<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>On Digital Identity</title>
    <link>https://idv4.com/</link>
    <description>Recent content on On Digital Identity</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="https://idv4.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>History of Digital Identity</title>
      <link>https://idv4.com/docs/history/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://idv4.com/docs/history/</guid>
      <description>&lt;h1 id=&#34;history-of-digital-identity&#34;&gt;&#xA;  History of Digital Identity&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#history-of-digital-identity&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;Digital identity can be roughly explained through its four epochs of evolution.&lt;/p&gt;&#xA;&lt;h2 id=&#34;epoch-1-1950-1988-emergence-of-shared-computing&#34;&gt;&#xA;  Epoch 1 (1950-1988): Emergence of Shared Computing&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#epoch-1-1950-1988-emergence-of-shared-computing&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;early-computing&#34;&gt;&#xA;  Early Computing&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#early-computing&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h3&gt;&#xA;&lt;!-- raw HTML omitted --&gt;&#xA;&lt;p&gt;In the initial stages (1950s-early 1960s), digital identity didn&amp;rsquo;t exist as a concept. Security focused on physical access control for large, single-user mainframe computers. There was no technical need to differentiate users digitally.&lt;/p&gt;&#xA;&lt;h3 id=&#34;time-sharing--first-passwords&#34;&gt;&#xA;  Time-Sharing &amp;amp; First Passwords&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#time-sharing--first-passwords&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h3&gt;&#xA;&lt;p&gt;The introduction of time-sharing systems (like CTSS around 1961) allowed multiple users to share one computer concurrently. This created the need for user separation and led to the first password system to protect individual files, though it was initially insecure.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Identity in the Age of AI</title>
      <link>https://idv4.com/docs/epoch-5/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://idv4.com/docs/epoch-5/</guid>
      <description>&lt;h1 id=&#34;epoch-5-2023-identity-in-the-age-of-ai&#34;&gt;&#xA;  Epoch 5 (2023–): Identity in the Age of AI&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#epoch-5-2023-identity-in-the-age-of-ai&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;The first four epochs of digital identity share a hidden assumption: behind every credential, there is a human. The user account, the federated login, the social identity, even the decentralized self-sovereign wallet — each was designed for people authenticating, authorizing, or asserting attributes about themselves.&lt;/p&gt;&#xA;&lt;p&gt;That assumption has broken.&lt;/p&gt;&#xA;&lt;p&gt;Generative models can produce text, voice, video, and code indistinguishable from human output. Autonomous agents — software that perceives, plans, and acts — increasingly initiate transactions on behalf of humans without those humans being in the loop for any individual action. The number of non-human actors transacting on the internet now grows faster than the number of human users.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Aegis</title>
      <link>https://idv4.com/docs/aegis/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://idv4.com/docs/aegis/</guid>
      <description>&lt;h1 id=&#34;aegis&#34;&gt;&#xA;  Aegis&#xA;  &lt;a class=&#34;anchor&#34; href=&#34;#aegis&#34;&gt;#&lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;Aegis is IDv4&amp;rsquo;s first product — a runtime control plane for autonomous AI agents. It gives enterprises identity, policy enforcement, and audit across every interaction an agent has with an LLM, a tool (MCP), or another agent.&lt;/p&gt;&#xA;&lt;p&gt;It is the first concrete step in IDv4&amp;rsquo;s mission to build an identity plane for the agent era. The historical arc of digital identity — local user accounts, enterprise federation, social identity, decentralized credentials — never accounted for software that acts on a human&amp;rsquo;s behalf without being one. Agent identity is the missing piece.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
