DRAFT 

GenAI: here we mean using GenAI outside the wallet (AI-as-a-Service)

1. Implicit data leakage (even without “sending data”)

Even if you think you’re only sending:

…the structure, timing, and combinations of requests can leak:

This is called inference leakage. Over time, the AI provider can reconstruct who you are and what you’re doing — without seeing raw identity data.

2. Loss of user sovereignty

When AI runs outside the wallet:

Result: The wallet becomes a UI, not an agent.

This quietly breaks self-sovereign identity principles.

3. Policy manipulation & dark negotiation

External AI can:

Even without malice:

This is algorithmic coercion, not a bug.

4. Prompt and context retention

Most AI services:

Even anonymized logs can:

Once logged: You can’t revoke it.

5. Correlation across wallets and services

A single AI provider serving many wallets can:

This recreates centralized identity — without consent.

6. Regulatory and jurisdictional drift

External AI services may:

This creates:

7. Model hallucination becomes a security risk

Inside a wallet:

These can cause:

Hallucination here is not UX noise — it’s identity damage.

 


More General:

1. Deepfake and Identity Spoofing

2. Prompt Injection and Policy Manipulation

3. Data Leakage and Membership Inference

4. Misinformation and Social Engineering


Risk 1: Biometric and Visual Identity Forgery (Deepfakes)

Risk: The article highlights the rapid advancement of AI-driven deepfake technologies, which are capable of producing highly realistic synthetic images and videos. These technologies can undermine biometric authentication mechanisms such as facial recognition, which are commonly used by digital identity wallets.

Solutions proposed in the article:

Risk 2: Synthetic Identity Fraud

Risk: The article discusses the emergence of synthetic identities created by combining real and fabricated data, which can bypass traditional identity verification systems. If such identities are stored or validated within digital identity wallets, they can compromise the overall trust model.

Solutions proposed in the article:

 Risk 3: Scalability and Accuracy Limitations of Existing Systems

Risk: The article notes that many current digital identity security systems lack the scalability and accuracy required to handle large volumes of users and increasingly sophisticated AI-based attacks. This limitation poses a significant challenge for identity wallets operating at national or cross-border scale.

Solutions proposed in the article:

Risk 4: Lack of Unified Standards and Regulatory Frameworks

Risk: The article emphasizes the absence of harmonized international standards and regulatory frameworks for digital identity systems. This lack of coordination creates interoperability and compliance challenges for digital identity wallets, especially in cross-border scenarios.

Solutions proposed in the article:

  1. A. Golda et al., "Privacy and Security Concerns in Generative AI: A Comprehensive Survey," in IEEE Access, vol. 12, pp. 48126-48144, 2024, doi: 10.1109/ACCESS.2024.3381611.  →  https://ieeexplore.ieee.org/document/10478883
  2. International Journal of Computer Engineering and Technology (IJCET)  Volume 16, Issue 1, Jan-Feb 2025, pp. 2305-2319, Article ID: IJCET_16_01_165 Available online at https://iaeme.com/Home/issue/IJCET?Volume=16&Issue=1 ISSN Print: 0976-6367; ISSN Online: 0976-6375; Journal ID: 5751-5249 Impact Factor (2025): 18.59 (Based on Google Scholar Citation) DOI: https://doi.org/10.34218/IJCET_16_01_165