{"id":7237,"date":"2023-02-22T18:28:07","date_gmt":"2023-02-22T18:28:07","guid":{"rendered":"https:\/\/davelevy.info\/wiki\/?p=7237"},"modified":"2023-12-07T11:51:29","modified_gmt":"2023-12-07T11:51:29","slug":"digital-identity-and-privacy","status":"publish","type":"post","link":"https:\/\/davelevy.info\/wiki\/digital-identity-and-privacy\/","title":{"rendered":"Digital identity and privacy"},"content":{"rendered":"\n<p>The issue of digital identity was raised as a CTOE meeting; so what&#8217;s happening &#8230;<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>What do people think?<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019-2024\/europe-fit-digital-age\/european-digital-identity_en\">Europe-fit-digital-age, European-digital-identity<\/a> on the Commission site<\/li>\n\n\n\n<li>Three news articles, <a href=\"https:\/\/www.politico.eu\/article\/we-need-more-protection-government-surveillance-not-less\/\">We need more protection government surveillance not less<\/a>  also <a href=\"https:\/\/www.politico.eu\/article\/eu-commission-violation-privacy-endangering-encryption\/\">EU Commission&#8217;s gross violation of privacy &#8211; endangering-encryption<\/a>, at Politico and <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-57910355\">Pegasus scandal: Are we all becoming unknowing spies?<\/a> at the BBC. This,  <a href=\"https:\/\/www.euractiv.com\/section\/digital\/opinion\/eus-contempt-for-encryption-puts-all-europeans-at-risk\/\">EU\u2019s contempt for encryption puts all Europeans at risk, from<\/a> Euractiv.<\/li>\n\n\n\n<li><a href=\"https:\/\/edri.org\/\">EDRI <\/a>are of course on the case, with their campaign <a href=\"https:\/\/edri.org\/take-action\/our-campaigns\/keep-it-secure\/\">&#8220;keep-it-secure&#8221;<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.schneier.com\/\">Bruce <\/a>on<a href=\"https:\/\/www.schneier.com\/tag\/id-cards\/\"> ID cards<\/a>, he seems to have given up on the issue, but he has published this, <a href=\"ttps:\/\/www.schneier.com\/blog\/archives\/2010\/03\/the_limits_of_i.html\">The_limits_of_identity<\/a> which xrefs a paper by Mason &amp; Bohm in 2010.<\/li>\n\n\n\n<li>The <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:52022PC0209\">coming EU legislation<\/a>, on encryption and the message carriers has attracted much criticism, <a href=\"https:\/\/www.politico.eu\/article\/eu-commission-violation-privacy-endangering-encryption\/\">at politico<\/a> from the Pirate Party, and on <a href=\"https:\/\/mullvad.net\/en\/blog\/2023\/2\/1\/eu-chat-control-law-will-ban-open-source-operating-systems\/\">this personal blog<\/a>., and <a href=\"https:\/\/www.patrick-breyer.de\/en\/posts\/chat-control\/\">here<\/a>.  It maybe that the <a href=\"https:\/\/european-pirateparty.eu\/news\/\">European Pirate Party<\/a> are the best resource on this, they are part of the Green Left group in the European Parliament. They currently have three Czech, and one German MEP[s].<\/li>\n<\/ol>\n\n\n\n<p>The EU are looking at digital identity, their solution has some critics in the industry<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.computerweekly.com\/news\/366557952\/EU-eIDAS-reforms-should-be-actively-resisted-say-experts\">EU eIDAS i.e digital id  reforms should be actively resisted say experts<\/a>, from computer weekly<\/li>\n\n\n\n<li><a href=\"https:\/\/www.theregister.com\/2023\/11\/08\/europe_eidas_browser\/#amp_tf=From%20%251%24s&amp;aoh=16995611330560&amp;csi=0&amp;referrer=https%3A%2F%2Fwww.google.com&amp;ampshare=https%3A%2F%2Fwww.theregister.com%2F2023%2F11%2F08%2Feurope_eidas_browser%2F\">Europe prepares to break browser security with eIDAS 2.0 \u2022 The Register<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>The issue of digital identity was raised as a CTOE meeting; so what&#8217;s happening &#8230;<\/p>\n","protected":false},"author":1,"featured_media":7238,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_share_on_mastodon":"0"},"categories":[140,3],"tags":[1134,522,141,911],"class_list":["post-7237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-politics","category-technology","tag-digital-democracy","tag-identity","tag-politics-2","tag-technology"],"share_on_mastodon":{"url":"","error":""},"jetpack_featured_media_url":"https:\/\/davelevy.info\/wiki\/wp-content\/uploads\/2023\/02\/card-unsplash-w1024-cropped.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/7237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/comments?post=7237"}],"version-history":[{"count":7,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/7237\/revisions"}],"predecessor-version":[{"id":9735,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/7237\/revisions\/9735"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/media\/7238"}],"wp:attachment":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/media?parent=7237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/categories?post=7237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/tags?post=7237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}