Stephan Engberg

Results 4 issues of Stephan Engberg

### Description Basic trustworthy security has to start with a pseudonymous PID A pseudonymous PID involves the two main security models - trustworthy anonymity and trustworthy pseudonymity. The difference between...

user story

Good to see that efforts have gone into improving ETSI 119 476 (v 1.21) https://www.etsi.org/deliver/etsi_tr/119400_119499/119476/01.02.01_60/tr_119476v010201p.pdf However, it is also clear that there is still far to go before even minimum...

A primary problem with the ARF appriach is the way terminology is obfuscated to mean almost the opposite when it suits the agenda. https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/latest/arf/#413-privacy-by-design E.g. 4.1.3 Privacy by Design The...

### Description Digital society basically works better when services DO NOT create personal data. This is reflected in the eIDAS 2.0 unlinkability requirement implementing trustworthy anonymity with or without accountability...

user story