[{"data":1,"prerenderedAt":798},["ShallowReactive",2],{"/white-paper/why-digital-identity-wallets-will-take-off-in-2026":3},{"id":4,"title":5,"author":6,"body":7,"coverImage":783,"description":784,"extension":785,"listTitle":786,"meta":787,"navigation":788,"path":789,"publishedAt":790,"seo":791,"stem":792,"tags":793,"__hash__":797},"whitepapers/white-paper/why-digital-identity-wallets-will-take-off-in-2026.md","Why Digital Identity Wallets Will Take Off In 2026 (And Why Previous Attempts Failed)","Dominik Beron",{"type":8,"value":9,"toc":761},"minimark",[10,14,20,23,28,31,34,57,60,165,169,174,179,187,190,204,208,213,216,219,245,248,252,257,260,263,267,272,278,282,287,290,293,297,300,304,307,430,434,437,567,571,574,692,696,699,702,705,710,718,723,731,733,737,744,748],[11,12,13],"p",{},"The technology has existed since 2016. The question is why it didn't succeed then — and why the next 24 months are structurally different.",[15,16],"newsletter-subscribe",{"description":17,"form":18,"title":19},"Sign up to receive the complete guide as PDF straight to your inbox.","wallets-will-take-off-in-2026","Get the PDF",[21,22],"hr",{},[24,25,27],"h2",{"id":26},"introduction","Introduction",[11,29,30],{},"Previous efforts to mainstream digital identity failed for three structural reasons: there was no legal mandate to supply them, no obligation for businesses to accept them, and no interoperability standard to connect them.",[11,32,33],{},"As of 2026, the three roadblocks that prevented the adoption of ID wallets have completely flipped:",[35,36,37,45,51],"ul",{},[38,39,40,44],"li",{},[41,42,43],"strong",{},"Distribution is mandated"," (e.g. EU: 450M citizens)",[38,46,47,50],{},[41,48,49],{},"Acceptance is mandated"," (regulated relying parties)",[38,52,53,56],{},[41,54,55],{},"Standards are production-ready"," (interoperability)",[11,58,59],{},"ID wallets are now structurally inevitable.",[61,62,63],"comparison-table",{},[64,65,66,82],"table",{},[67,68,69],"thead",{},[70,71,72,76,79],"tr",{},[73,74,75],"th",{},"Factor",[73,77,78],{},"The Past — Why It Failed",[73,80,81],{},"Today (2026 & Beyond) — The New Reality",[83,84,85,116,134,152],"tbody",{},[70,86,87,93,96],{},[88,89,90],"td",{},[41,91,92],{},"Supply Side",[88,94,95],{},"No EU member state was required to issue a wallet or ID credentials. Businesses had no clear incentive to offer ID wallets.",[88,97,98,99,104,105,108,110,111,113,115],{},"• Every EU member state must issue a wallet and provide ID credentials by 2026 (",[100,101,103],"a",{"href":102},"/eidas2","eIDAS 2","). ",[106,107],"br",{},[106,109],{}," • 21 US states have ID wallets (40 by EOY).",[106,112],{},[106,114],{}," • Apple, Google, Samsung, PayPal, ID.me distribute ID wallets to hundreds of millions.",[70,117,118,123,126],{},[88,119,120],{},[41,121,122],{},"Demand Side",[88,124,125],{},"Businesses could ignore digital IDs and ID wallets.",[88,127,128,129,131,133],{},"Businesses must accept EUDI wallets by end of 2027 (eIDAS 2).",[106,130],{},[106,132],{}," Similar frameworks: US REAL ID, UK DIATF, NZ DISTF.",[70,135,136,141,144],{},[88,137,138],{},[41,139,140],{},"Business ROI",[88,142,143],{},"Lack of regulatory-enabled use cases at scale in banking, travel, eCommerce.",[88,145,146,147,149,151],{},"Digital IDs become part of mandatory KYC, age verification, user onboarding, and strong customer authentication (login, payments). ",[106,148],{},[106,150],{},"Digital IDs accepted at 250 US airports nationwide (TSA REAL