← Back to Blog

    Apple's Digital ID and the Global Identity Infrastructure: A Critical Analysis

    Apple's November 2025 launch of passport-based Digital ID in Apple Wallet represents a pivotal moment in the digitization of identity documents, yet the marketing rhetoric of 'privacy by design' obscures significant structural risks.

    Digital IdentityPublished · 52 min read· By Digital Rights Research Team

    Evidence-based review per our 28-criteria methodology · affiliate disclosure

    1. Executive summary

    Apple's November 2025 launch of passport-based Digital ID in Apple Wallet (Apple Inc., 2025) represents a pivotal moment in the digitization of identity documents, yet the marketing rhetoric of "privacy by design" obscures significant structural risks. This investigation finds that while Apple's technical architecture offers genuine improvements over commercial identity verification vendors—particularly through on-device storage and selective disclosure—the broader digital identity ecosystem introduces surveillance capabilities, platform lock-in, and power asymmetries that demand critical examination.

    For UK users and policymakers, the contrast between Apple's US-centric rollout and the UK's sovereign GOV.UK Wallet approach (Government Digital Service, 2025) reveals fundamental tensions between commercial convenience, government control, and individual privacy.

    Premium Research Content

    Continue reading this in-depth analysis on Substack

    Evidence-Based Research
    Deep-dive analysis backed by primary sources and expert interviews
    Weekly Updates
    New legislation tracking, policy analysis, and privacy tool reviews
    Community Access
    Join privacy researchers, developers, and policy experts in discussion threads
    Powered bySubstack

    2. Apple's Digital ID: technical reality beneath the marketing claims

    Apple's passport-based Digital ID, announced November 12, 2025 (Apple Inc., 2025), allows US passport holders to store a digital credential in Apple Wallet usable at 250+ TSA checkpoints. The provisioning process involves scanning the passport's photo page, NFC reading of the e-Passport chip for cryptographic verification, a selfie capture, and active liveness detection requiring head movements (Apple Inc., 2025).

    This multi-factor enrollment addresses spoofing attacks using photos or masks.

    The technical architecture

    The technical architecture provides meaningful privacy protections. Credential data is stored in the Secure Element—an isolated hardware component with its own encrypted memory—bound to the device through cryptographic keys that never leave the chip (Apple Inc., 2025). Presentation requires Face ID or Touch ID authentication with no passcode fallback, preventing casual access by anyone other than the credential holder. The ISO 18013-5 standard implementation (ISO, 2021) enables selective disclosure, allowing users to prove they're over 21 without revealing their birthdate.

    Privacy claims and qualifications

    However, Apple's claim that it "cannot see when, where, or how an ID is used" requires qualification. During provisioning, Apple temporarily accesses barcode data (name, address, date of birth), the user's selfie, liveness detection video, and a "single-digit fraud prevention value" derived from device usage patterns (Apple Inc., 2025). While Apple states this data is deleted "shortly after" verification, the company provides no independent audit or precise retention timeline.

    More concerning, users who enable iCloud Backup face a fundamental vulnerability: encryption keys for Messages and potentially other data are stored in the backup, accessible to Apple and thus to law enforcement warrants. Only users who manually enable Advanced Data Protection (an opt-in feature since December 2022) (Apple Inc., 2022) receive end- to-end encryption for most iCloud categories.

    Rollout challenges

    The state-by-state rollout for driver's licenses—currently 14 states plus Puerto Rico after three years (Apple Inc., 2024)— reveals implementation friction. State DMVs retain sole authority over approval, creating a dependency relationship where governments must negotiate with Apple's platform policies. Japan's My Number Card integration (June 2024) (Apple Inc., 2024) marks Apple's first international expansion, but UK and EU driver's licenses remain unsupported with no announced timeline.

    3. The UK's sovereign approach through GOV.UK Wallet

    The UK government has chosen a fundamentally different path: building sovereign digital identity infrastructure rather than integrating with commercial wallets. The GOV.UK App launched summer 2025, with the GOV.UK Wallet introducing the Digital Veteran Card first, followed by a digital driving licence pilot in late 2025 (Government Digital Service, 2025). By end of 2027, all government credentials must have digital alternatives under the "Blueprint for Digital Government" (Government Digital Service, 2025).

    This infrastructure is "underpinned by the security and identity verification measures of GOV.UK One Login," the authentication backbone now serving 50+ government services with 12+ million account holders (Government Digital Service, 2025). One Login achieved DIATF certification in December 2024 (Department for Science, Innovation and Technology, 2025), offering identity verification through the GOV.UK ID Check app (facial biometrics matched against photo ID) or Post Office in-branch verification for those unable to verify digitally.

    Government control vs. convenience

    The critical distinction: UK driving licences will NOT be available through Apple or Google Wallet. The GOV.UK Wallet is the exclusive mechanism for government-issued digital credentials, a deliberate choice preserving government control over citizen identity infrastructure (Government Digital Service, 2025). This creates tension with consumer expectations—a 2021 DVLA prototype for Apple Wallet was demonstrated but never implemented. Industry stakeholders have questioned the exclusivity rationale, but the government appears committed to sovereignty over convenience.

    Legal framework

    The Data (Use and Access) Act 2025 (Royal Assent June 19, 2025) (UK Government, 2025) provides statutory foundation for the Digital Identity and Attributes Trust Framework, establishing the Office for Digital Identities and Attributes (OfDIA) for oversight. The framework's Gamma version (0.4), effective July 2025 (Department for Science, Innovation and Technology, 2025), certifies providers across five roles: Identity, Attribute, Orchestration, Holder, and Component services. Over 50 providers are now certified, including Yoti, HooYu, and OneID.

    Privacy concerns and function creep

    For privacy-conscious UK users, the DIATF's federated architecture (no central database) offers meaningful protection against single-point-of-failure breaches. However, civil liberties groups including Big Brother Watch (Big Brother Watch, 2024) and Open Rights Group warn that function creep remains a concern—digital ID requirements for Companies House verification (mandatory from November 18, 2025 for 6-7 million individuals) and Online Safety Act age verification (UK Government, 2023) (enforceable July 25, 2025) may normalize ID checks that extend beyond original scope. A petition against mandatory digital ID gathered 400,000+ signatures (UK Parliament, 2024), triggering Parliamentary debate.

    4. The commercial identity verification ecosystem and its vulnerabilities

    The digital identity verification market—projected to reach $29.32 billion by 2030 (Grand View Research, 2024)—is dominated by vendors whose data practices deserve scrutiny. The most alarming case is AU10TIX, an Israeli company serving TikTok, Uber, X/Twitter, and Coinbase. In 2024, investigators discovered that administrative credentials had been exposed online for 18+ months (stolen December 2022, still active June 2024) (Cox, J., 2024), potentially compromising passport images, driver's licenses, and facial scans. The EFF awarded AU10TIX a "Breachie" for worst data breaches of 2024 (Electronic Frontier Foundation, 2024), citing it as evidence that age verification mandates create dangerous honeypot databases.

    Vendor practices

    Yoti, a UK-based provider certified under DIATF, offers more transparent practices: 28-day maximum retention for initial checks, with a 6-year opt-out option for R&D use of biometric data (Yoti, 2024). However, Privacy International's 2019 investigation found Yoti was using customer biometric data for algorithm training without clear disclosure (Privacy International, 2019)—practices since improved but indicative of industry norms.

    ID.me, which handles identity verification for the IRS ($242M+ in contracts), VA, and 27+ states, faced a 2022 House Oversight investigation (House Committee on Oversight and Reform, 2022) finding the company "mischaracterized wait times" and "overstated" fraud estimates. Initially denying 1:many facial recognition use, ID.me later acknowledged the practice. A 2025 GAO report (U.S. Government Accountability Office, 2025) found the IRS lacked adequate quality assurance surveillance of ID.me's performance.

    Apple's market disruption

    Apple's entry disrupts this market by disintermediating commercial vendors entirely for enrolled users. The reusable identity model eliminates repeated verification revenue, threatening vendors' per-transaction business models (average $0.20-$2.00 per verification) (Grand View Research, 2024). However, Apple's competitive advantage relies on device control and installed base rather than superior verification—complex regulatory compliance (AML screening, PEP checks) remains outside Apple's scope, preserving vendor relevance for enterprise use cases.

    5. The Article 45 controversy and EU digital identity

    The EU's eIDAS 2.0 regulation (entered into force May 20, 2024) (European Commission, 2024) mandates that member states offer EUDI Wallets by end of 2026, with mandatory acceptance by large platforms and regulated industries by 2027. The architecture requires selective disclosure, pseudonymity rights, and user dashboards showing all data exchanges—stronger privacy protections than Apple's implementation.

