Lens Exploration Briefs examine self-sovereign identity through diverse conceptual, ethical, legal, and technical perspectives. Each lens reveals a distinct dimension of the problem space—surfacing harms, exploring tensions, identifying blind spots, and proposing constructive directions.

15 lenses across 4 categories Phase 1 drafts (December 2025 - January 2026) Join the discussions

These are early drafts seeking primary authors—not final positions. Each brief includes open questions inviting dialogue, and many reference and build upon other lenses. We’re looking for contributors to develop these lenses through Working Circles, with selected briefs becoming peer-reviewed papers during Phase 2, informing the 10-year SSI Principles revision in April 2026.


Current Lenses

Foundational Principles & Rights

The Irreducible Person: You exist—no system needs to grant that, and none should take it away. This lens examines the operational paradox: some aspects of personhood (dignity, existence, cognitive liberty) lose their protective meaning the moment we try to measure them. Discuss on GitHub

Anti-Property: When we talk about “owning our data,” we risk turning ourselves into products. This lens examines why property law fails for identity—you can’t sell yourself like you sell a car—and proposes agency-based alternatives where delegation creates duties, not markets. Discuss on GitHub

Right to Transact: If you can be prevented from participating, none of the other principles matter. This lens grounds SSI in constitutional rights—free assembly, free association, peer-to-peer exchange—and warns that de-platforming from dominant wallets means losing not just a service, but your operational identity. Discuss on GitHub

Cryptographic Paradigms: PKI assumptions have constrained digital identity for 36 years. This lens asks what paradigm assumptions we’re embedding now that will limit what SSI can become—and how to write principles that enable future capabilities we haven’t yet invented. Discuss on GitHub

Preventing Coercion

Coercion Resistance: Privacy is the shield, but coercion resistance is the goal. This meta-lens coordinates four dimensions of manipulation: dark patterns that exploit cognitive limits, profiling that infers what you never disclosed, structural lock-in that traps you, and internalized surveillance that makes you police yourself. Discuss on GitHub

Self-Coercion: The most effective control is the kind that feels like your own idea. This lens examines invisible coercion—chilling effects, anticipatory compliance, behavioral conformity—harms that persist even with perfect cryptographic privacy because you stop yourself before any rule is enforced. Discuss on GitHub

Choice Architecture & Exit Rights: Small voluntary decisions accumulate into structural dependency. This lens examines the 18-year trap: credentials stored in proprietary formats, reputation that doesn’t transfer, biometrics that can’t be revoked—and why reversible design and proportionate exit rights are coercion resistance, not convenience features. Discuss on GitHub

Binding Commitments: Not all lock-in is harmful—Kenyan chamas prove that voluntary constraint enables trust. This lens distinguishes productive commitment (mutual stakes, transparent terms, bounded scope) from exploitative lock-in (asymmetric power, opaque terms, punitive exit), because SSI needs commitment mechanisms, not just escape hatches. Discuss on GitHub

Relational & Contextual Identity

Relational Autonomy: Ubuntu teaches “I am because we are”—yet SSI architectures model identity as individual attribute containers. This lens examines what’s lost: immigration systems that can’t see family bonds, chama membership invisible to credit systems, and how relationship-aware credentials could change both. Discuss on GitHub

Context Boundaries & Anti-Correlation: Your employer shouldn’t see your therapy notes; your landlord shouldn’t know your political donations. This lens examines context collapse—when separate spheres of life merge through correlation attacks—and proposes unlinkable identifiers that keep your different worlds cryptographically distinct. Discuss on GitHub

Multi-Scalar Sovereignty: Sovereignty doesn’t stop at the individual—200,000 Kenyan chamas manage $1.7 billion without institutional permission. This lens examines how autonomy operates across persons, communities, and nations, warning against “sovereignty-as-a-service” models that centralize power while claiming to distribute it. Discuss on GitHub

Stewardship: When caring for someone else’s digital identity—are you empowering or exploiting? This lens examines care relationships (parents, guardians, platforms) where the person being helped had no voice in choosing you, cannot exit, and bears permanent consequences of your decisions. Discuss on GitHub

Compliance, Governance & Technical Foundations

From Principles to Compliance: Not everything important can be measured—but that doesn’t mean it can’t be verified. This lens develops a three-tier framework: what can be technically tested, what requires regulatory enforcement, and what must remain ethical commitment—because treating all principles as measurable destroys the ones that matter most. Discuss on GitHub

Regulatory Frameworks: Legal “voluntary” erodes to practical “mandatory” within years—Estonia, Aadhaar, Ireland prove the pattern. This lens proposes technology-neutral legal structures that enable SSI without mandating it: anti-coercion provisions, platform independence requirements, and recognition without state monopoly. Discuss on GitHub

Principal Authority: Current platforms violate every duty agents owe principals: they exceed scope, act in their own interest, manipulate through dark patterns, hide what they do, and make exit prohibitively costly. This lens shows how agency law—centuries of established doctrine—can restore accountable delegation to digital identity. Discuss on GitHub


How Lenses Work Together

The lenses are complementary perspectives, not competing views. Together they form a multi-layer architecture:

  • Protective constraints: boundaries identity systems must not violate
  • Implementation mechanisms: legal, technical, and governance tools enabling those protections
  • Compliance foundations: methods for evaluating whether principles are upheld

Lenses frequently reference, critique, or refine one another to reveal interdependencies and blind spots.

How to Read These Briefs

Each brief provides:

  • A territory or focus of inquiry
  • Why the lens matters for SSI
  • Key harms, risks, and tensions
  • Constructive directions to explore
  • Cross-links to other lenses
  • Open questions for community dialogue

Briefs will be developed by Working Circles—small groups (3-5 members) with diverse expertise who meet biweekly to explore their chosen lens. Outputs move toward rough consensus on worthy insights, not toward standards, specifications, or product designs.

Proposing New Lenses

Have you identified a lens we’ve missed? We welcome proposals for new lenses that reveal unexplored dimensions of SSI’s problem space—conceptual, ethical, legal, technical, or social perspectives that surface new harms, tensions, or constructive directions.

A new lens should:

  • Clearly define the territory
  • Explain its relevance to SSI’s future
  • Articulate harms or tensions
  • Offer constructive directions
  • Connect to existing lenses

See the Template & Requirements for structure and formatting guidelines.

Get Involved

These briefs need you. Each lens is seeking a primary author or Working Circle to develop it further—bringing domain expertise, challenging assumptions, and refining the analysis through community dialogue.

Ways to contribute:

  • Lead a lens: Take primary authorship of a brief that resonates with your expertise
  • Join a Working Circle: Collaborate with 3-5 others on biweekly exploration
  • Provide feedback: Comment on drafts, suggest resources, identify blind spots

All written work is released under CC-BY 4.0. Contributors are credited according to their level of participation.