ID).",[70,153,154,159,162],{},[88,155,156],{},[41,157,158],{},"Interoperability",[88,160,161],{},"Fragmented standards, lack of interoperability.",[88,163,164],{},"Convergence on common standards: ISO 18013-5/7, W3C VCs, SD-JWT VC, OpenID4VC, DC API.",[24,166,168],{"id":167},"five-structural-reasons-this-time-is-different","Five Structural Reasons This Time Is Different",[170,171,173],"h3",{"id":172},"_1-binding-law-not-voluntary-participation","1. Binding law, not voluntary participation",[11,175,176],{},[41,177,178],{},"EU Regulation 2024/1183 entered into force May 2024",[11,180,181,182,186],{},"Unlike eIDAS 2014, the new framework is compulsory on both supply and demand. Every EU member state must offer at least one certified ",[100,183,185],{"href":184},"/eidas2/eudi-wallet","EUDI Wallet"," by November 2026. By November 2027, all businesses that require customer identification must accept it. This is not a pilot — it is law across 27 countries and 450 million citizens. The European Commission has set an explicit target of 80% of EU citizens actively using EUDI wallets by 2030, backed by enforcement mechanisms.",[11,188,189],{},"The EU's ID wallet adoption is building on a strong foundation (Eurostat data, 2025):",[35,191,192,198],{},[38,193,194,197],{},[41,195,196],{},"72% of EU citizens"," (>16y) = 230M used online public services",[38,199,200,203],{},[41,201,202],{},"52% of EU citizens"," (>16y) = 165–175M were actively using eID — i.e. they already have a trigger and a good reason to use ID wallets",[170,205,207],{"id":206},"_2-the-chicken-and-egg-problem-is-solved-by-mandate","2. The chicken-and-egg problem is solved by mandate",[11,209,210],{},[41,211,212],{},"Supply, demand, and acceptance are legislated in parallel",[11,214,215],{},"Every previous identity wallet effort died because of the classic supply and demand gap: users won't adopt without places to use it, and businesses won't accept it without users.",[11,217,218],{},"The EU has mandated both sides simultaneously. In the US, TSA REAL ID enforcement created the first nation-wide acceptance point for digital IDs for domestic air travel (starting in 2025). Results are already visible:",[35,220,221,227,233,239],{},[38,222,223,226],{},[41,224,225],{},"Louisiana",": 2.5M ID wallet users (45% of the population)",[38,228,229,232],{},[41,230,231],{},"Colorado",": 1.9M ID wallet users (39% of adult population)",[38,234,235,238],{},[41,236,237],{},"Arizona",": 1.1M mobile driver's licence holders (23% of eligible drivers)",[38,240,241,244],{},[41,242,243],{},"California",": Originally capped at 1.5 million, the pilot programme's limit was expanded to 4.2 million participants to accommodate rising demand",[11,246,247],{},"Similar regulatory and trust frameworks are being rolled out globally — UK, Australia, New Zealand, Japan, Thailand, South Africa, among others.",[170,249,251],{"id":250},"_3-hyperscalers-are-now-the-distribution-channel","3. Hyperscalers are now the distribution channel",[11,253,254],{},[41,255,256],{},"Apple Wallet and Google Wallet transformed the scale of distribution",[11,258,259],{},"Apple and Google offer their wallets as free distribution infrastructure, reaching ~95% of smartphone users with zero marginal friction. Both companies are expanding beyond their home market. Apple launched age verification via their wallet in the UK. Google is deeply involved in the EU large-scale pilots (eIDAS 2). Together, these companies have 450M users in the US and EU