The Future of Identity: How I Built a Self-Sovereign Digital Identity Wallet

Table of contents
- The Problem: Why Traditional Identity Systems Are Failing
- The Vision: Self-Sovereign Identity (SSI)
- The Solution: A Digital Identity Wallet
- Key Technologies and Innovations
- The Research: Bridging Gaps in Identity Systems
- Development Process: Turning Research Into Reality
- Deliverables
- Why This Matters
- Reflections

Identity is foundational to how we interact with the world. It governs everything from accessing services to proving our qualifications. Yet, traditional identity systems are flawed—vulnerable to fraud, centralized control, and inefficiency. During my final year at Strathmore University, where I studied Computer Science, I embarked on a journey to address these challenges.
My project—building a Self-Sovereign Digital Identity Wallet using Distributed Ledger Technology (DLT)—was an exploration of how technology can transform identity management. What started as a classroom exercise turned into a deeply researched, practical prototype designed to empower individuals and institutions alike.
The Problem: Why Traditional Identity Systems Are Failing
The shortcomings of conventional identity systems can be grouped into three primary areas:
1. Centralization: Single Points of Failure
Traditional identity systems rely on central authorities to store and manage data. While this offers convenience, it also creates vulnerabilities:
Huduma Namba in Kenya: A national ID initiative intended to streamline access to services. However, concerns about data breaches and poor implementation led to its invalidation by the courts.
Aadhaar in India: The world’s largest biometric ID system faced similar criticism, with cases of leaked sensitive data and misuse.
A centralized system means a single breach can compromise millions of identities.
2. Document Fraud
The rise of counterfeit credentials—from fake academic degrees to forged IDs—has eroded trust across sectors:
Employers often hire based on fraudulent qualifications, resulting in reduced productivity.
Individuals face difficulties proving their authenticity due to poor verification systems.
3. Lack of User Ownership
Users have little to no control over their identity data. Whether replacing a lost ID or proving qualifications, they depend on intermediaries who may charge fees, delay processes, or mishandle sensitive data.
These issues are not just technical—they affect lives, trust, and governance. My research sought to redefine how identity systems function by addressing these gaps.
The Vision: Self-Sovereign Identity (SSI)
At the core of my project was Self-Sovereign Identity (SSI), a paradigm that reimagines identity management with these principles:
Ownership: Users own and control their identity data, removing the need for intermediaries.
Privacy: Using Zero-Knowledge Proofs (ZKP), users can prove specific facts (e.g., age, citizenship) without exposing unnecessary details.
Decentralization: By leveraging Distributed Ledger Technology (DLT), SSI eliminates single points of failure and enhances trust.
Imagine a system where your identity documents are securely stored on your device, and you share only what’s necessary, when it’s necessary. This is the future SSI envisions—and what I set out to build.
The Solution: A Digital Identity Wallet
The project resulted in a prototype for a Self-Sovereign Digital Identity Wallet. This wallet was designed with three core modules:
1. Issuer Module
Trusted entities like universities or government bodies issue verifiable credentials to users. These credentials are cryptographically signed and tamper-proof, ensuring authenticity.
2. Holder Module
Users store these credentials in their wallet, which resides securely on their mobile device. They control what information to share, with whom, and for how long.
3. Verifier Module
Third parties like employers or government agencies can verify credentials without accessing sensitive data. The wallet uses cryptographic proofs to confirm authenticity.
Key Technologies and Innovations
1. Verifiable Credentials
Verifiable credentials are the backbone of the wallet. They use cryptographic signatures to ensure that documents are:
Tamper-proof: Any alteration renders the credential invalid.
Selective: Users can share only the information needed for a specific verification (e.g., confirming age without revealing date of birth).
2. Zero-Knowledge Proofs (ZKP)
ZKP is a cryptographic method that enables users to prove a fact without revealing the underlying data. For instance:
A student can prove they graduated without sharing their transcript.
A driver can verify they’re licensed without exposing personal details.
ZKP ensures privacy while maintaining trust between parties.
3. Distributed Ledger Technology (DLT)
The wallet leverages the Sovrin Network, a decentralized ledger built for identity management. DLT ensures:
Transparency: All transactions are recorded on an immutable ledger.
Decentralization: No single entity controls the system, reducing risks of tampering.
The Research: Bridging Gaps in Identity Systems
My research identified significant gaps in existing identity solutions:
1. Huduma Namba and Aadhaar
Both systems failed to adequately address data privacy and user empowerment. Sensitive data stored in centralized databases became targets for misuse and breaches.
2. Academic Credential Verification
Manual verification processes are prone to errors and inefficiencies. Fraudulent certificates continue to flood the job market, highlighting the need for tamper-proof digital credentials.
3. Data Privacy
Many existing systems collect excessive personal data, leaving users vulnerable to misuse. The need for minimal, selective data sharing became a focal point of my research.
My project proposed solutions to these gaps through decentralized identity management and privacy-preserving verification techniques.
Development Process: Turning Research Into Reality
1. Methodology
I adopted the Rapid Application Development (RAD) methodology for its iterative and user-focused approach. This allowed me to test, refine, and integrate user feedback quickly.
2. Design
Using Figma, I created wireframes and system architecture diagrams to visualize user interactions. The design prioritized simplicity, scalability, and security.
3. Development Tools
Android Studio: For building the mobile application.
JavaScript: For developing key modules.
Sovrin Network: For implementing decentralized identity features.
4. Testing
The wallet underwent rigorous testing to ensure:
Credentials could be securely issued, stored, and verified.
Privacy-preserving verification worked as intended.
Deliverables
1. Functional Prototype
The prototype demonstrated end-to-end functionality, from credential issuance to verification.
2. Documentation
Comprehensive documentation covered:
The system’s technical architecture.
Use cases and potential applications.
Future scalability plans.
3. Insights on Real-World Applications
The wallet’s potential extended to academia, governance, healthcare, and beyond, showcasing its versatility.
Why This Matters
This project highlighted the transformative potential of technology in addressing identity management challenges. It proposed a system that:
Empowers Users: By giving individuals control over their data, the wallet reduces reliance on intermediaries.
Enhances Security: Cryptographic proofs and DLT protect against fraud and tampering.
Streamlines Processes: From verifying academic credentials to accessing government services, the wallet simplifies interactions while maintaining privacy.
In regions like Africa, where millions lack formal identification, such solutions can be life-changing.
Reflections
Looking back, this project was more than just an academic milestone—it was a journey into the intricate balance between technology, security, and human empowerment. Building the Self-Sovereign Digital Identity Wallet challenged me to think beyond the technical, to truly understand the societal impact of identity systems and the lives they touch.
One of the most profound realizations was how much identity shapes access—to opportunities, services, and even dignity. The ability to provide a secure, user-centric solution felt like contributing to a broader conversation about equity and trust in the digital age.
Ultimately, this journey was about more than technology. It was about creating something meaningful, something that could redefine how people interact with systems of power and control. For me, that’s the true essence of innovation—using what we know to make the world a bit better.
Subscribe to my newsletter
Read articles from Mike Thuita directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Mike Thuita
Mike Thuita
Techpreneur | FinTech | Blockchain | Climate Tech