This podcast series, as a series of discussions based on Jon Shamah’s Linkedin blogs, offers a thought-provoking exploration of key topics shaping the digital world today. Drawing from decades of hands-on experience and a strategic viewpoint, Jon delves into the evolving landscape of Digital Identity, the emergence and implications of Digital Wallets, and the broader currents driving digital transformation. While much of the analysis is rooted in developments across Europe, the series adopts ...
…
continue reading
Jon Shamah Podcasts

1
Agentic Risk Mitigation in the Era of the EU Digital Identity Wallet
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07A critical dimension of this evolving Wallet landscape is the emergence of agentic workflows—processes driven by autonomous or semi-autonomous agents. These workflows can be broadly categorized into closed and open models, each presenting distinct challenges and implications for responsibility and liability.…
…
continue reading
Think of trust on a unimaginable scale. Think about it. How does a massive organization like a huge bank or even an entire city handle the job of digitally signing thousands or even millions of documents. It's a huge challenge and it's forcing a major rethink of how we prove who we are online. Examples such as a city government, a multinational cor…
…
continue reading

1
Australia’s Deepfake Dilemma and the Danish Solution
5:54
5:54
Play later
Play later
Lists
Like
Liked
5:54This is a really great article that I came across in 'The Strategist' Australia’s Deepfake Dilemma and the Danish Solution By Andrew Horton and Elizabeth Lawler Countries need to move beyond simply pleading with internet platforms for better content moderation and instead implement new legal frameworks that empower citizens directly. For a model of…
…
continue reading

1
Watch Out! There is a Regulation About.....
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22The image of a deer caught in the headlights of an oncoming car comes to mind whenever I remember the eIDAS deadlines for verifiable credentials to be made available by the end of 2027 for all regulated bodies in the EU, the end of 2026 for public administrations.By Jon Shamah
…
continue reading

1
Transforming Society using Digital Wallets
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22This podcast outlines the transformative potential of Digital Wallets, detailing their functionality, benefits, and the different models emerging, particularly within the EU. Digital Wallets are presented as a secure, efficient, and private means for managing various credentials and facilitating complex transactions. The EU's proactive approach, co…
…
continue reading

1
Digital Design of Public Services: Confronting the Accessibility Challenge
12:47
12:47
Play later
Play later
Lists
Like
Liked
12:47Governments are increasingly turning to digital platforms to deliver smarter public services, driven by the promise of significant efficiency gains and time savings for citizens. Yet, this transformation presents a critical challenge: how to ensure that these services remain accessible to everyone, regardless of their digital capabilities or circum…
…
continue reading

1
The Ten Commandments of Digital Identity Wallets
13:10
13:10
Play later
Play later
Lists
Like
Liked
13:10There needs to be a comprehensive list of fundamental non-technical specifications to ensure a solid future Digital Wallet based society: 1) Function 2) Trust 3) Use 4) Automation 5) Confidentiality 6) Cost 7) Accessibility 8) Universality 9) Transferability 10) ResilienceBy Jon Shamah
…
continue reading

1
Cloud-Based Remote Secure Elements vs. Traditional Solutions for Document Issuers
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05This podcast explores the evolution of digital signing solutions for organisations, contrasting traditional non-cloud methods with cloud-based Remote Secure Element (RSE) technology. While older systems, often relying on on-premises hardware, offer strong physical security, they typically present challenges in scalability and operational costs. Con…
…
continue reading
It is holiday-time and systems that rely on human-beings are under stress, with the deficiencies of those systems designed to supplement human-beings also being exposed. Two issues, alike to an extent but in different academic organisations, have occurred during this holiday season and these have revolved around passwords. With a lack of IT Support…
…
continue reading
I received ethical criticism from am unlikely source recently, and one very close to home. Actually, that criticism hit a very strong ethical point and it should be noted and also discussed further. There have been many discussions online regarding the thorny topic of AI and its ethical impact on society. Most have taken place around Agentic AI and…
…
continue reading

1
The need for QTSPs. It’s not an easy job!
16:19
16:19
Play later
Play later
Lists
Like
Liked
16:19Verifiable credentials (VCs) are digital attestations designed for secure and decentralized identity management within the European Digital Identity Wallet (EUDI Wallet). They use cryptographic signatures, and decentralized identifiers (DIDs) for authentication, privacy, and interoperability. The EUDI Wallet integrates VCs for secure storage, prese…
…
continue reading
In today's interconnected world, the concept of trust has taken on new dimensions. With the advent of technology and the proliferation of online interactions, trusting people in the digital age has become both a necessity and a challenge. As we navigate this complex landscape, it is essential to understand the nuances of trust and the strategies th…
…
continue reading
The important thing is not to panic! There appears to be no real rush. The 2026 deadline is a year away, and all potential QTSPs are pushing off the decision do to take the plunge and invest in their future. However, this appearance of plenty of time is an illusion! Deadlines do have a real habit of rushing towards you. So maybe just a mild panic m…
…
continue reading
This is a common English phrase, used in other languages too, and means that whatever I say or consent to, can be trusted. So, what is the history and how relevant is it in today’s digital age? We must not confuse this phrase with identity verification ‘per se’. Whilst the two are closely related, the verification of an identity does not imply cons…
…
continue reading
Money, Money, Money, must be funny....... I’ve begun to question whether this assertion remains entirely true. Traditionally, money has been divided into two distinct forms: •Anonymized money—banknotes, cash, micropayments, coins. •Larger identifiable sums, typically transferred via bank transactions, drafts, PSD2 mechanisms, etc. While considerabl…
…
continue reading

1
The Global Digital Conference in Geneva – Some Thoughts on Global Identity Ecosystem Resilience
9:30
9:30
Play later
Play later
Lists
Like
Liked
9:30The Global Digital Conference in Geneva – Some Thoughts We have a vast dependence of Digital Signatures and resilience is everything. More and more processes are needing to become Qualified Trusted Service Providers, and implicit in that is becoming reliant on qualified digital signatures to sign attestations, documents, and almost every important …
…
continue reading
This is a tongue-in-cheek approach to thinking about cyber-security for SMEs, using the analogy of the three little pigs and their houses of straw, sticks, and bricks. Its a simple introduction for non-professionals.By Jon Shamah
…
continue reading

1
The EU Business Wallet - Efficiency and Trust for Commerce
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45The European Business Wallet In the Euro area alone, there were over 66 billion non-cash transactions last year, equating to approximately 21 transactions per capita annually. Additionally, the value of online B2B transactions exceeded 1.5 trillion euros, so it is no surprise that attention is now turning to the European Business Wallet.…
…
continue reading
The increasing convergence of new technologies is reshaping the digital landscape in ways that often go unnoticed. A key development within this transformation is Agentic Artificial Intelligence (AI)—systems designed to operate autonomously, make decisions, and achieve predefined objectives without constant human intervention. g tasks, making decis…
…
continue reading

1
Its Summer Time but its no time to rest dealing with important digital issues
11:52
11:52
Play later
Play later
Lists
Like
Liked
11:52☀️ Summer might suggest relaxation, but it's a critical time for digital vigilance. With rising cyber threats and the push for secure digital identity solutions across Europe, strategizing and safeguarding infrastructures can't take a holiday. As competition and regulatory pressures grow, consistency and trust must be prioritized—even when the sun’…
…
continue reading