    However, Article 45 has generated alarm from 500+ security researchers, Mozilla, EFF, and Google (Security Researchers, 2023). The provision mandates browsers trust Qualified Website Authentication Certificates (QWACs) issued by government-appointed Certificate Authorities, preventing browsers from independently revoking compromised CAs. Critics argue this creates infrastructure for government-sponsored man-in- the-middle attacks, citing historical precedents: DigiNotar (2011), ANSSI France (2013), and TurkTrust Turkey (2013) where government CAs were misused. The EFF described Article 45 as "returning to the dark ages of 2011" (Electronic Frontier Foundation, 2023).

    Implementation depends on correct interpretation of final technical specifications, but the structural risk to web PKI integrity is real.

    The Spanish Data Protection Authority (AEPD) (Spanish Data Protection Authority, 2024) has identified additional concerns: current technical specifications using SD-JWT and ISO mDL formats create unique identifiers enabling cross-presentation tracking, failing to achieve "multi-show unlinkability." Twenty-three discussion topics remain under review through end of 2025.

    6. Privacy threat models: what digital ID systems actually enable

    The most significant privacy concern, documented by an ACLU coalition of 80+ organizations (ACLU et al., 2024), is "Phone Home" functionality. Many digital driver's license systems notify issuing authorities every time an ID is used, giving governments "a bird's-eye view of where, when, and to whom people are showing their identity" (ACLU, 2023). Apple's implementation claims presentment history remains on- device only, but this architectural choice is not universally adopted—13 US states have created mDL systems without adequate privacy protections.

    Biometric irreversibility

    Biometric irreversibility presents an unresolvable vulnerability. Unlike passwords, compromised biometric data cannot be reset. The GoldPickaxe iOS Trojan, identified by Group-IB (Group-IB, 2024), steals facial recognition data and uses AI face-swapping services to create deepfakes for banking fraud. Research shows only 0.1% of people can accurately detect AI-generated deepfakes. Once biometric templates are breached—as in the AU10TIX case (Cox, J., 2024)—attackers could potentially impersonate victims indefinitely.

    Platform gatekeeper power

    Platform gatekeeper power creates structural dependency. Until iOS 18.1, Apple exclusively controlled NFC chip access, with a DOJ lawsuit (March 2024) (Department of Justice, 2024) alleging Apple "maintains complete control over how users make tap-to-pay payments." The EU forced Apple to open NFC access (saving a potential $40 billion fine), but developers must still sign commercial agreements with undisclosed fees, and Apple's Secure Element remains inaccessible to third parties. For digital ID, governments seeking Apple Wallet integration must comply with Apple's security standards, potentially ceding sovereignty over credential infrastructure—a concern notably avoided by the UK's GOV.UK Wallet approach (Government Digital Service, 2025).

    The digital divide

    The digital divide compounds these risks. Fifteen percent of the population lacks smartphones (40% of people over 65, 24% earning under $30,000) (Pew Research Center, 2024). The ACLU recommends mandatory physical ID alternatives (ACLU, 2023), but function creep—where digital IDs become required for scenarios never intended—threatens to create two-tier citizenship based on technology access.

    8. Actionable insights for UK privacy-conscious users and policymakers

    For individual users:

    • Disable iCloud Backup if maximum privacy is required (this prevents Apple from holding encryption keys) (Apple Inc., 2022)
    • Apple's Digital ID, when eventually available for UK documents, offers genuine technical improvements over commercial verification vendors—on-device storage and selective disclosure are meaningful protections (Apple Inc., 2025)
    • Enable Advanced Data Protection on all Apple devices to ensure end-to-end encryption for iCloud data (Apple Inc., 2022)
    • When GOV.UK Wallet launches, prefer it over commercial alternatives for government credential storage given DIATF oversight and UK legal protections (Government Digital Service, 2025)
    • Exercise opt-out rights proactively: Yoti users should email privacy@yoti.com to prevent R&D use of biometric data (Yoti, 2024); Apple users can disable "Improve ID Verification" in Settings
    • Maintain physical documents as backup—digital ID systems are not replacements for physical credentials in most legal contexts (ACLU, 2023)

    For policymakers:

