Data Sharing

From Paper Trails to Digital Chains: How Proof of Process and Possession are Revolutionizing Trust

From Paper Trails to Digital Chains: How Proof of Process and Possession are Revolutionizing Trust

From Paper Trails to Digital Chains: How Proof of Process and Possession are Revolutionizing Trust In our increasingly digital world, the need for verifiable trust is more critical than ever. We’re constantly asking two fundamental questions: “What happened?” and “Who was responsible?” Answering these questions reliably and transparently is the key to creating secure, dependable systems.

Read More
Proof of Process - Self-Sovereign Identity

Proof of Process - Self-Sovereign Identity

Your Digital Fingerprint: How “Proof of Process” Can Revolutionize Self-Sovereign Identity In our increasingly digital world, proving who you are online is a constant, cumbersome battle. We hand over sensitive documents, answer security questions, and rely on centralized authorities to verify our identities – often leading to fragmented data, privacy concerns, and vulnerability to breaches. But what if there was a way to “self-prove” your identity, without constantly exposing your personal data?

Read More
Proof of Process - The unsung hero set to come of age

Proof of Process - The unsung hero set to come of age

Beyond the Hype: Why “Proof of Process” is the Unsung Hero of Trust In the buzzing world of blockchain and decentralized systems, “Proof of Work” (PoW) often steals the spotlight. We hear about its energy consumption, its role in securing Bitcoin, and its fundamental importance in achieving consensus. But what if I told you there’s another “proof” that, while less glamorous, is arguably just as, if not more, critical to building real-world trust and efficiency?

Read More
Privacy by Design - A look back and a look forward

Privacy by Design - A look back and a look forward

From X.400 to SMTP: The Story of a Simpler Takeover In the early days of digital communication, there were two competing visions for email. One was the complex, feature-rich, and highly structured X.400 standard, championed by the International Telecommunication Union (ITU). The other was the simpler, more flexible Simple Mail Transfer Protocol (SMTP), which emerged from the internet’s open and collaborative development. Ultimately, SMTP and complementary protocols like PGP (Pretty Good Privacy) prevailed due to their simplicity, adaptability, and the decentralized nature of the internet.

Read More
Privacy by Design & the EU Data Wallet

Privacy by Design & the EU Data Wallet

From X.400 to SD-JWT: A Privacy Evolution in the EU Digital Identity Wallet The landscape of digital identity is constantly evolving, and with the advent of the EU Digital Identity (EUDI) Wallet, we’re seeing a significant leap towards user-centric and privacy-respecting systems. For those of us with a longer history in digital communication, the term “X.400” might ring a bell. While seemingly disparate, comparing the foundational concepts behind X.400 and the modern SD-JWT (Selective Disclosure for JSON Web Tokens) within the context of the EUDI Wallet highlights a remarkable evolution, particularly in how we handle and control personal data.

Read More
Privacy by Design Comes to the fore

Privacy by Design Comes to the fore

Enhancing Privacy and Security in Messaging with SD-JWT In a world where our digital conversations are the new frontier of personal data, the security and privacy of our messaging applications are more critical than ever. We’ve all grown accustomed to end-to-end encryption, which is a great first step, but what happens when you need to share personal information within a conversation? SD-JWT (Selective Disclosure for JSON Web Tokens) offers a powerful solution that can take messaging privacy to a whole new level.

Read More