Stephan Engberg
Stephan Engberg
### Description Basic trustworthy security has to start with a pseudonymous PID A pseudonymous PID involves the two main security models - trustworthy anonymity and trustworthy pseudonymity. The difference between...
Good to see that efforts have gone into improving ETSI 119 476 (v 1.21) https://www.etsi.org/deliver/etsi_tr/119400_119499/119476/01.02.01_60/tr_119476v010201p.pdf However, it is also clear that there is still far to go before even minimum...
A primary problem with the ARF appriach is the way terminology is obfuscated to mean almost the opposite when it suits the agenda. https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/latest/arf/#413-privacy-by-design E.g. 4.1.3 Privacy by Design The...
### Description Digital society basically works better when services DO NOT create personal data. This is reflected in the eIDAS 2.0 unlinkability requirement implementing trustworthy anonymity with or without accountability...