Important methods for individuals to protect against data hunger and create sovereign identity, good alternative for centralized identity providers

reference