How You Can Use Sudo Platform Digital Identities and Decentralized Identity Capabilities to Rapidly Deliver Customer Privacy Solutions

May 16, 2022 | Privacy & Security

In this 5-part series, we’ll look at how enterprises can rapidly deliver customer privacy solutions with the Sudo Platform digital identities and decentralized identity capabilities. Today, we’ll set the scene by introducing the data privacy problem and the Sudo solution. In future articles, we’ll dive deeper into the detail.

The data privacy problem

As you know, personal privacy is simultaneously being supported and attacked — supported by privacy-enhancing regulations and attacked via loopholes and by those simply ignoring privacy laws.

Big Tech companies are capturing, abstracting, aggregating, packaging, analyzing and selling every user interaction. Knowledge about user behavior is the product — and it’s fair to say, we are in the midst of a privacy crisis

So, how should we respond to this crisis? We say through a new type of technology built with strong cryptographic security at its base.

The Sudo solution

Today, enterprises are urgently seeking ways to meet customer demands for safer and more private interactions with their services and the digital world. We believe the solution lies in empowering people to determine what information they share, and how, when and with whom they share it. We do this through the Sudo digital identity that users can take into the world and use in place of their personal information in many different scenarios in their daily physical and digital lives. 

Through our Sudo Platform, enterprise developers can rapidly integrate digital identities into their applications and build a deeper level of trust with their users. The platform provides extensive privacy capabilities, from communications to secure browsing to payments, all centered around digital identities. 

We’re also enhancing these digital identities with decentralized identity technologies. Built on blockchain technology, decentralized identity provides a strong foundation for a much improved privacy experience for the user. Indeed, decentralization is being called the most important privacy innovation for the coming decade. 

Definitions of decentralized identity vary, but this definition works well: 

… an approach to identity and access management (IAM) that seeks ways to allow individuals to manage their own personally identifiable information (PII) instead of using a central authority. An important goal of decentralized identity is to create standards that will allow internet users to control which applications and services can have access to specific types of PII.

The two most common IAM models on the internet are centralized (e.g. I create an account on a system) or federated (e.g. I use my Facebook account to sign on to systems). Decentralized identity removes the control from these centralized systems and gives it to the user to control their own identity data and how it’s used. 

Decentralized identity is built on a set of industry standards and technology implementations that allow identities to be secure and user-controlled, while still being interoperable with numerous services at the user’s discretion. This standardized approach maintains the flexibility that users have come to expect from today’s internet while creating a higher level of privacy protections that they require to be privacy protected in the current digital landscape. That has motivated Anonyome Labs to focus on empowering enterprises with decentralized identity tools and capabilities. (Read Decentralized Identity: Key Concepts Explained.)

Beyond Sudo Platform, Anonyome Labs supports the ongoing development of decentralized identity by:

  • helping to run three decentralized identity-focused blockchains
  • being an active contributor to the decentralized identity standards organizations
  • contributing source code back to the decentralized identity open source community. 


Decentralized identity is the future of privacy and identity management on the internet. In this article series, we’ll outline the opportunity. Next week we’ll look at the full-scale attack on privacy and how the Sudo digital identity can help users reclaim control over their personal information.

You May Also Like…