Skip to main content

POST It doesn't get more personal than this

I had the great good fortune to be asked to chair Leadership Workshop on Personal Data at this year’s Mobile World Congress in Barcelona. We had presentations from the US and EU and a global panel to discuss the ways in which digital identity can contribute to a digital society. 

GSMA Ministerial Programme 2016

During the discussions, which obviously in the GSMA context touched on the role of mobile phones in digital identity infrastructure, I began to reflect on the extent to which privacy should be an emergent property of the chosen infrastructure. In other words, can we use the tolls that we have our disposal now (smart cards, biometrics, the internet and so on) to construct a digital identity infrastructure that delivers privacy to citizens in the same way that seat belts deliver safety to drivers: built in, not optional, unobtrusive, cost effective, sensible.

Personal Data Panel

Where’s the seat belt for my digital identity?

Now, I tend to have rather fixed views on this topic, because I’ma big fan of pseudonymity and identity partitioning.

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...