Every institution that processes data about you has a complete profile. They score you, model you, and make decisions about you. You have no view into what they see β until now.
You generate the data. Institutions accumulate it. You have no view into the picture they've built about you.
Four steps to absolute privacy. No magic, just solid engineering and modern cryptography.
National ID system signs your data. miTch prepares selective proofs.
Your device stores the credentials. Raw data is shredded after signing.
miTch filters the request. You see exactly what is shared and why.
Service receives only the proof (e.g., "Over 18: Yes"). No name, no ID shared.
Four concrete scenarios β same mechanics. Click through each step and see exactly what is shared, what is blocked, and why.
This request is transmitted as an OID4VP Presentation Request. No direct data access is possible.
| Max. Impressions/Tag | 5 |
| Quiet Period | 22:00β07:00 |
| Blocked Categories | IAB-7 (Health), IAB-14 (Religion) |
The nullifier is deterministic: SHA-256(user_seed β verifier_did β scope_id). Two verifiers with the same scope receive different nullifiers β no cross-verifier tracking is possible.
The credential is valid only for this session and expires automatically at midnight. The university confirms the status β IVB never learns which university.
IVB+ (pilot program) makes an extended request β in addition to student verification, the vendor wants the matriculation number and university name.
Legal basis: GDPR Art. 9(2)(c) β vital interests. Ephemeral credential, automatically deleted at session end.
After release, an ephemeral session key is generated. The data is encrypted with this key β at the end of the session, the key is automatically deleted (crypto-shredding).
Detected: Secondary use of health data (EHDS Art. 33). Verifier has no HDAB certificate.
In real emergencies, an authorized doctor can overwrite the policy. Every override is permanently stored in the audit trail β no possibility to act unnoticed.
β Break-glass only applies to immediate emergency treatment. Secondary use for research is not permitted even via break-glass β this flow is for treatment emergencies (Art. 9(2)(c) GDPR).
miTch generates a pairwise-pseudonymous proof: The app only learns "User is β₯18" and receives a unique ID that is not linkable to other services.
If enough users report, a DSA complaint is automatically triggered.
See exactly how miTch handles a real verification β step by step.
Your government issues a credential via the national eID system (ID Austria, Smart-eID, EUDI Wallet, etc.). miTch receives only signed predicates β raw PII is crypto-shredded and never stored.
Issuer publishes a compressed bitstring. Verifier downloads the entire list and checks locally. Issuer cannot tell which credential was checked.
Was passiert, wenn der Worst-Case eintritt?
Data Protection Impact Assessment β GDPR Article 35
Every transaction that touches your wallet is logged β what was shared, what was withheld, what was forgotten. At the end of the day, you review your complete data flow and claims lifecycle. No pressure. No decision. Just clarity.
This is a concept preview. The daily review is on the roadmap β see below.
A wave of EU legislation is creating legal rights for individuals to access their data β and compliance obligations for institutions that process it. miTch is built exactly at this intersection.
miTch is built in three layers, each extending user control one step further β from what you share, to what you see, to what you can prove.
miTch is modular by design. Our monorepo is divided into five specialized layers, each rigorously tested and hardened against modern threats.
The verifier confirmed your claim without seeing any personal data. The session key has been destroyed β this interaction is now mathematically irrecoverable.
Want to see how we meet every GDPR requirement?
Comparison: "Login with Google" typically shares all requested fields. miTch checks each field individually.