Security and trust

Private by default. Clear control when it matters.

You control which businesses can reach you, and you can turn any relationship off at any time.

Plain-language trust

  • Each business relationship is like its own private P.O. box.
  • You can disable any business relationship at any time.
  • A business must authenticate before it can send through My1ID.

Everyday security outcomes

These are the day-to-day protections people feel while using My1ID, separate from the cutoff flow below.

Control in one place

You can review connected businesses and manage permissions in one clear dashboard.

Clear visibility

You can see relationship status and permissions without exposing who else is connected to you.

Encrypted on your device

Your private data is encrypted on your device before it leaves your phone.

How cutoff works

One relationship. One business. One switch to turn it off.

Think of each relationship as a separate private P.O. box for one business. If you close that box, that business can no longer deliver new messages there.

Step 1

Relationship created by you

You approve the business relationship, and My1ID creates a private relationship ID just for that one business connection.

Step 2

Relationship removed by you

You can turn off or remove that relationship at any time.

Step 3

Messages are blocked

Once removed, that relationship ID is no longer valid for delivery, so new messages from that business connection are blocked.

Standards-based approach

My1ID uses decentralized identity standards, modern cryptography for on-device key protection, and OAuth/OIDC standards for compatible sign-in flows.

Message safety model

My1ID requires authenticated business senders and user-approved relationships, which significantly reduces phishing-style message abuse.

What businesses can and cannot see

Can see

  • Relationship status
  • Delivery state
  • Permission flags you set

Cannot see

  • Your global identity
  • Who is in your groups
  • Other business relationships

Technical details

Detailed implementation boundaries for technical evaluators.

Control and protection, without complexity.