    • The UK's sovereign GOV.UK Wallet approach preserves government control but must resist platform pressure from Apple/Google for credential hosting access (Government Digital Service, 2025)
    • Mandate "No Phone Home" architecture for any digital identity system—Utah's SB 260 (2025) (Utah State Legislature, 2025)provides a legislative model requiring transactions "free from surveillance, tracking or monitoring"
    • Require annual independent security audits of all DIATF-certified providers, with public disclosure of data retention practices and breach history (Department for Science, Innovation and Technology, 2025)
    • Ensure Companies House and Online Safety Act verification requirements (UK Government, 2023) do not create function creep toward mandatory digital ID for everyday activities
    • Monitor EU adequacy assessment closely—DUA Act provisions on "recognized legitimate interests" may trigger divergence findings (UK Government, 2025)
    • Establish explicit right to analog alternatives in digital identity legislation, preventing discrimination against non-digital users (ACLU, 2023)

    9. The fundamental tension remains unresolved

    Digital identity systems promise convenience but create permanent infrastructure that outlasts current policy intentions. Apple's privacy-preserving architecture is genuinely superior to commercial verification vendors' cloud-dependent models (Apple Inc., 2025), yet relies on continued corporate goodwill and creates platform dependency that governments cannot easily exit. The UK's sovereign approach via GOV.UK Wallet (Government Digital Service, 2025)preserves democratic accountability but foregoes interoperability with the commercial ecosystem most consumers already use.

    "Creating a system through which the government can track us any time we use our driver's license is an Orwellian nightmare."

    — ACLU (2023), Mobile Driver's Licenses: The Privacy RisksSource

    The technical architecture choices made today—Phone Home versus on-device, centralized versus federated, mandatory versus voluntary—will determine whether digital identity enhances convenience or enables surveillance.

    For UK users navigating this landscape, informed skepticism and active privacy management remain essential until legal frameworks catch up to technological capability.

