
Introduction
This Views builds on the analytical foundations set out in Assessing and Optimising MyDigital ID1, a recent discussion paper that assessed digital identity through system-level considerations such as legal authority, institutional governance, inclusion and readiness to scale using MyDigital ID as an illustrative case. That analysis focused primarily on design, governance and comparative experience. This Views shifts the lens from how digital identity systems are built to how they are encountered in everyday use, paying particular attention to moments of friction, failure and disengagement that tend to fall outside system-level assessments but are central to trust, legitimacy and long-term sustainability.
Digital identity is often presented as a practical enhancement to public administration. By replacing paper-based credentials with secure digital verification, governments can deliver services more quickly, at lower cost and with greater consistency. For example2, Estonia's X-Tee data-sharing platform saves the government and residents over 820 years of collective work annually. In Singapore, electronic know-your-customer (eKYC) processes facilitated by Singpass consented data sharing have reduced digital transaction times by approximately 80%. Meanwhile, in India, the Aadhaar system has decreased eKYC onboarding costs from about USD 23 to less than USD 0.15 each person. Digital identity has also been associated with fraud reduction3. In India, linking digital ID to public sector wage and benefit payments has helped plug payment leakages, contributing to an estimated 13.4% improvement in household incomes. These efficiency and integrity gains help explain why digital identity continues to attract strong political and institutional support.
Yet digital identity is not only a tool for efficiency. In practice, it functions as an access system that increasingly shapes how people interact with government, the private sector and essential services. When it works smoothly, it fades into the background of everyday life. When it falters, even briefly, it can disrupt access to income, government assistance, healthcare, education or employment. These disruptions are not experienced evenly and have uneven effects on users. While some users recover quickly with minimal effort, others face repeated barriers, disengage quietly or are excluded altogether.
The iceberg metaphor helps to make this imbalance visible. Above the surface sit the benefits that are easy to observe, measure and celebrate, such as speed, scale and convenience. Below the surface lie less visible experiences of friction, failure, uneven recovery and silent withdrawal. These everyday dynamics shape whether digital identity systems remain trusted and usable over time. Paying attention to what lies beneath the surface is essential because its long-term stability depends on how well it functions under imperfect conditions.
Above the Surface
Why Digital Identity Works
Digital identity systems persist and expand because they deliver efficiency, scale and consistency in ways that are tangible for both users and governments.
For individuals, the most immediate benefit is time saved. Digital identity reduces the need for repeated manual checks and physical visits by enabling remote verification. Evidence shows substantial reductions in transaction times for routine activities such as opening bank accounts, applying for permits or registering businesses4. These gains matter because they reduce travel costs, minimise time away from work and lower the likelihood of clerical error. Convenience in this context is meaningful because it directly determines whether people can realistically access services.
For governments, the advantages grow with scale. Digital identity enables standardised verification, automated compliance and the consolidation of records across agencies5. This can significantly reduce onboarding costs in regulated sectors and improve welfare integrity by limiting fraud and duplication6. Once these efficiencies are realised, digital identity becomes embedded as core infrastructure rather than an optional service. Its value increases further when identity can be reused across sectors, reducing duplication for both institutions and users7.
These operational benefits also explain political support. Digital identity performs well during crises by enabling remote service delivery when physical offices are closed8. It supports fiscal discipline9 and is often framed as a foundation for economic growth and digital transformation. Where systems are accompanied by clear governance and safeguards, they can attract broad public backing. At the surface, digital identity appears efficient, fair and future-ready.
Why Digital ID Is Appealing
Public narratives around digital identity are shaped by outcomes that are easy to observe and quantify. For users, the most visible benefit is reduced inconvenience. For policymakers, it is cost savings, fraud reduction and high coverage. These outcomes translate neatly into performance indicators10, making them powerful signals of success.
Standardisation reinforces these narratives. Automated identity checks and defined assurance levels create the impression that everyone is subject to the same rules11. Compared with discretionary, face-to-face verification, digital processes can appear more objective and less prone to error or corruption12. Consistency is therefore often experienced as fairness.
However, the appearance of consistency does not guarantee a consistent experience for all users. Even when enrolment is high and the system generally works as intended, some users continue to face repeated difficulties13. These experiences are easy to miss because they sit outside overall measures of how the system performs14. In some contexts, high uptake reflects necessity rather than trust, with registration becoming effectively mandatory to access basic services15. When success is defined primarily by speed and coverage, the lived experience of those who fall outside the smooth path is easily overlooked.
