Insights from Jon Shamah: A Global Perspective on Digital Identity and Transformation

This podcast series, as a series of discussions based on Jon Shamah’s Linkedin blogs, offers a thought-provoking exploration of key topics shaping the digital world today. Drawing from decades of hands-on experience and a strategic viewpoint, Jon delves into the evolving landscape of Digital Identity, the emergence and implications of Digital Wallets, and the broader currents driving digital transformation.
While much of the analysis is rooted in developments across Europe, the series adopts a truly global lens—examining international policy frameworks, technical standards, and cross-border interoperability challenges. Whether addressing the urgency for unified digital identity ecosystems or highlighting innovations that are reshaping user trust and data sovereignty, each episode offers practical insight informed by expertise and critical reflection.
By bridging strategic vision with real-world implementation, The podcasts invite listeners and readers alike to engage with the future of digital trust architecture—one informed by experience, enriched by collaboration, and poised for global relevance.

[Note that the discussions are by Jon Shamah's favourite AI friends.]

Listen on:

  • Apple Podcasts
  • Podbean App
  • Spotify
  • Amazon Music
  • PlayerFM
  • Podchaser

Episodes

53 minutes ago

There is a technological transition in digital identity management, specifically the shift from physical hardware to cloud-based environments. While traditional on-premises systems offered robust security, they were often hindered by high maintenance costs and limited scalability. Modern remote secure element (RSE) technology now allows organisations to maintain high levels of trust and eIDAS 2.0 compliance without the need for physical tokens or local server rooms. This cloud-centric approach facilitates global expansion and remote onboarding while empowering users through verifiable credentials and better data control. Despite these advancements, the source notes that on-premises solutions remain essential for entities facing strict data sovereignty rules or unreliable internet connectivity. Ultimately, the future of digital signing is presented as a flexible choice between cloud agility and the physical oversight of specialized hardware.

Wednesday Feb 04, 2026

The EUDI Wallet revolutionises EU academia by providing a secure, user-controlled platform for digital credentials. It enables seamless cross-border mobility, replaces paper-based diplomas with verified attestations, and streamlines Erasmus applications and university access.

Sunday Feb 01, 2026

The eIDAS 2.0 regulation introduces the EUDI Wallet to revolutionise EU insurance. It enables secure identity verification, verified attributes, and Qualified Electronic Signatures. This framework streamlines onboarding, ensures cross-border legal certainty, and reduces fraud.

Friday Jan 16, 2026

Europe is currently navigating a complex digital transition that extends far beyond simple technological adoption to encompass social and economic integration. While certain nations like Estonia lead the way, significant disparities in digital literacy persist across the continent, with nearly half of the population lacking foundational skills. To address this, the text proposes a strategy built on education, motivation, and inclusive support for those unable to use online systems. The ultimate goal is to move towards a paperless administration without abandoning vulnerable groups who face barriers to entry. Success depends on whether governments can provide tangible incentives and personalised assistance to overcome the "last mile" of total digital inclusion. Ultimately, the author questions whether Europe possesses the collective political will to ensure this evolution benefits every citizen equally.

Tuesday Dec 16, 2025

Establishing a formal, trusted assistance model to ensure that all European Union citizens can participate securely in an increasingly digital society is essential. Despite the convenience of digital transformation, a significant portion of the population faces exclusion due to limited digital skills, device access, or other barriers like disability. One solution is by leveraging the upcoming European Digital Identity (EUDI) Wallet and the expanded eIDAS 2 framework to create a "Qualified Assistance Provider" model, which would enable trained, audited staff to help citizens perform secure digital transactions on their behalf. This structure aims to address the structural inequity arising from essential services moving online and suggests funding local assistance hubs, such as libraries and NGOs, to offer these auditable and legally equivalent assisted interactions.
By explicitly designing for permanent assistance to ensure resilience and universal inclusion in a fully digital EU, the future of each and every EU citizen is recognised equally.

Sunday Dec 07, 2025

Horizon Europe, the EU’s flagship research and innovation program, has been instrumental in advancing science and technology across Europe. Its structured approach—organized around predefined missions, thematic clusters, and detailed work programs—has ensured alignment with strategic priorities. However, this rigidity comes at a cost: it limits the ability to respond to emerging challenges, stifles high-risk research, and constrains creativity.