alone.",[11,261,262],{},"On top of that, major ID app providers such as ID.me had already issued 139 million digital wallets to federal IAL2 standards by February 2025 and are now looking to \"upgrade\" their wallet offerings to standards-based ID wallets.",[170,264,266],{"id":265},"_4-standards-convergence-after-a-decade-of-fragmentation","4. Standards convergence after a decade of fragmentation",[11,268,269],{},[41,270,271],{},"ISO 18013, W3C VCs, OpenID4VC, and eIDAS 2.0 now align",[11,273,274,275],{},"The past was defined by incompatible competing standards. That era is over. The core standards for ID wallets — credential formats (ISO 18013-5/7, W3C VC, IETF SD-JWT VC) and protocols for data exchange (OID4VCI, Digital Credentials API) — are defined.\n",[41,276,277],{},"The standardization problem is now a solved problem.",[170,279,281],{"id":280},"_5-ai-driven-fraud-creates-urgent-enterprise-pull","5. AI-driven fraud creates urgent enterprise pull",[11,283,284],{},[41,285,286],{},"Deepfakes and synthetic IDs make verifiable credentials non-optional",[11,288,289],{},"Today, a large majority of banks report identity-based attacks as a primary threat vector. Between May 2024 and April 2025, AI-enabled fraud schemes in banking and insurance increased by 456% (Benavides et al., 2026). Generative AI has made deepfakes and synthetic ID fraud easily accessible, breaking traditional KYC/AML processes built on document uploads and video calls.",[11,291,292],{},"Cryptographically signed verifiable credentials — used in ID wallets — are the only fraud-resistant alternative at scale. Financial institutions, healthcare providers, and governments are simultaneously under regulatory pressure (AML6, KYC reform) and operational threat from AI-powered fraud. This creates an enterprise pull entirely independent of the regulatory mandate.",[24,294,296],{"id":295},"use-cases-the-business-roi","Use Cases — The Business ROI",[11,298,299],{},"ID wallets bring immense value to every industry through lower costs, lower friction and drop-off rates, lower fraud rates, better user experience, and compliance with identity and data protection regulations.",[170,301,303],{"id":302},"banking-user-onboarding-kyc","Banking — User Onboarding & KYC",[11,305,306],{},"Businesses must comply with laws, but more importantly, they move to eliminate the \"KYC Tax.\"",[61,308,309],{},[64,310,311,324],{},[67,312,313],{},[70,314,315,318,321],{},[73,316,317],{},"Dimension",[73,319,320],{},"Today (Traditional KYC)",[73,322,323],{},"ID Wallet",[83,325,326,339,352,365,378,391,404,417],{},[70,327,328,333,336],{},[88,329,330],{},[41,331,332],{},"User flow",[88,334,335],{},"Upload ID, selfie/video, manual review",[88,337,338],{},"Share verified credential (PID)",[70,340,341,346,349],{},[88,342,343],{},[41,344,345],{},"Time (user)",[88,347,348],{},"5–15 minutes",[88,350,351],{},"Near-zero (QR Code, NFC)",[70,353,354,359,362],{},[88,355,356],{},[41,357,358],{},"Conversion rate",[88,360,361],{},"~60% completion",[88,363,364],{},"80–95% completion",[70,366,367,372,375],{},[88,368,369],{},[41,370,371],{},"Cost per verification",[88,373,374],{},"€2–€30",[88,376,377],{},"\u003C€0.20",[70,379,380,385,388],{},[88,381,382],{},[41,383,384],{},"Compliance & fraud risk",[88,386,387],{},"High (deepfakes, synthetic IDs)",[88,389,390],{},"Low (cryptographic proof, eIDAS 2 compliant)",[70,392,393,398,401],{},[88,394,395],{},[41,396,397],{},"Reusability",[88,399,400],{},"None (repeat per bank)",[88,402,403],{},"High (reusable across institutions)",[70,405,406,411,414],{},[88,407,408],{},[41,409,410],{},"Operational effort",[88,412,413],{},"Manual review + vendor tools",[88,415,416],{},"Automated",[70,418,419,424,427],{},[88,420,421],{},[41,422,423],{},"User experience",[88,425,426],{},"Friction-heavy, repetitive",[88,428,429],{},"One-click, seamless",[170,431,433],{"id":432},"travel-flight-car-rental-hotel","Travel — Flight, Car Rental, Hotel",[11,435,436],{},"Businesses are moving to eliminate the NPS tax.",[61,438,439],{},[64,440,441,452],{},[67,442,443],{},[70,444,445,447,450],{},[73,446,317],{},[73,448,449],{},"Today (Manual ID Checks)",[73,451,323],{},[83,453,454,466,479,491,503,516,529,541,554],{},[70,455,456,460,463],{},[88,457,458],{},[41,459,332],{},[88,461,462],{},"Show passport repeatedly, manual entry",[88,464,465],{},"Share identity via QR/NFC",[70,467,468,473,476],{},[88,469,470],{},[41,471,472],{},"Time (airport)",[88,474,475],{},"5–20 min cumulative checks",[88,477,478],{},"Near-zero / Touch-free",[70,480,481,486,489],{},[88,482,483],{},[41,484,485],{},"Time (car rental)",[88,487,488],{},"10–15 minutes",[88,490,478],{},[70,492,493,498,501],{},[88,494,495],{},[41,496,497],{},"Time (hotel)",[88,499,500],{},"3–10 min check-in",[88,502,478],{},[70,504,505,510,513],{},[88,506,507],{},[41,508,509],{},"Operational cost",[88,511,512],{},"High (staff-heavy verification)",[88,514,515],{},"Reduced staffing needs",[70,517,518,523,526],{},[88,519,520],{},[41,521,522],{},"Error rate",[88,524,525],{},"Manual entry errors possible",[88,527,528],{},"Automated, accurate",[70,530,531,535,538],{},[88,532,533],{},[41,534,423],{},[88,536,537],{},"Queues, repeated friction",[88,539,540],{},"Seamless, contactless",[70,542,543,548,551],{},[88,544,545],{},[41,546,547],{},"Privacy",[88,549,550],{},"Full document exposure",[88,552,553],{},"Selective disclosure",[70,555,556,561,564],{},[88,557,558],{},[41,559,560],{},"Scalability",[88,562,563],{},"Limited by staff",[88,565,566],{},"Scales digitally",[170,568,570],{"id":569},"ecommerce-age-verification-fraud","eCommerce — Age Verification & Fraud",[11,572,573],{},"Businesses must comply with laws and reduce fraud on platforms.",[61,575,576],{},[64,577,578,589],{},[67,579,580],{},[70,581,582,584,587],{},[73,583,317],{},[73,585,586],{},"Today (Existing Methods)",[73,588,323],{},[83,590,591,603,616,629,642,655,667,680],{},[70,592,593,597,600],{},[88,594,595],{},[41,596,332],{},[88,598,599],{},"Self-declare, ID upload, 3rd-party check",[88,601,602],{},"Share \"over 18\" credential",[70,604,605,610,613],{},[88,606,607],{},[41,608,609],{},"Time",[88,611,612],{},"0 sec (weak) → minutes (strict)",[88,614,615],{},"Near-zero (QR code)",[70,617,618,623,626],{},[88,619,620],{},[41,621,622],{},"Conversion impact",[88,624,625],{},"−10–30% with stricter checks",[88,627,628],{},"Near baseline (low friction)",[70,630,631,636,639],{},[88,632,633],{},[41,634,635],{},"Fraud / bypass risk",[88,637,638],{},"High (easy to fake)",[88,640,641],{},"Very low (cryptographic proof)",[70,643,644,649,652],{},[88,645,646],{},[41,647,648],{},"Compliance strength",[88,650,651],{},"Weak to moderate",[88,653,654],{},"Strong, auditable",[70,656,657,661,664],{},[88,658,659],{},[41,660,547],{},[88,662,663],{},"Over-sharing (full ID)",[88,665,666],{},"Minimal disclosure",[70,668,669,674,677],{},[88,670,671],{},[41,672,673],{},"Integration complexity",[88,675,676],{},"Multiple vendors / APIs",[88,678,679],{},"Standardised