Insights from Jon Shamah: A Global Perspective on Digital Identity and Transformation
This podcast series, as a series of discussions based on Jon Shamah’s Linkedin blogs, offers a thought-provoking exploration of key topics shaping the digital world today. Drawing from decades of hands-on experience and a strategic viewpoint, Jon delves into the evolving landscape of Digital Identity, the emergence and implications of Digital Wallets, and the broader currents driving digital transformation.
While much of the analysis is rooted in developments across Europe, the series adopts a truly global lens—examining international policy frameworks, technical standards, and cross-border interoperability challenges. Whether addressing the urgency for unified digital identity ecosystems or highlighting innovations that are reshaping user trust and data sovereignty, each episode offers practical insight informed by expertise and critical reflection.
By bridging strategic vision with real-world implementation, The podcasts invite listeners and readers alike to engage with the future of digital trust architecture—one informed by experience, enriched by collaboration, and poised for global relevance.
[Note that the discussions are by Jon Shamah's favourite AI friends.]
Episodes

2 hours ago
2 hours ago
Exploring the evolution of digital commerce, contrasting early internet predictions with the current reality of algorithm-driven marketplaces. While consumers often believe comparison websites offer neutral guidance, the source reveals these platforms frequently prioritise corporate profit and supplier fees over genuine user needs. Introduces the concept of autonomous customer agents as a potential solution to navigate these biased environments more effectively. However, this shift toward automated shopping raises significant concerns regarding legal liability, financial transparency, and consumer protection. Ultimately, as independent digital entities begin to handle transactions, society must establish new regulatory guardrails to manage the resulting risks.

2 days ago
2 days ago
Discussing the emergence of swarm attacks, a strategic threat where multiple low-cost disruptions are coordinated to overwhelm distributed infrastructure. Rather than a single massive strike, these campaigns use a combination of digital interference, physical tampering, and misinformation to exhaust an organisation’s defences. Emphasising that modern resilience requires shifting focus from total prevention to maintaining essential services during simultaneous failures. To counter these threats, leaders must integrate cyber and physical security, implement rigorous identity controls, and develop robust plans for degraded operations. Ultimately, it is argued that surviving such attacks depends on enterprise-wide coordination and the ability to detect patterns across seemingly unrelated minor incidents.

Friday May 01, 2026
Friday May 01, 2026
This episode discusses the rapid integration of artificial intelligence within modern business operations, highlighting how automation can enhance efficiency and strategic growth. While small and medium-sized enterprises benefit from lowered costs and streamlined processes, there is a growing over-reliance on unmoderated algorithms. This dependency risks a loss of institutional knowledge and human intuition, occasionally leading to significant real-world errors. Furthermore, it is argued that AI lacks genuine empathy, which remains a vital component of successful customer relations and competitive branding. Ultimately, there is a need for rigorous human oversight and the implementation of non-technical guidelines to mitigate the liabilities of automated decision-making. Managers are encouraged to maintain a "human in the loop" approach to ensure accuracy and preserve personal connections in commerce.

Friday May 01, 2026
Friday May 01, 2026
This webinar outlines the critical necessity of interoperability within digital identity systems to overcome the inefficiencies of fragmented national frameworks. It highlights how the transition to eIDAS 2.0 establishes a unified legal and technical basis for cross-border authentication, ensuring that digital signatures and identity wallets carry equal legal weight across different jurisdictions. By mandating standardised security requirements and certification processes, these reforms eliminate administrative hurdles and strengthen legal certainty for high-stakes sectors like finance and healthcare. This harmonised approach facilitates labour mobility and international trade by allowing citizens to manage their credentials through a secure, portable European Digital Identity Wallet. Ultimately, the document presents universal identity compatibility as a strategic investment that bolsters economic competitiveness, public sector productivity, and modern digital security.

Sunday Apr 19, 2026
Sunday Apr 19, 2026
Looking forward to the next generation of digital wallets is always tricky. We have become accustomed to thinking of the European Digital Identity (EUDI) Wallet primarily as a carrier of official credentials and as a mechanism for tightly scoped, bilateral interactions. Beyond these familiar patterns however, the conceptual horizon remains surprisingly constrained.
A next generation of digital wallets should aspire to something more ambitious. Conceptually, such wallets should resemble the physical wallet not merely in function, but in universality. At the same time, their inherently digital nature should allow them to move well beyond the limitations of physical artefacts, enabling automation, structured interaction, and assurance at scale. This implies a shift in perspective—away from wallets as passive endpoints for credential presentation, and towards wallets as active participants in digital interactions.
Why the kitten? Listen on.......

Thursday Apr 09, 2026
Thursday Apr 09, 2026
Agentic AI—artificial intelligence systems capable of acting on behalf of individuals with a degree of autonomy—holds particularly significant promise for segments of the population that have struggled to benefit from previous waves of digital innovation. For many people, technological progress has not translated into empowerment but into growing complexity, confusion, and exclusion. If agentic AI is designed and governed with inclusion at its core, it offers an opportunity not simply to advance technology, but to rebalance access to capability, reducing the cognitive and technical demands that modern digital life increasingly places on individuals.

Monday Mar 23, 2026
Monday Mar 23, 2026
The first question any agent must answer is simply “Who are you?” But this is not a trivial inquiry. For an AI‑based agent, establishing identity requires more than a label or a model ID. It requires a resolvable, unique identifier that allows relying parties to cryptographically verify which specific agent instance they are interacting with; it also requires a clear statement of the ultimate beneficial owner—the human user or legal person in whose name the agent acts and who carries legal accountability for its behaviour—together with the operator or provider responsible for safety, security and correct functioning. eIDAS 2.0 supplies the legal and technical primitives for this binding through the concepts of personal identification data, electronic attestations of attributes, and their qualified forms, allowing issuers and relying parties to attach legal effect and assurance levels to digital identities and roles in a harmonised way across the Union.

Monday Mar 23, 2026
Monday Mar 23, 2026
In the real, non-comic strip world, offering ‘Trust’ does not ensure that matters will not go wrong, it highlights that those who profess as being ‘trustworthy’ have to backup the proposition with risk mitigation and liability acceptance when things do.So, in this digital ecosystem, whether you are a ‘Trustworthy Source’, a ‘Qualified Trust Service Provider’ (QTSP in eIDAS2) or just digitally signing a document, there are multiple layers of trust. With each layer and incident, there possibly consists levels of: content failures, communication failures, and action failures.

Tuesday Mar 10, 2026
Tuesday Mar 10, 2026
There is a technological transition in digital identity management, specifically the shift from physical hardware to cloud-based environments. While traditional on-premises systems offered robust security, they were often hindered by high maintenance costs and limited scalability. Modern remote secure element (RSE) technology now allows organisations to maintain high levels of trust and eIDAS 2.0 compliance without the need for physical tokens or local server rooms. This cloud-centric approach facilitates global expansion and remote onboarding while empowering users through verifiable credentials and better data control. Despite these advancements, the source notes that on-premises solutions remain essential for entities facing strict data sovereignty rules or unreliable internet connectivity. Ultimately, the future of digital signing is presented as a flexible choice between cloud agility and the physical oversight of specialized hardware.

Wednesday Feb 04, 2026
Wednesday Feb 04, 2026
The EUDI Wallet revolutionises EU academia by providing a secure, user-controlled platform for digital credentials. It enables seamless cross-border mobility, replaces paper-based diplomas with verified attestations, and streamlines Erasmus applications and university access.





