Advert
Advert – scroll down
Displaying the 15 latest comments.
Submitted | first-name | support | concern | top-concern | message |
|---|---|---|---|---|---|
2026-05-21 04:50:07 +02:00 | Maria | No I do not | All of the above | Centralised Economic Kill-Switch Risks | |
2026-05-21 04:48:45 +02:00 | Dirk | No I do not | Soft Discrimination & Digital Exclusion | ||
2026-05-21 04:46:36 +02:00 | Johann | No I do not | All of the above | The 30-Day Address Notification Penalty | |
2026-05-21 04:46:21 +02:00 | Lindy | No I do not | All of the above | Soft Discrimination & Digital Exclusion | More control in the name of safety and convenience. |
2026-05-21 04:46:14 +02:00 | Marius | No I do not | All of the above | Centralised Cyber & Security Risk | |
2026-05-21 04:41:55 +02:00 | Denise | No I do not | All of the above | Corporate Interoperability & Privacy Creep | This is a dangerous tool that will lead to social credit score and control. |
2026-05-21 04:41:10 +02:00 | Zelda | No I do not | All of the above | Corporate Interoperability & Privacy Creep | |
2026-05-21 04:40:34 +02:00 | Vivienne | No I do not | All of the above | Soft Discrimination & Digital Exclusion | |
2026-05-21 04:36:48 +02:00 | Philile | No I do not | Other | ||
2026-05-21 04:36:17 +02:00 | Tam | Not fully | All of the above | Soft Discrimination & Digital Exclusion | Also Device binding. |
2026-05-21 04:34:06 +02:00 | Christeñe | No I do not | All of the above | Centralised Cyber & Security Risk | |
2026-05-21 04:29:18 +02:00 | Magda | No I do not | Soft Discrimination & Digital Exclusion | Citizens relying exclusively on physical IDs could face longer delays, reduced support, and systemic “soft discrimination” when trying to access basic societal resources. | |
2026-05-21 04:21:47 +02:00 | Asghrr | No I do not | All of the above | Structural Function Creep & Tracking | |
2026-05-21 04:21:25 +02:00 | Anita | No I do not | All of the above | Centralised Cyber & Security Risk | |
2026-05-21 04:20:12 +02:00 | Ryan | No I do not | Other |
Proponents of the draft regulations, including the Department of Home Affairs, state that the transition to a decentralised digital identity network is a necessary evolution that will fundamentally modernise South Africa. Their core arguments include:
-
- A Leapfrog Milestone for National Security:
Moving to a decentralised digital framework represents an extraordinary technological milestone for South Africa. By introducing cryptographic device-binding, asymmetric encryption, and liveness-detecting facial recognition, the state is effectively “leapfrogging” older, outdated legacy systems used by global powers. This modern infrastructure will significantly curb routine identity fraud, phase out physical document forgery, and secure the digital economy. - Unprecedented Bureaucratic Convenience:
The MyMzansi application introduces massive administrative efficiency. Being able to securely renew an identity credential remotely via a basic facial scan on a smartphone eliminates the logistical burden of traveling to a state office. Furthermore, establishing automated “Verified Relationships” with trusted private partners (like banks and telecom networks) removes friction from the everyday FICA/KYC compliance process, enabling near real-time, bi-directional address and detail updates without tedious paperwork. - Gold Standard Fraud Prevention:
Strict cryptographic device-binding—anchoring your legal identity token to a single physical device—serves as the gold standard in modern cybersecurity. It guarantees that even if a criminal steals your personal data, usernames, or passwords, they cannot remotely impersonate you because they do not physically possess your unique bound mobile device. - A Vital Systemic Reset:
The rolling 5-year expiry and the 10-year in-person check-in requirements are necessary tools to keep the master population register dynamically accurate. The 10-year physical verification rule acts as a vital security reset to ensure that long-term inactive digital profiles belong to living, verified citizens, purging “ghost” records from the database. - Enforced Privacy Guardrails:
Proponents emphasise that the policy features robust, built-in statutory protections. The regulations explicitly align with POPIA, strictly banning private corporations from using identity pipelines for data commercialisation, consumer profiling, or open-ended intelligence gathering. Additionally, physical IDs remain entirely valid, meaning the system is completely voluntary.
- A Leapfrog Milestone for National Security:
Civic groups, privacy advocates, and cybersecurity experts argue that while modernisation is welcome, the draft regulations introduce expansive risks and administrative penalties that demand much tighter constitutional safeguards. Their core arguments include:
-
- Expanded National Cyber-Defences Vulnerability:
While leapfrogging older tech sounds ambitious, critics point out that cutting-edge software is only as secure as the human guardrails managing it. Given the South African public sector’s history of systemic data breaches, ransomware disruptions, and weak IT controls, connecting the authoritative population register directly to corporate servers via live APIs vastly expands the nation’s “attack surface.” Consolidating civil registry access into a centralised live network creates an incredibly high-risk target for global hacking syndicates. - The 10-Year Bureaucratic Queue Trap:
Forcing an essential civil right like a national identity credential to automatically “lapse” triggers deep administrative anxiety. Under Regulation 20(5), if a citizen remains entirely active digitally for a decade but does not happen to have a physical, in-person touchpoint with a Home Affairs branch or an accredited bank, their legal credential is wiped out. This rule unfairly penalizes compliant, digitally active citizens by forcing them back into physical queues to re-prove their identity from scratch. - Severe Device Dependency and Paralysing Lockouts:
South Africa suffers from exceptionally high rates of mobile device theft, muggings, and phone damage. By legally tying an individual’s legal identity token exclusively to a single smartphone, a lost or stolen device instantly locks that citizen out of their civic and banking lives. Because the draft regulations fail to detail a transparent, secure, and automated remote path to unbind an old phone and verify a new one, losing a device could mean immediate economic and administrative paralysis. - Corporate Privacy Creep:
Automating “near real-time” data synchronisation loops with banking and telecommunications giants chips away at the vital boundary that should separate sovereign public civic registries from private, profit-driven corporate infrastructure. Despite statutory promises, distributing live data updates across multiple third-party commercial servers inherently increases the risk of data leaks and corporate surveillance. - The Deepening Digital Divide:
Despite textual promises that implementation will not unreasonably exclude anyone, the real-world trajectory of modern infrastructure is that state and corporate platforms rapidly optimise for digital pathways to cut operational costs. Over time, poor, elderly, or rural South Africans who rely exclusively on physical documents run a severe risk of facing systemic “soft discrimination”—including longer processing delays, reduced human customer support, and slower access to essential public utilities and services.
- Expanded National Cyber-Defences Vulnerability:
