Can I Have Digital Identity and Privacy at the Same Time?

Digital identity gives us quick and easy access to online resources and communities. But as we increasingly rely on digital identities for daily...

Verifiable Credentials and ISO/IEC 18013-5-Based Credentials: What’s...

Digital credentials are evolving rapidly, which has brought a lot of uncertainty to industry stakeholders.

A Brief History of Privacy

Over the past two decades, the rapid growth of personal data collection has dramatically changed how individuals, organizations, and governments view...

eIDAS 2.0: Shaping the Future of Digital Identity in Europe

eIDAS 2.0, or Electronic Identification, Authentication, and Trust Services 2.0, is an updated version of the original eIDAS regulation.

What is Self-Sovereign Identity?

Self-sovereign identity (SSI), also known as decentralized identity, is a model for managing digital identity that emphasizes individual ownership,...

Passkeys: an Overview

Passkeys are a new kind of login credentials that entirely replace passwords.

Why Digital Signatures Don’t Provide Privacy

Digital signatures are a cornerstone of modern cryptography. They help to ensure the authenticity, integrity, and non-repudiation of digital...

The EU Digital Identity Wallet: What You Need to Know

The European Union will soon introduce a secure and convenient digital wallet for its citizens and residents. The European Digital Identity (EUDI)...

What Is the Difference Between a MitID Login and an Age Verification...

Are you new to Criipto and want to know whether the standard MitID login or the Age Verification login best suits your needs? In this article, we...

What Happens When You Log in With an eID (via Criipto)

Criipto is an eID broker: It’s an intermediary between the eID provider (like MitID or BankID) and the website or app you're logging into. When you...

Why Doesn’t Every Country Have eIDs? (And Why the Nordics Have Them)

Electronic identification has become an essential component of national infrastructure in many countries. Nordic states—such as Denmark, Norway,...

Why Is Identity Management So Inconvenient?

Managing identity across many online platforms can feel overwhelming. Whether it’s remembering passwords, setting up multi-factor authentication...

eIDAS Levels of Assurance in Different National eID Schemes

Trust is at the core of every form of electronic identification (eID), from logging in to digitally signing documents to conducting e-commerce...

Why Use an eID Broker?

Many businesses are implementing eID systems for secure online authentication. These include MitID, Norwegian BankID, Swedish BankID, and so on....

How Cryptography Is Used in Digital Identity

Cryptography enables secure online interactions while keeping your identity and personal information safe. You don’t need to grasp the complex math...

Identity Theft: How It Works and How to Protect Yourself

How Does Identity Theft Work?

As more private and public services move online, we upload more data to the web. Personal information now resides on hundreds, if not thousands, of...

Zero-Knowledge Proofs: A Beginner's Guide

Zero-Knowledge Proofs (ZKPs) are powerful cryptographic tools with a wide range of practical applications. In this article, we’ll provide a simple...

How to Authenticate Callers with Twilio, CIBA, and the Swedish BankID...

In this tutorial, we’ll create a minimal implementation of Twilio’s Voice API along with Swedish BankID in telephone calls to demonstrate simple and...

An Introduction to Client Initiated Backchannel Authentication (CIBA)

Traditional OpenID Connect authentication flows in web and mobile applications rely on browser redirects. Users typically start the authentication...

What Are SD-JWT-based Verifiable Credentials?

Verifiable Credentials are changing the digital identity space and will soon become part of our daily lives.

Verifiable Credentials Explained In Simple Terms

Verifiable Credentials: A Glossary (For Everyone)

As you learn more about identity management and the wallet ecosystem, you’ll come across concepts related to verifiable credentials. This terminology...

Understanding JWT Validation: A Practical Guide with Code Examples

JSON Web Tokens (JWTs) offer a secure and standardized method for storing and exchanging data in JSON format. Despite their broad adoption in modern...

How To Use Fiddler to Debug Authentication Flows

Fiddler by Telerik is a powerful tool used to monitor and analyze HTTP network traffic.

Cryptography 101: What Is Hashing?

Hashing plays a crucial role in managing and protecting digital information. But what is it exactly, and how does it work? In this blog post, we’ll...

Trusted Timestamping: Comprehensive Guide & Use Cases

The practice of timestamping information has a long history. Centuries ago, scientists and inventors like Galileo and Robert Hooke used anagrams and...

Use Cases for Address Registry Lookups: From Enhanced User Experience...

Companies often need their customer’s address for identity verification, accurate product deliveries, or providing personalized services. But users...

Introducing Custom HTML & CSS for Login Flows

Introducing Custom HTML & CSS for Login Flows

User journeys often start with the login page. Yet when it comes to design and user experience, this critical element can get overlooked.

Belgian itsme®: What Are the Benefits?

itsme® is a digital identity solution developed collaboratively by major banks and telecom providers in Belgium. It’s a secure and user-friendly way...

What Are Universal Links and App Links, and How to Implement Them

In this blog post, we’ll talk about how to implement Universal Links and App Links.

A Guide to Integrating Swedish BankID Into a React Native (+Expo)...

Do you need to integrate Swedish BankID into your React Native & Expo project? Criipto’s newly released SDK is here to simplify the process. The...

How to Build a B2B Login Flow With MitID Erhverv (+ React Code...

MitID Erhverv is a new authentication solution tailored specifically for business use cases. It simplifies user administration, role management, and...

Building Signature Workflows with MitID Erhverv

The new MitID Erhverv (“MitID for business”) gives employees a secure and convenient way to handle various digital tasks on behalf of their...

3 Types of MitID Business (erhverv) Logins

3 Types of MitID Business Logins (+Examples)

What are the three types of MitID Business logins?

Persistent User Identification with eIDs

Persistent User Identification with eIDs

Digital platforms and services rely on persistent user identification to consistently recognize their users across multiple interactions. Persistent...

User Authentication: Comparing Session-based and Token-based...

User Authentication: Comparing Session-based and Token-based Implementations These days, it’s almost impossible to find a web application that...

A Guide to Integrating Norwegian BankID with Okta

As more businesses move their operations online, it’s essential to ensure that only authorized personnel can access sensitive data and systems....

Mapping eID claims to Auth0: Using Actions and Rules

Through our partnership with Auth0, Criipto offers a range of eID services to help Auth0 customers streamline identity verification and improve user...

How To Integrate Norwegian BankID with Auth0: A Detailed Guide

If you want to add Norwegian BankID to your application and are already using Auth0 as your authentication solution, this guide is for you.

JWT Claims in OpenID Connect: Real-world Example

OpenID Connect (OIDC) is a widely adopted standard for user authentication in modern web and mobile applications. One of its key features is the use...

Sign up for our newsletter

Stay informed with the latest news and insights on digital identity