gather is becoming increasingly private. He contends that utilizing biometrics such as fingerprints or DNA for identification carries a persistent risk: if breached, unlike traditional government IDs, these distinct personal identifiers cannot be replaced or renewed.
As a crypto investor, I’m excited about Khalsa’s Holonym because it provides a flexible, digital identity solution that prioritizes privacy and adherence to regulations through Zero-Knowledge Proofs (ZKPs), instead of relying on biometrics. The Human ID protocol developed by Holonym has enabled more than 125,000 anonymous users from around 180 countries to verify their identity without disclosing personal information. With its privacy-focused and decentralized structure, Holonym aims to extend digital rights globally by persuading websites and even governments to embrace its ID verification protocol. This modular approach, as proposed by Holonym, is designed to minimize security risks and foster trust in digital identities.
Simultaneously, Khalsa admitted that occurrences such as the latest Coinbase hack reveal a more significant issue within the cryptocurrency framework, emphasizing the shortcomings of identity systems that rely on centralized and cumbersome designs.
As the Coinbase breach demonstrates, there’s a bigger challenge in the crypto world, which is rooted in outdated identity systems that are built upon traditional centralized architectures.
Regarding the future of compliance, it’s not just about gathering more information. Instead, it’s about demonstrating more with fewer resources. The focus should be on building systems that prioritize privacy, rather than relying on optimism,” the co-founder stated.
Read More
- Delta Force: K437 Guide (Best Build & How to Unlock)
- Top 8 UFC 5 Perks Every Fighter Should Use
- USD ILS PREDICTION
- Slormancer Huntress: God-Tier Builds REVEALED!
- Tainted Grail: The Fall of Avalon – Everything You Need to Know
- AI16Z PREDICTION. AI16Z cryptocurrency
- Invincible’s Strongest Female Characters
- How to Unlock the Mines in Cookie Run: Kingdom
- Nine Sols: 6 Best Jin Farming Methods
- REPO’s Cart Cannon: Prepare for Mayhem!
2025-05-24 11:03