How can we protect our digital identities? How is access to a digital identity secured? offers end users a pathway using two authentication factors: a phone and a code. The user enters their phone number (which becomes their identifier) into the mobile app and creates a secret code (required during authentication). The app then asks them to enter an email address and capture their identity card or passport. At the same time, it asks them to take a photo of themselves. It then carries out a series of checks. The user’s personal data is only ever shared with their explicit agreement. The platform enables you to track identities and manage the processes associated with their life cycle, from creation to deletion.