    References

    1. [1]ACLU (2023) 'Mobile Driver's Licenses: The Privacy Risks', American Civil Liberties Union. Available at: https://www.aclu.org/news/privacy-technology/mobile-drivers-licenses-privacy-risks (Accessed: 21 January 2026).
    2. [2]ACLU et al. (2024) 'Coalition Letter on Mobile Driver's License Privacy Concerns', American Civil Liberties Union. Available at: https://www.aclu.org/documents/coalition-letter-mobile-drivers-license-privacy (Accessed: 21 January 2026).
    3. [3]Apple Inc. (2025) 'Add your US passport to Apple Wallet', Apple Support. Available at: https://support.apple.com/en-us/118224 (Accessed: 21 January 2026).
    4. [4]Apple Inc. (2025) 'Apple announces passport support in Apple Wallet', Apple Newsroom. Available at: https://www.apple.com/newsroom/2025/11/apple-announces-passport-support-in-apple-wallet/ (Accessed: 21 January 2026).
    5. [5]Apple Inc. (2024) 'Driver's license in Apple Wallet states and participating countries', Apple Support. Available at: https://support.apple.com/en-us/HT212940 (Accessed: 21 January 2026).
    6. [6]Apple Inc. (2022) 'Advanced Data Protection for iCloud', Apple Support. Available at: https://support.apple.com/en-us/108756 (Accessed: 21 January 2026).
    7. [7]Apple Inc. (2024) 'My Number Card in Apple Wallet in Japan', Apple Newsroom. Available at: https://www.apple.com/newsroom/2024/06/apple-brings-my-number-card-to-apple-wallet-in-japan/ (Accessed: 21 January 2026).
    8. [8]Big Brother Watch (2024) 'Digital ID: The Risks and Concerns', Big Brother Watch. Available at: https://bigbrotherwatch.org.uk/campaigns/digital-id/ (Accessed: 21 January 2026).
    9. [9]Cox, J. (2024) 'ID Verification Firm Used by TikTok, Uber Left Admin Credentials Exposed for Over a Year', 404 Media. Available at: https://www.404media.co/id-verification-firm-au10tix-admin-credentials-exposed/ (Accessed: 21 January 2026).
    10. [10]Department for Science, Innovation and Technology (2025) 'UK digital identity and attributes trust framework', GOV.UK. Available at: https://www.gov.uk/government/publications/uk-digital-identity-and-attributes-trust-framework-beta-3 (Accessed: 21 January 2026).
    11. [11]Department of Homeland Security (2025) 'REAL ID Enforcement', DHS.gov. Available at: https://www.dhs.gov/real-id (Accessed: 21 January 2026).
    12. [12]Department of Justice (2024) 'Justice Department Sues Apple for Monopolizing Smartphone Markets', U.S. Department of Justice. Available at: https://www.justice.gov/opa/pr/justice-department-sues-apple-monopolizing-smartphone-markets (Accessed: 21 January 2026).
    13. [13]Electronic Frontier Foundation (2024) 'The Breachies 2024: Celebrating the Worst in Data Privacy', Electronic Frontier Foundation. Available at: https://www.eff.org/deeplinks/2024/12/breachies-2024 (Accessed: 21 January 2026).
    14. [14]Electronic Frontier Foundation (2023) 'Article 45 Will Roll Back Web Security by 12 Years', Electronic Frontier Foundation. Available at: https://www.eff.org/deeplinks/2023/11/article-45-will-roll-back-web-security-12-years (Accessed: 21 January 2026).
    15. [15]European Commission (2024) 'eIDAS 2.0 Regulation enters into force', European Commission Digital Strategy. Available at: https://digital-strategy.ec.europa.eu/en/policies/eidas-regulation (Accessed: 21 January 2026).
    16. [16]Government Digital Service (2025) 'GOV.UK One Login', GOV.UK. Available at: https://www.gov.uk/using-your-gov-uk-one-login (Accessed: 21 January 2026).
    17. [17]Government Digital Service (2025) 'Blueprint for Digital Government', GOV.UK. Available at: https://www.gov.uk/government/publications/blueprint-for-digital-government (Accessed: 21 January 2026).
    18. [18]Grand View Research (2024) 'Identity Verification Market Size Report 2024-2030', Grand View Research. Available at: https://www.grandviewresearch.com/industry-analysis/identity-verification-market (Accessed: 21 January 2026).
    19. [19]Group-IB (2024) 'GoldPickaxe: iOS Trojan Steals Biometric Data for Banking Fraud', Group-IB Blog. Available at: https://www.group-ib.com/blog/goldpickaxe-ios-trojan/ (Accessed: 21 January 2026).
    20. [20]House Committee on Oversight and Reform (2022) 'Investigation of ID.me Identity Verification Practices', U.S. House of Representatives. Available at: https://oversight.house.gov/investigations/id-me/ (Accessed: 21 January 2026).
    21. [21]ISO (2021) 'ISO/IEC 18013-5:2021 Personal identification — ISO-compliant driving licence — Part 5: Mobile driving licence (mDL) application', International Organization for Standardization. Available at: https://www.iso.org/standard/69084.html (Accessed: 21 January 2026).
    22. [22]Pew Research Center (2024) 'Mobile Fact Sheet', Pew Research Center. Available at: https://www.pewresearch.org/internet/fact-sheet/mobile/ (Accessed: 21 January 2026).
    23. [23]Privacy International (2019) 'Investigation: Yoti's Use of Biometric Data', Privacy International. Available at: https://privacyinternational.org/investigations/yoti (Accessed: 21 January 2026).
    24. [24]Security Researchers (2023) 'Open Letter on eIDAS Article 45', Last Call to fix eIDAS. Available at: https://last-chance-for-eidas.org/ (Accessed: 21 January 2026).
    25. [25]Spanish Data Protection Authority (2024) 'AEPD Opinion on EUDI Wallet Technical Specifications', Agencia Española de Protección de Datos. Available at: https://www.aepd.es/en/guides-and-tools/reports-and-opinions (Accessed: 21 January 2026).
    26. [26]U.S. Government Accountability Office (2025) 'IRS Identity Verification: Improvements Needed in Contractor Oversight', GAO Reports. Available at: https://www.gao.gov/products/gao-25-reports (Accessed: 21 January 2026).
    27. [27]UK Government (2025) 'Data (Use and Access) Act 2025', Legislation.gov.uk. Available at: https://www.legislation.gov.uk/ukpga/2025/ (Accessed: 21 January 2026).
    28. [28]UK Government (2023) 'Online Safety Act 2023', Legislation.gov.uk. Available at: https://www.legislation.gov.uk/ukpga/2023/50 (Accessed: 21 January 2026).
    29. [29]UK Parliament (2024) 'Digital ID Petition and Parliamentary Debate', UK Parliament Petitions. Available at: https://petition.parliament.uk/petitions/ (Accessed: 21 January 2026).
    30. [30]Utah State Legislature (2025) 'SB 260 Mobile Driver License Privacy Amendments', Utah State Legislature. Available at: https://le.utah.gov/~2025/bills/static/SB0260.html (Accessed: 21 January 2026).
    31. [31]Yoti (2024) 'Yoti Privacy Policy and Data Retention', Yoti. Available at: https://www.yoti.com/privacy/ (Accessed: 21 January 2026).

    ProtonVPN

    Most transparent VPN for privacy

    Get Deal