comments2

Advert

Advert – scroll down

Displaying the 15 latest comments.

Submitted
first-name
support
concern
top-concern
message
2026-05-21 04:50:07 +02:00
Maria
No I do not
All of the above
Centralised Economic Kill-Switch Risks
2026-05-21 04:48:45 +02:00
Dirk
No I do not
Soft Discrimination & Digital Exclusion
2026-05-21 04:46:36 +02:00
Johann
No I do not
All of the above
The 30-Day Address Notification Penalty
2026-05-21 04:46:21 +02:00
Lindy
No I do not
All of the above
Soft Discrimination & Digital Exclusion
More control in the name of safety and convenience.
2026-05-21 04:46:14 +02:00
Marius
No I do not
All of the above
Centralised Cyber & Security Risk
2026-05-21 04:41:55 +02:00
Denise
No I do not
All of the above
Corporate Interoperability & Privacy Creep
This is a dangerous tool that will lead to social credit score and control.
2026-05-21 04:41:10 +02:00
Zelda
No I do not
All of the above
Corporate Interoperability & Privacy Creep
2026-05-21 04:40:34 +02:00
Vivienne
No I do not
All of the above
Soft Discrimination & Digital Exclusion
2026-05-21 04:36:48 +02:00
Philile
No I do not
Other
2026-05-21 04:36:17 +02:00
Tam
Not fully
All of the above
Soft Discrimination & Digital Exclusion
Also Device binding.
2026-05-21 04:34:06 +02:00
Christeñe
No I do not
All of the above
Centralised Cyber & Security Risk
2026-05-21 04:29:18 +02:00
Magda
No I do not
Soft Discrimination & Digital Exclusion
Citizens relying exclusively on physical IDs could face longer delays, reduced support, and systemic “soft discrimination” when trying to access basic societal resources.
2026-05-21 04:21:47 +02:00
Asghrr
No I do not
All of the above
Structural Function Creep & Tracking
2026-05-21 04:21:25 +02:00
Anita
No I do not
All of the above
Centralised Cyber & Security Risk
2026-05-21 04:20:12 +02:00
Ryan
No I do not
Other

Proponents of the draft regulations, including the Department of Home Affairs, state that the transition to a decentralised digital identity network is a necessary evolution that will fundamentally modernise South Africa. Their core arguments include:

    • A Leapfrog Milestone for National Security:
      Moving to a decentralised digital framework represents an extraordinary technological milestone for South Africa. By introducing cryptographic device-binding, asymmetric encryption, and liveness-detecting facial recognition, the state is effectively “leapfrogging” older, outdated legacy systems used by global powers. This modern infrastructure will significantly curb routine identity fraud, phase out physical document forgery, and secure the digital economy.
    • Unprecedented Bureaucratic Convenience:
      The MyMzansi application introduces massive administrative efficiency. Being able to securely renew an identity credential remotely via a basic facial scan on a smartphone eliminates the logistical burden of traveling to a state office. Furthermore, establishing automated “Verified Relationships” with trusted private partners (like banks and telecom networks) removes friction from the everyday FICA/KYC compliance process, enabling near real-time, bi-directional address and detail updates without tedious paperwork.
    • Gold Standard Fraud Prevention:
      Strict cryptographic device-binding—anchoring your legal identity token to a single physical device—serves as the gold standard in modern cybersecurity. It guarantees that even if a criminal steals your personal data, usernames, or passwords, they cannot remotely impersonate you because they do not physically possess your unique bound mobile device.
    • A Vital Systemic Reset:
      The rolling 5-year expiry and the 10-year in-person check-in requirements are necessary tools to keep the master population register dynamically accurate. The 10-year physical verification rule acts as a vital security reset to ensure that long-term inactive digital profiles belong to living, verified citizens, purging “ghost” records from the database.
    • Enforced Privacy Guardrails:
      Proponents emphasise that the policy features robust, built-in statutory protections. The regulations explicitly align with POPIA, strictly banning private corporations from using identity pipelines for data commercialisation, consumer profiling, or open-ended intelligence gathering. Additionally, physical IDs remain entirely valid, meaning the system is completely voluntary.

Civic groups, privacy advocates, and cybersecurity experts argue that while modernisation is welcome, the draft regulations introduce expansive risks and administrative penalties that demand much tighter constitutional safeguards. Their core arguments include:

    • Expanded National Cyber-Defences Vulnerability:
      While leapfrogging older tech sounds ambitious, critics point out that cutting-edge software is only as secure as the human guardrails managing it. Given the South African public sector’s history of systemic data breaches, ransomware disruptions, and weak IT controls, connecting the authoritative population register directly to corporate servers via live APIs vastly expands the nation’s “attack surface.” Consolidating civil registry access into a centralised live network creates an incredibly high-risk target for global hacking syndicates.
    • The 10-Year Bureaucratic Queue Trap:
      Forcing an essential civil right like a national identity credential to automatically “lapse” triggers deep administrative anxiety. Under Regulation 20(5), if a citizen remains entirely active digitally for a decade but does not happen to have a physical, in-person touchpoint with a Home Affairs branch or an accredited bank, their legal credential is wiped out. This rule unfairly penalizes compliant, digitally active citizens by forcing them back into physical queues to re-prove their identity from scratch.
    • Severe Device Dependency and Paralysing Lockouts:
      South Africa suffers from exceptionally high rates of mobile device theft, muggings, and phone damage. By legally tying an individual’s legal identity token exclusively to a single smartphone, a lost or stolen device instantly locks that citizen out of their civic and banking lives. Because the draft regulations fail to detail a transparent, secure, and automated remote path to unbind an old phone and verify a new one, losing a device could mean immediate economic and administrative paralysis.
    • Corporate Privacy Creep:
      Automating “near real-time” data synchronisation loops with banking and telecommunications giants chips away at the vital boundary that should separate sovereign public civic registries from private, profit-driven corporate infrastructure. Despite statutory promises, distributing live data updates across multiple third-party commercial servers inherently increases the risk of data leaks and corporate surveillance.
    • The Deepening Digital Divide:
      Despite textual promises that implementation will not unreasonably exclude anyone, the real-world trajectory of modern infrastructure is that state and corporate platforms rapidly optimise for digital pathways to cut operational costs. Over time, poor, elderly, or rural South Africans who rely exclusively on physical documents run a severe risk of facing systemic “soft discrimination”—including longer processing delays, reduced human customer support, and slower access to essential public utilities and services.