Wednesday Dec 03, 2025

Navigating your social media feed can feel like walking through a maze of conflicting signals. Yet, behind the chaos, there is often a deliberate and surprisingly simple playbook used to engineer and spread false news. This article breaks down that predictable formula for deception, step by step.The Spark: It Begins with a Bad Actor and a Deliberate FalsehoodThe genesis of any false news campaign is deceptively simple: it begins when a bad actor deliberately engineers a falsehood for a specific, manipulative purpose. This is not a misunderstanding or an accident; it is the calculated construction of a lie designed to exploit biases and provoke a reaction. This initial step is critical, as it frames the entire operation not as organic misinformation, but as a premeditated act of digital sabotage.The Megaphone: How AI and Social Media Amplify the Original LieOnce crafted, the lie is supercharged through a two-pronged attack designed to make it both believable and unavoidable. First comes substantiation, where bad actors create a thin veneer of credibility by producing fake evidence—forged documents, sham news sites, or phony expert accounts—to support their original claim. This gives the falsehood an illusion of legitimacy.Simultaneously, social media platforms become the distribution channel for an aggressive amplification campaign. Using technologies like AI amplification, a single lie can be multiplied into thousands of posts, comments, and shares, creating the false impression of a groundswell of organic consensus. This strategy weaponizes repetition, broadcasting the repeat amplified original message across the network. This exploits a psychological vulnerability known as the "illusory truth effect," where our brains mistake familiarity for accuracy. Seeing the lie over and over makes it feel true.The Impact: An Uninformed Public Makes Influenced DecisionsThis digital manipulation achieves its final, damaging goal when the amplified falsehood successfully penetrates the awareness of an uninformed public. Bombarded with a seemingly credible and widely repeated message, people are persuaded to accept the lie as fact. The ultimate consequence is that an individual or group makes an influenced bad decision based on lies, turning a digital fabrication into a real-world action with damaging outcomes.Breaking the CycleThis three-step process—calculated creation, dual-pronged amplification, and real-world impact—is a rinse-and-repeat strategy used by bad actors to systematically manipulate public perception. It starts with a deliberate falsehood, uses technology to make it appear credible and ubiquitous, and ends when an uninformed public makes poor decisions.
Now that we can see the blueprint for false news, what is our role in stopping its spread?
 
 

Thursday Nov 27, 2025

For numerous organizations, including government authorities and private entities, to achieve Qualified Trust Service Provider (QTSP) status necessary for issuing Verifiable Credentials (VCs) under the EU’s eIDAS regulation is a difficult. Becoming a QTSP internally presents significant operational challenges, requiring complex compliance with mandatory standards for advanced cryptographic systems, interoperability schemas, and strict GDPR mandates concerning selective disclosure and real-time revocation. To bypass this resource-intensive internal burden, We identify four strategic alternatives, ranging from expensive, slow consultancy engagement to highly capital-intensive business acquisition. The analysis consistently favours the cloud services integration model, which offers inherent scalability, cost efficiency, and simplified regulatory compliance by utilizing specialised third-party components. Choosing the correct strategy depends on an organization’s internal resources, tolerance for third-party dependency, and the importance of rapid market deployment within the emerging EUDI Wallet ecosystem. (PS. I do use my AI friends to explain this in audio format.)

Tuesday Nov 25, 2025

The pursuit of autonomous, conscious robotics remains one of the most ambitious goals in modern engineering. Popular culture, epitomized by Marvin the Paranoid Android from The Hitchhiker’s Guide to the Galaxy, envisions machines with limitless computational capacity and self-awareness. However, this vision is fundamentally constrained by three interlocking barriers: the immutable laws of physics, the systemic reliance on centralized architectures, and the unresolved ethical dilemmas of codifying morality into non-human agents.

Wednesday Nov 19, 2025

The increasing complexity of Artificial Intelligence Agents present major challenges within digital identity and signing systems. As AI agents evolve from simple programmed interactions to those involving complex, self-determining processes, issues of liability and risk will become paramount, especially when agents interact with counterparts, delegate tasks, or pursue open-ended missions. To resolve this increasing complexity and prevent the abandonment of advanced agents, a framework is proposed that mandates Terms and Conditions (Ts and Cs) for transactions, clearly defining liability boundaries and incorporating strict controlling algorithms.

Copyright 2025 All rights reserved.

Podcast Powered By Podbean

Version: 20241125