protocol",[70,681,682,686,689],{},[88,683,684],{},[41,685,423],{},[88,687,688],{},"Either weak or painful",[88,690,691],{},"Strong + seamless",[24,693,695],{"id":694},"take-away-act-now","Take Away: Act Now",[11,697,698],{},"The transition from fragmented identity systems to unified, open standards is no longer a future prediction — it is the present reality. The legal mandates are set, the standards are defined, and the window to secure a competitive advantage is open today.",[11,700,701],{},"Organisations must act urgently to meet these deadlines and combat rising fraud, but acting now does not require building everything from scratch. In fact, attempting to build the entire identity stack in-house — wrestling with credential standards, complex exchange protocols, key management, and revocation — is often a trap. It introduces high complexity, massive technical risk, and significant ongoing maintenance costs.",[11,703,704],{},"Instead of reinventing the wheel, the most successful enterprises focus on building applications and choose one of two proven paths for the underlying ID infrastructure:",[11,706,707],{},[41,708,709],{},"Build Apps, Own the Infra (The Open-Source Route)",[11,711,712,713,717],{},"Use open-source infrastructure like the ",[100,714,716],{"href":715},"/community-stack","walt.id Community Stack"," (used by +38K developers & organisations). Own the full stack and retain maximum control, while offloading the protocol implementation to a proven open-source solution.",[11,719,720],{},[41,721,722],{},"Build Apps, Buy the Infra (The Enterprise Route)",[11,724,725,726,730],{},"Only build UI and applications. Outsource the technical complexity to a proven, standards-compliant provider like the ",[100,727,729],{"href":728},"/enterprise-stack","walt.id Enterprise Stack",". Maximum speed to market with minimum technical risk.",[21,732],{},[170,734,736],{"id":735},"any-questions","Any Questions?",[11,738,739,743],{},[100,740,742],{"href":741},"/contact","Write us"," — we are happy to help.",[170,745,747],{"id":746},"further-reading","Further Reading",[11,749,750,753,754,753,757],{},[100,751,752],{"href":184},"The EUDI Wallet explained"," · ",[100,755,756],{"href":102},"eIDAS 2 overview",[100,758,760],{"href":759},"/white-paper/eidas2-implementers-guide","eIDAS 2 Implementers Guide",{"title":762,"searchDepth":763,"depth":763,"links":764},"",2,[765,766,774,779],{"id":26,"depth":763,"text":27},{"id":167,"depth":763,"text":168,"children":767},[768,770,771,772,773],{"id":172,"depth":769,"text":173},3,{"id":206,"depth":769,"text":207},{"id":250,"depth":769,"text":251},{"id":265,"depth":769,"text":266},{"id":280,"depth":769,"text":281},{"id":295,"depth":763,"text":296,"children":775},[776,777,778],{"id":302,"depth":769,"text":303},{"id":432,"depth":769,"text":433},{"id":569,"depth":769,"text":570},{"id":694,"depth":763,"text":695,"children":780},[781,782],{"id":735,"depth":769,"text":736},{"id":746,"depth":769,"text":747},null,"The technology has existed since 2016. This paper explains why previous attempts at digital identity wallets failed, and why the next 24 months are structurally different.","md","Why Digital Identity Wallets Will Take Off In 2026",{},true,"/white-paper/why-digital-identity-wallets-will-take-off-in-2026","2026-04-15",{"title":5,"description":784},"white-paper/why-digital-identity-wallets-will-take-off-in-2026",[794,185,795,796],"eIDAS2","Digital Identity","ID Wallets","b_J66mN8UgcDDgkNEOkMUHnUigUAFb4fwoFeOsQz5uE",1776267568403]