

GIP
A Networked Identity Solution delivering user-friendly, secure, and cost effective identity solutions.
Empowering Identity Without Trade-offs
Why compromise?
You deserve an identity solution that balances security, user experience, and cost-effectiveness ...
without sacrifice.
GIP is a cutting-edge networked identity solution that seamlessly blends security with usability.
No complexity, no friction—just effortless identity.

About Us
We believe Identity should not be a trade-off. GIP delivers a future-proof solution that ensures security, while providing a seamless user experience.
The Problem
Traditional identity solutions
force you to choose:
-
Centralised Identity – risky, outdated, and prone to security concerns.
-
Decentralised Identity – relies on insecure devices and defies best practice.
Our Solution
Networked Identity:
Instead of reinventing the wheel, we enhance and leverage existing, trusted digital identities held by governments, banks, and institutions.
It works in Scandinavia and Estonia — why not everywhere?

Identity Shouldn’t Be a Trade-Off
Why compromise between security, usability, and cost-effectiveness?
The Future is Networked Identity
GIP is designed to be easy to use, secure, and cost-effective.
No Magic, Just Practical Innovation
Probabilistic techniques such as behavioural biometrics or age inference, rely on guesswork.


Networked Identity
Reuse your verified credentials from trusted institutions.
Adaptive Security
Protects against fraud without adding complexity.
Multi-Environment Support
Works online, in-person, and even over the phone.
Scalable & Flexible
Functions across national, industry, and organisational levels.
Named & Anonymous Identity
Choose how you authenticate based on your needs.
OTHER IDENTITY MODELS
Our Thoughts On The Alternatives
Centralised Identity Concerns
Centralised Identity involves storing all personal data in one place, which raises significant privacy and security concerns. Consolidating sensitive information in a single repository could lead to heightened risks of data breaches and misuse. This approach resembles outdated and authoritarian models of data control, which are unlikely to be acceptable or effective in today’s digital landscape.
Decentralised Identity Challenges
Decentralised Identity, on the other hand, contradicts established best practices in data management. While cloud storage is widely recognised as the standard for securing data, Decentralised Identity shifts this responsibility to individual smartphones — devices that are not designed as secure storage solutions. Despite ongoing efforts to make this model viable over the past two decades, the fundamental vulnerabilities of smartphone storage remain unresolved, making this approach unreliable.


How GIP Works
GIP is more than just a protocol — it’s an Identity Ecosystem that connects organisations while ensuring privacy, security, and efficiency.
Imagine a world where:
-
You access your bank securely (Access)
-
You open an account at a telco (Relationship)
-
You verify your age at a bar (Mediated Access)
Each GIP ecosystem operates like a credit card network, ensuring compliance and interoperability.
A GIP Identity Ecosystem
GIP will operate in ecosystems – say one national solution for Age Assurance, one national solution for Opening Accounts, and industry solutions such as a building industry Purchasing Ecosystem.
Each ecosystem operates somewhat like a credit card scheme - every organisation has to meet some basic requirements and there is a forum for running the ecosystem.



