This podcast series, as a series of discussions based on Jon Shamah’s Linkedin blogs, offers a thought-provoking exploration of key topics shaping the digital world today. Drawing from decades of hands-on experience and a strategic viewpoint, Jon delves into the evolving landscape of Digital Identity, the emergence and implications of Digital Wallets, and the broader currents driving digital transformation. While much of the analysis is rooted in developments across Europe, the series adopts ...
…
continue reading

1
Watch Out! There is a Regulation About.....
13:22
13:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:22The image of a deer caught in the headlights of an oncoming car comes to mind whenever I remember the eIDAS deadlines for verifiable credentials to be made available by the end of 2027 for all regulated bodies in the EU, the end of 2026 for public administrations.بقلم Jon Shamah
…
continue reading

1
Transforming Society using Digital Wallets
13:22
13:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:22This podcast outlines the transformative potential of Digital Wallets, detailing their functionality, benefits, and the different models emerging, particularly within the EU. Digital Wallets are presented as a secure, efficient, and private means for managing various credentials and facilitating complex transactions. The EU's proactive approach, co…
…
continue reading

1
Digital Design of Public Services: Confronting the Accessibility Challenge
12:47
12:47
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
12:47Governments are increasingly turning to digital platforms to deliver smarter public services, driven by the promise of significant efficiency gains and time savings for citizens. Yet, this transformation presents a critical challenge: how to ensure that these services remain accessible to everyone, regardless of their digital capabilities or circum…
…
continue reading

1
The Ten Commandments of Digital Identity Wallets
13:10
13:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:10There needs to be a comprehensive list of fundamental non-technical specifications to ensure a solid future Digital Wallet based society: 1) Function 2) Trust 3) Use 4) Automation 5) Confidentiality 6) Cost 7) Accessibility 8) Universality 9) Transferability 10) Resilienceبقلم Jon Shamah
…
continue reading

1
Cloud-Based Remote Secure Elements vs. Traditional Solutions for Document Issuers
10:05
10:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
10:05This podcast explores the evolution of digital signing solutions for organisations, contrasting traditional non-cloud methods with cloud-based Remote Secure Element (RSE) technology. While older systems, often relying on on-premises hardware, offer strong physical security, they typically present challenges in scalability and operational costs. Con…
…
continue reading
It is holiday-time and systems that rely on human-beings are under stress, with the deficiencies of those systems designed to supplement human-beings also being exposed. Two issues, alike to an extent but in different academic organisations, have occurred during this holiday season and these have revolved around passwords. With a lack of IT Support…
…
continue reading
I received ethical criticism from am unlikely source recently, and one very close to home. Actually, that criticism hit a very strong ethical point and it should be noted and also discussed further. There have been many discussions online regarding the thorny topic of AI and its ethical impact on society. Most have taken place around Agentic AI and…
…
continue reading

1
The need for QTSPs. It’s not an easy job!
16:19
16:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:19Verifiable credentials (VCs) are digital attestations designed for secure and decentralized identity management within the European Digital Identity Wallet (EUDI Wallet). They use cryptographic signatures, and decentralized identifiers (DIDs) for authentication, privacy, and interoperability. The EUDI Wallet integrates VCs for secure storage, prese…
…
continue reading
In today's interconnected world, the concept of trust has taken on new dimensions. With the advent of technology and the proliferation of online interactions, trusting people in the digital age has become both a necessity and a challenge. As we navigate this complex landscape, it is essential to understand the nuances of trust and the strategies th…
…
continue reading
The important thing is not to panic! There appears to be no real rush. The 2026 deadline is a year away, and all potential QTSPs are pushing off the decision do to take the plunge and invest in their future. However, this appearance of plenty of time is an illusion! Deadlines do have a real habit of rushing towards you. So maybe just a mild panic m…
…
continue reading
This is a common English phrase, used in other languages too, and means that whatever I say or consent to, can be trusted. So, what is the history and how relevant is it in today’s digital age? We must not confuse this phrase with identity verification ‘per se’. Whilst the two are closely related, the verification of an identity does not imply cons…
…
continue reading

1
Money, Money, Money, must be funny.......
9:27
9:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:27Money, Money, Money, must be funny....... I’ve begun to question whether this assertion remains entirely true. Traditionally, money has been divided into two distinct forms: •Anonymized money—banknotes, cash, micropayments, coins. •Larger identifiable sums, typically transferred via bank transactions, drafts, PSD2 mechanisms, etc. While considerabl…
…
continue reading

1
The Global Digital Conference in Geneva – Some Thoughts on Global Identity Ecosystem Resilience
9:30
9:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:30The Global Digital Conference in Geneva – Some Thoughts We have a vast dependence of Digital Signatures and resilience is everything. More and more processes are needing to become Qualified Trusted Service Providers, and implicit in that is becoming reliant on qualified digital signatures to sign attestations, documents, and almost every important …
…
continue reading

1
The Three Little Pigs of Cyber Security
6:47
6:47
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:47This is a tongue-in-cheek approach to thinking about cyber-security for SMEs, using the analogy of the three little pigs and their houses of straw, sticks, and bricks. Its a simple introduction for non-professionals.بقلم Jon Shamah
…
continue reading

1
The EU Business Wallet - Efficiency and Trust for Commerce
10:45
10:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
10:45The European Business Wallet In the Euro area alone, there were over 66 billion non-cash transactions last year, equating to approximately 21 transactions per capita annually. Additionally, the value of online B2B transactions exceeded 1.5 trillion euros, so it is no surprise that attention is now turning to the European Business Wallet.…
…
continue reading
The increasing convergence of new technologies is reshaping the digital landscape in ways that often go unnoticed. A key development within this transformation is Agentic Artificial Intelligence (AI)—systems designed to operate autonomously, make decisions, and achieve predefined objectives without constant human intervention. g tasks, making decis…
…
continue reading

1
Its Summer Time but its no time to rest dealing with important digital issues
11:52
11:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
11:52☀️ Summer might suggest relaxation, but it's a critical time for digital vigilance. With rising cyber threats and the push for secure digital identity solutions across Europe, strategizing and safeguarding infrastructures can't take a holiday. As competition and regulatory pressures grow, consistency and trust must be prioritized—even when the sun’…
…
continue reading