14 Oct 2025
by Ivan Kinash

A Tunnel Under the Castle Walls: Why Trust Cannot Be Assumed in the Digital ID Era

*Please note that these thought leadership pieces represent the views of the contributing companies and do not necessarily reflect techUK’s own position. 


To help build a shared understanding of digital ID, we must talk openly about the security that underpins it. 

I’m the co-founder and CEO of Licel, a mobile channel protection company whose technology safeguards billions of app installations across more than 70 countries. 

Every hour, Licel systems process over 300,000 live threat intelligence events. That gives us a unique window into how trust in the digital world can be strengthened, but also how it can sometimes quietly erode. 

We see camera injection attacks that bypass eKYC controls, social engineering fused  with remote access tools, and maliciously modified apps that trick users into signing  something they never intended to. These aren’t fringe cases, but rather are becoming the new normal. 

This is a problem, because societies like the UK are built on trust by default. We tend to trust the systems we use and trust that those systems will protect us. But trust in the  digital world cannot be assumed. It has to be engineered. 

The New Reality of Digital Identity 

The world is entering an exciting new phase of identity. Digital IDs that are stored on smartphones are quickly being planned and rolled out by government task forces around  the world - including in the UK. These national identity schemes will be used to prove  who we are, and to streamline access to public services and the digital economy. 

The potential is immense. Faster verification, improved accessibility and efficiency, and  seamless cross-border interactions, to name only a few. But alongside this great promise is a new reality; where our digital identity lives inside mobile applications that by their very nature exist in an unpredictable, untrustworthy, and often hostile environment. 

Physical passports are protected by hardware, border controls, and hundreds of years of anti-fraud mechanisms such as holograms and secure chips. A digital equivalent faces  very different types of risks that float around in the dark spaces; in the ether between the application, the operating system, and the backend. These include mobile malware, remote access tools, and zero-day exploits. 

The danger isn’t that Digital ID initiatives are misguided - far from it. It’s more that it  seems that security at the mobile application level isn’t yet treated with the same rigour as backend or architectural security. And without it, the entire chain of trust can be  undermined. 

Imagine that you’ve built an impressive-looking castle, but have failed to examine the soil around it. That soil could be just the right quality and consistency to enable attackers to construct a tunnel under the castle walls, all the way to the crown jewels. 

The Dark Spaces: The Digital ID Threat Landscape 

The success of Digital ID initiatives will arguably rest on whether citizens believe that  their identities are safe. This is a legitimate concern. After all, digital identities on personal  devices can become exposed to: 

  • Tampering - attackers modify apps to inject malicious code or steal and misuse cryptographic keys. 
  • Malware interference - malware strains can silently observe Digital ID interactions and signatures, and siphon credentials. 
  • Synthetic enrolment - sophisticated eKYC Fraud using deepfakes and virtual camera apps can create bogus citizens in the database. 
  • NFC-based fraud - contactless scans via NFC interfaces can be manipulated and relayed to other devices around the world. 

The threats above can be prevented, but only if we see the mobile channel as a critical  component of trust. Citizens don’t see - and are almost certainly unaware of - backend  systems and encryption protocols. What they do see and experience is the mobile  application; that’s why it’s so important that it is able to defend itself and is capable of  proving its integrity every time that it runs. 

A Manifesto for Secure Digital ID Initiatives: Building a Foundation of Trust 

At Licel, we’ve spent 15 years in the field, building security solutions that solve real-world  problems and protect the entire mobile channel. We believe the following principles  should underpin every secure Digital ID initiative. 

  • Secure Enrolment. We work with financial institutions around the world to help them battle eKYC Fraud. This threat could also endanger the success of Digital ID initiatives, which is why it’s vital that biometric data and personal identifiers be integrity verified and secured from the device to the backend. 
  • Integrity Across the Lifecycle. Runtime Application Self-Protection (RASP) and integrity checks are absolutely vital for identifying and preventing some of the threats I mentioned earlier that float and flicker around mobile applications (malware and compromised environments). 
  • Trusted Execution. Personal identification, credentials, and cryptographic keys and secrets must be robustly protected. Sensitive operations should be performed inside a trusted, isolated environment. 
  • Visibility is vital. Real-time threat and device intelligence is crucial for painting a thorough picture of the threat landscape and how it’s evolving over time. Without it, it’s difficult to get a clear view of where attacks are coming from. 
  • Privacy and Transparency. Security isn’t only about preventing attacks, but about maintaining the confidence of citizens that their identity and data belongs to them. Open communication and education is crucial. 

A Shared Mission 

The regulatory frameworks for Digital ID already exist: eIDAS 2.0, ICAO DOC 9303, ISO/ IEC 18013-5. These standards set the baseline for interoperability and assurance, but compliance alone doesn’t equal security. 

I’m convinced that to build sustainable trust, security has to be embedded from the inside out. And that begins with the Digital ID application on each citizen’s device. A holistic approach (what we at Licel call mobile channel protection) that combines protection mechanisms such as runtime security, verified threat and device intelligence, and trusted execution, can go beyond compliance to build lasting end-user trust. 

Digital ID initiatives are some of the most ambitious digital infrastructure projects of the modern world. They have the potential to completely revolutionise the way that government, private enterprise, and individual citizens interact. That’s why it’s so important that they are built on solid foundations if we want them to stand the test of time. 

Trust cannot be assumed, but it can be built. Here at Licel we’re excited to be a part of the conversation and we stand ready to help Digital ID fulfil its enormous promise and potential. 


Find out more about Licel’s vision for Digital ID Security-  https://licelus.com/

Ivan Kinash

Ivan Kinash

co-founder and CEO, Licel

Digital Identity  programme activities

Digital identities will provide a gateway for citizens and SMEs into the digital economy. techUK members demonstrate the benefits of digital identity to emerging markets, raise their profile as thought leaders, influence policy outcomes, and strengthen their relationships with potential clients and decision-makers. Visit the programme page here.

 

Upcoming events

Latest news and insights 

Learn more and get involved

 

Get our digital identity insights straight to your inbox

Sign-up to get the latest updates and opportunities from our Digital Identity, Technology and Innovation, Cloud, and Data Analytics and AI programmes.

 

Here are the five reasons to join the Digital Identity programme

Download

Join techUK groups

techUK members can get involved in our work by joining our groups, and stay up to date with the latest meetings and opportunities in the programme.

Learn more

Become a techUK member

Our members develop strong networks, build meaningful partnerships and grow their businesses as we all work together to create a thriving environment where industry, government and stakeholders come together to realise the positive outcomes tech can deliver.

Learn more

Meet the team 

Sue Daley OBE

Sue Daley OBE

Director, Technology and Innovation

Laura Foster

Laura Foster

Associate Director - Technology and Innovation, techUK

Elis Thomas

Elis Thomas

Programme Manager, Tech and Innovation, techUK

 

 

Related topics