Trust Incident Response

After the ANTS data breach, identity alone is not enough.

When identity-related data is exposed, attackers can make sensitive requests look more credible. The missing layer is reviewable receipt state around sensitive requests.

Published by Passpod · 2026-05-15 · Category: receipt-state verification
Boundary: Passpod does not claim it would have prevented the ANTS / France Titres incident. This article maps a practical receipt-state workflow for making sensitive requests more reviewable after identity data exposure.

The practical risk

After identity data exposure, the core risk is not only that personal data has leaked. The risk is that attackers can use that data to make sensitive requests look legitimate.

A message may contain real details. A request may reference a real agency, document, or account process.

The better question is: can the sensitive request itself be reviewed, scoped, expired, revoked, and verified later?

Why identity alone is not enough

Identity can help answer: who is this person?

But a sensitive request also needs to answer who is requesting, for what purpose, what is being requested, how long it remains valid, whether it can be revoked, what receipt exists later, and who makes the final decision.

That is the gap Passpod is designed around.

Passpod-compatible workflow

A receipt-state workflow makes the request itself reviewable before action.

01Requester context
02Purpose and scope review
03Consent or rejection
04Receipt state recorded
05Expiry and revocation
06DIDX receipt-state verification
07Responsible-party decision
08Audit context
  1. A requester initiates a sensitive action.
  2. PassPal displays requester context in plain language.
  3. The user reviews purpose, scope, expiry, and source-labeled evidence.
  4. The user consents, rejects, or requests review.
  5. Passpod records limited receipt state.
  6. DIDX verifies limited receipt state.
  7. The responsible party makes the final decision.

What each layer does

PassPal

Shows who is requesting, why the request exists, what is being asked, what evidence is referenced, when the receipt expires, whether it can be revoked, and what happens next.

Passpod

Records limited receipt state: request type, requester context, purpose, scope, consent state, expiry, revocation state, source-labeled evidence references, and verification state.

DIDX

Verifies limited receipt state without exposing private documents by default.

Responsible party

Makes the final decision. Passpod records receipt state; it does not act as the final authority.

Example receipt payload

A simplified receipt-state payload can make the workflow testable by developers, security teams, and policy reviewers.

{
  "receipt_type": "sensitive_request_review",
  "incident_context": "post_identity_data_exposure",
  "requester_context": {
    "type": "agency_or_service_request",
    "verification_state": "source_labeled_review_required"
  },
  "purpose": "account_recovery_or_sensitive_document_action",
  "scope": [
    "requested_action",
    "required_evidence",
    "expiration",
    "responsible_party"
  ],
  "consent_state": "user_review_required",
  "expires_at": "2026-06-15T00:00:00Z",
  "revocation_state": "revocable",
  "passpal_display": [
    "who_is_requesting",
    "why_it_is_requested",
    "what_is_requested",
    "how_long_it_lasts",
    "what_can_be_revoked"
  ],
  "passpod_records": [
    "request_type",
    "purpose",
    "scope",
    "consent_state",
    "expiry",
    "revocation_state",
    "source_labeled_evidence"
  ],
  "didx_verifies": [
    "limited_receipt_state",
    "receipt_status",
    "expiry_state",
    "revocation_state"
  ],
  "private_documents_stored_by_default": false,
  "final_decision_authority": "responsible_party_decides",
  "guarantee": "not_a_guarantee"
}

Console scenario

The matching console scenario is Post-breach sensitive request verification.

It models a sandbox Passpod receipt workflow for reviewing sensitive requests after identity data exposure, including identity exposure, phishing risk, requester impersonation, and account recovery abuse.

{
  "scenario_id": "post_breach_sensitive_request_review",
  "title": "Post-breach sensitive request verification",
  "description": "A sandbox Passpod receipt workflow for reviewing sensitive requests after identity data exposure.",
  "risk_context": [
    "identity_data_exposure",
    "phishing_risk",
    "requester_impersonation",
    "account_recovery_abuse"
  ],
  "workflow": [
    "requester_context",
    "purpose_scope_review",
    "policy_check",
    "user_consent",
    "receipt_state_recorded",
    "expiry_revocation",
    "didx_receipt_state_verification",
    "responsible_party_decision"
  ],
  "sample_payload": {
    "receipt_type": "sensitive_request_review",
    "incident_context": "post_identity_data_exposure",
    "requester_context": {
      "type": "agency_or_service_request",
      "verification_state": "source_labeled_review_required"
    },
    "purpose": "account_recovery_or_sensitive_document_action",
    "scope": [
      "requested_action",
      "required_evidence",
      "expiration",
      "responsible_party"
    ],
    "consent_state": "user_review_required",
    "expires_at": "2026-06-15T00:00:00Z",
    "revocation_state": "revocable",
    "passpal_display": [
      "who_is_requesting",
      "why_it_is_requested",
      "what_is_requested",
      "how_long_it_lasts",
      "what_can_be_revoked"
    ],
    "passpod_records": [
      "request_type",
      "purpose",
      "scope",
      "consent_state",
      "expiry",
      "revocation_state",
      "source_labeled_evidence"
    ],
    "didx_verifies": [
      "limited_receipt_state",
      "receipt_status",
      "expiry_state",
      "revocation_state"
    ],
    "private_documents_stored_by_default": false,
    "final_decision_authority": "responsible_party_decides",
    "guarantee": "not_a_guarantee"
  },
  "safe_positioning": [
    "does_not_claim_breach_prevention",
    "does_not_replace_public_authorities",
    "does_not_replace_wallets",
    "does_not_make_final_decision",
    "does_not_store_private_documents_by_default"
  ]
}

Open PassPal Console

How organizations can adopt this pattern

Layer 1 — Requester context

Before asking for sensitive action, show who is requesting, the claimed authority, the reason, and the evidence source.

Layer 2 — Consent and receipt state

Show purpose, scope, expiry, and revocation. Record limited receipt state instead of exposing unnecessary private documents.

Layer 3 — Verification and responsible-party decision

Verify receipt state before action. Preserve the boundary that the responsible party makes the final decision.

What is not guaranteed

FAQ

Is Passpod an identity provider?

No. Passpod is not an identity provider. It is a trust receipt protocol for sensitive digital decisions.

Does Passpod replace wallets?

No. Passpod is wallet-complementary. Wallets can prove credentials. Passpod records what happened around a sensitive request.

Would Passpod have prevented the breach?

No. Passpod should not be described as a breach-prevention tool. It adds a receipt-state workflow layer that can make sensitive requests more reviewable after data exposure.

Is DIDX a score?

No. DIDX should be described as readable receipt-state context, not as a people-ranking system.

Who decides?

The responsible party decides. Passpod records limited receipt state.