Knowledge Center
Blog
The Digital Wallet Boom and the Identity Problem Nobody's Solving

The Phone Has Become the Wallet
In 2025, 4.5 billion people use digital wallets. By 2030, that number will reach 6 billion — over 70% of the global population.
Digital wallets now account for 32% of all point-of-sale transactions globally, more than any other payment type. They captured 53% of all online purchases in 2024. In the United States alone, proximity mobile payments totalled $670 billion last year. Globally, digital wallet transactions hit $10 trillion in 2024 and are projected to surpass $17 trillion by 2029.
The phone is no longer an accessory to financial life. It is financial life. Apple Pay, Google Pay, PayPal, Cash App — these aren't apps anymore. They're the primary interface between billions of people and their money.
And 20% of Americans with digital wallets now regularly leave home without a physical wallet at all. The phone is the wallet, the ID, the payment terminal, and the access point to every financial relationship a person has.
The question nobody seems to be asking: what's actually securing it?
A $10 Trillion Infrastructure Built on a Broken Foundation
The identity layer underpinning digital wallets hasn't kept pace with adoption. The same authentication mechanisms that were inadequate five years ago, passwords, SMS codes, email-based recovery, are now responsible for securing a financial infrastructure processing trillions of dollars annually.
Consumers sense this. According to Capital One Shopping's 2026 report, 42% of consumers are concerned about the security of digital wallets. That's not a fringe opinion. That's nearly half the user base signaling that the trust isn't there.
And they're right to be concerned. The attack surface isn't shrinking as wallets scale — it's expanding. Every digital wallet account is ultimately anchored to an identity. And that identity is still authenticated through mechanisms that attackers routinely bypass: passwords that get stuffed, OTPs that get intercepted, phone numbers that get swapped.
When a digital wallet holds someone's credit cards, debit cards, loyalty programs, and increasingly their ID credentials, compromising the identity behind that wallet doesn't just drain an account. It compromises an entire financial life.
The SIM Swap Problem Scales with the Wallet
SIM swap fraud surged 1,055% in the UK in 2024. The attack is straightforward: a criminal ports a victim's phone number, intercepts every SMS-based authentication code, and takes over every account protected by that number.
As digital wallets scale to billions of users, this problem doesn't stay contained; it compounds. More wallets mean more accounts tied to phone numbers. More accounts mean higher-value targets. Higher-value targets mean more sophisticated and more frequent attacks.
The tragic irony is that digital wallets are moving financial life onto the phone while the identity securing that phone is still anchored to a phone number — a routing mechanism that was never designed to prove who someone is.
A phone number tells the network where to send a call. It doesn't verify the human holding the device. It doesn't prove intent. It doesn't resist social engineering. And yet it remains the foundation of account recovery, two-factor authentication, and identity verification for the majority of digital wallet providers.
At $10 trillion in annual transaction value and growing, this isn't an acceptable gap. It's a systemic vulnerability.
The APAC Growth Story Is Also the APAC Risk Story
The fastest digital wallet adoption is happening in markets with the least developed hardware-rooted identity infrastructure.
India leads global adoption at 90.8% of consumers. Indonesia follows at 89.8%. Thailand at 89.0%. The Asia-Pacific region already commands a 35.4% share of the global mobile payment market.
These are also markets where SIM swap vulnerability is elevated, where telecom infrastructure varies widely in security maturity, and where the sheer scale of mobile-first populations creates attack surfaces that software-only fraud detection cannot cover.
India alone has over a billion mobile connections. Indonesia has nearly 350 million. When adoption rates above 89% meet populations of this scale, the number of wallet accounts anchored to vulnerable phone numbers is staggering.
The growth story is real. But so is the risk. Scaling digital wallets without scaling the identity infrastructure that secures them is building a financial system on foundations that attackers already know how to exploit.
Why Software-Only Security Can't Keep Up
Digital wallet providers have invested heavily in fraud detection: device fingerprinting, behavioural biometrics, transaction monitoring, machine learning risk models. These tools have value. They catch anomalies, flag suspicious patterns, and reduce losses at the margins.
But they share a fundamental limitation: they operate in the same layer the attacker controls.
Device fingerprints can be spoofed. Behavioural baselines don't apply during account recovery flows — which is exactly when most takeovers happen. Risk models are reactive by design, identifying fraud after the fact rather than preventing it architecturally.
The result is an arms race where defenders add complexity and cost while attackers iterate around each new layer. Detection improves incrementally. Attacks improve exponentially.
The missing piece isn't better detection. It's a trust anchor that exists below the application layer — one that attackers cannot reach, cannot spoof, and cannot socially engineer away from a carrier employee.
Hardware-Rooted Identity: The Infrastructure Layer That's Missing
SLC Digital's approach addresses the identity gap at the architectural level. Rather than layering more software checks on top of a vulnerable foundation, SLC authenticates through the SIM's cryptographic identity via a dedicated channel.
The SIM card in every mobile device is already a tamper-resistant secure element — a hardware chip designed to store cryptographic keys and perform authentication operations in isolation. It's the same technology that secures carrier authentication for billions of mobile connections globally.
SLC uses this existing hardware to generate deterministic proof of identity. Authentication is cryptographically signed by the physical SIM and transmitted over the mobile network, not the internet, not through an app, and not via a phone number.
This changes the security model for digital wallets fundamentally:
Account creation can require hardware proof, making automated fake wallet creation structurally impossible.
Transaction authentication can be signed by the SIM, providing cryptographic proof that the authorized device holder initiated the payment, not someone who intercepted a code.
Account recovery no longer needs to fall back to SMS or email. The SIM itself is the recovery credential, and it can't be ported to an attacker.
SIM swap attacks become irrelevant because the authentication doesn't use the phone number. It uses the cryptographic keys embedded in the SIM hardware, which cannot be transferred.
The phone is already the wallet. The SIM can be the identity. The infrastructure exists — it's just not being used.
The 42% Problem Is a Market Signal
When 42% of consumers say they're concerned about digital wallet security, that's not just a sentiment data point. It's a market signal.
Trust is the constraint on adoption. Not technology, not convenience, not availability. The wallets work. The payments clear. The experience is fast. But nearly half of users don't fully trust it.
For digital wallet providers, this is the growth ceiling. Every percentage point of consumer trust translates to adoption, usage frequency, and transaction volume. The providers who solve the trust problem don't just retain users — they unlock the next phase of growth.
For financial institutions and regulators, the 42% figure is a warning. As wallets absorb more of the financial stack, not just payments, but identity documents, loyalty programs, transit passes, and eventually government credentials, the security expectations will only increase. The current infrastructure won't meet them.
The Bottom Line
The digital wallet boom is real. 4.5 billion users, $10 trillion in transactions, 32% of global POS payments, and growth accelerating across every region.
But the identity infrastructure securing these wallets hasn't scaled with them. Phone numbers are still treated as identity. SMS is still treated as a security layer. And software-only detection is still asked to solve a problem that is fundamentally architectural.
The phone has become the most important financial device in the world. The SIM inside it is already a tamper-resistant secure element capable of cryptographic authentication. Connecting these two facts — using the hardware that's already there to secure the wallet that's already there — is the infrastructure upgrade that the digital wallet economy needs.
The question isn't whether digital wallets will keep growing. It's whether the identity layer will grow with them.
Concerned about wallet security at scale? Learn how hardware-rooted identity secures the digital wallet economy →