This is where the iceberg metaphor becomes useful. The visible tip reflects what systems do well under ideal conditions. Below the surface lie the conditions under which systems pause, fail or demand extra effort from users, revealing how resilient and inclusive they really are.
Below the Surface
Everyday friction and uneven recovery
Digital identity systems function as access gates. When the gate fails, access to everything behind it is interrupted. Even short-lived disruptions can therefore have significant and lasting consequences.
Failures arise in many ways. Remote authentication can break down due to network instability16 and activation processes may fail under high demand17. Enrolment requirements, particularly those involving in-person biometric capture, can become bottlenecks when service points are distant or difficult to reach18. Each disruption interrupts what users expect to be a seamless interaction. These interruptions generate more than inconvenience. Repeated friction can produce frustration and erode confidence. When access is blocked, people look for workarounds. They may share credentials, reuse passwords or rely on unofficial intermediaries19. In this way, systems meant to improve security can unintentionally undermine it.
Crucially, system failures do not affect all users equally20. The ability to recover from disruption depends heavily on socio-economic position, physical ability and access to support. Poor and rural residents may lack reliable connectivity or the resources to travel to service points21. Persons with disabilities may face inaccessible interfaces or support channels22. Displaced people often lack the necessary documents to reestablish their identity after a disruption23. Women may face additional barriers when ownership gaps or mobility constraints limit their ability to engage in independent problem-solving24. Manual workers and older adults are more likely to experience biometric mismatch as physical labour and ageing alter fingerprints or facial features25.
Recovery is therefore not only technical. It depends on digital skills, confidence and social networks. Individuals with higher digital literacy and stronger support systems tend to recover more easily26. Marginalised users are more likely to accept rejection as final because they have limited ability to negotiate within strict electronic systems frameworks27. Over time, small recurring failures accumulate, leading to insecure coping strategies that cause people to revert to paper-based options and erode trust in public institutions.
Invisibility, silence and governance blind spots
As digital identity systems mature, verification increasingly happens in the background28. Automation improves convenience but reduces visibility and understanding.
When processes become invisible, users find it hard to develop accurate mental models of how decisions are made or how their data is shared29. Some respond with indifference, assuming the system is too complex to understand or adopting the principle that they should not need to understand how a service works to use it30. Others overestimate its sophistication31. Trust built on misunderstanding is fragile and can collapse when unexpected errors occur. When automated systems fail, the lack of transparency can hinder the ability to understand and make sense of the situation32. Users cannot easily determine whether the problem lies with their device, the network, the data or the decision logic itself33. This uncertainty fuels frustration and risky behaviour, including the sharing of sensitive documents through insecure channels34.
At the same time, many access problems are never reported35. Instead of complaining, users disengage. People are most likely to withdraw silently when onboarding is complex, when account creation is forced, when feedback is poor or when seeking help feels frustrating36. Silent disengagement is more common among individuals with low digital literacy, limited connectivity, high levels of distrust or heavy documentary requirements37. Internalised blame plays a powerful role38. When failure is interpreted as a personal shortcoming rather than a system flaw, users are less likely to seek redress and more likely to withdraw permanently39.
For policymakers, this silence creates a governance blind spot. Systems can appear successful based on adoption rates and helpdesk data while excluding substantial numbers of people. Without mechanisms to identify friction, non-use and informal workarounds, harms stay hidden and corrective actions are delayed40.
Conclusion
Digital identity has established itself as a core component of modern public infrastructure. It delivers real benefits by saving time, reducing costs, limiting fraud and bringing consistency to service delivery. These gains are significant and should not be discounted.
Long-term stability relies on managing both what is visible on the surface and what lies beneath it. Every day, friction contributes to the formation of exclusion. Temporary breakdowns are moments when trust is put to the test. Automation, when lacking transparency, undermines personal autonomy. Additionally, silence may indicate withdrawal rather than satisfaction.
The iceberg metaphor serves not only as a description but also as a policy guide. Digital identity systems that concentrate solely on visible successes risk becoming fragile and unfair. In contrast, systems that consistently focus on hidden experiences, especially how individuals recover from failures, might be more likely to be resilient, inclusive and deserving of public trust.






.avif)
