A digital ID requires essentially a digital signature running on a secure device (for example, a smart card).
Thus it implements public key cryptocraphy. Which makes confidentiality and integrity of computing two inseparable sides of the same medal.
You simply cannot break confidentiality of communication without practically breaking integrity of digital signatures at the same time. (Otherwise, a user, for example could generate a fresh random public key, sign it with their digital id, and send it to any communications partner).
Breaking this in turn means that the government can sign on behalf of you, without your knowledge.
Human communication is based on symbols and whatever the means are to transport these symbols, cannot work without trust.
A digital ID requires essentially a digital signature running on a secure device (for example, a smart card).
Thus it implements public key cryptocraphy. Which makes confidentiality and integrity of computing two inseparable sides of the same medal.
You simply cannot break confidentiality of communication without practically breaking integrity of digital signatures at the same time. (Otherwise, a user, for example could generate a fresh random public key, sign it with their digital id, and send it to any communications partner).
Breaking this in turn means that the government can sign on behalf of you, without your knowledge.
Human communication is based on symbols and whatever the means are to transport these symbols, cannot work without trust.