The process usually entails scanning all the documents an identity thief would love to get their hands on and then sending them unencrypted, via email. The documents end up at a company which stores them forever using often insufficient security measures. On the other hand, the Ontology developers also need to make users’ security is their first priority. The code must remain open source and needs to be thoroughly peer reviewed to root out bugs and backdoors.