Insights from Jon Shamah: A Global Perspective on Digital Identity and Transformation

This podcast series, as a series of discussions based on Jon Shamah’s Linkedin blogs, offers a thought-provoking exploration of key topics shaping the digital world today. Drawing from decades of hands-on experience and a strategic viewpoint, Jon delves into the evolving landscape of Digital Identity, the emergence and implications of Digital Wallets, and the broader currents driving digital transformation.
While much of the analysis is rooted in developments across Europe, the series adopts a truly global lens—examining international policy frameworks, technical standards, and cross-border interoperability challenges. Whether addressing the urgency for unified digital identity ecosystems or highlighting innovations that are reshaping user trust and data sovereignty, each episode offers practical insight informed by expertise and critical reflection.
By bridging strategic vision with real-world implementation, The podcasts invite listeners and readers alike to engage with the future of digital trust architecture—one informed by experience, enriched by collaboration, and poised for global relevance.

[Note that the discussions are by Jon Shamah's favourite AI friends.]

Listen on:

  • Apple Podcasts
  • Podbean App
  • Spotify
  • Amazon Music
  • PlayerFM
  • Podchaser

Episodes

Tuesday Dec 16, 2025

Establishing a formal, trusted assistance model to ensure that all European Union citizens can participate securely in an increasingly digital society is essential. Despite the convenience of digital transformation, a significant portion of the population faces exclusion due to limited digital skills, device access, or other barriers like disability. One solution is by leveraging the upcoming European Digital Identity (EUDI) Wallet and the expanded eIDAS 2 framework to create a "Qualified Assistance Provider" model, which would enable trained, audited staff to help citizens perform secure digital transactions on their behalf. This structure aims to address the structural inequity arising from essential services moving online and suggests funding local assistance hubs, such as libraries and NGOs, to offer these auditable and legally equivalent assisted interactions.
By explicitly designing for permanent assistance to ensure resilience and universal inclusion in a fully digital EU, the future of each and every EU citizen is recognised equally.

Sunday Dec 07, 2025

Horizon Europe, the EU’s flagship research and innovation program, has been instrumental in advancing science and technology across Europe. Its structured approach—organized around predefined missions, thematic clusters, and detailed work programs—has ensured alignment with strategic priorities. However, this rigidity comes at a cost: it limits the ability to respond to emerging challenges, stifles high-risk research, and constrains creativity.

Wednesday Dec 03, 2025

Navigating your social media feed can feel like walking through a maze of conflicting signals. Yet, behind the chaos, there is often a deliberate and surprisingly simple playbook used to engineer and spread false news. This article breaks down that predictable formula for deception, step by step.The Spark: It Begins with a Bad Actor and a Deliberate FalsehoodThe genesis of any false news campaign is deceptively simple: it begins when a bad actor deliberately engineers a falsehood for a specific, manipulative purpose. This is not a misunderstanding or an accident; it is the calculated construction of a lie designed to exploit biases and provoke a reaction. This initial step is critical, as it frames the entire operation not as organic misinformation, but as a premeditated act of digital sabotage.The Megaphone: How AI and Social Media Amplify the Original LieOnce crafted, the lie is supercharged through a two-pronged attack designed to make it both believable and unavoidable. First comes substantiation, where bad actors create a thin veneer of credibility by producing fake evidence—forged documents, sham news sites, or phony expert accounts—to support their original claim. This gives the falsehood an illusion of legitimacy.Simultaneously, social media platforms become the distribution channel for an aggressive amplification campaign. Using technologies like AI amplification, a single lie can be multiplied into thousands of posts, comments, and shares, creating the false impression of a groundswell of organic consensus. This strategy weaponizes repetition, broadcasting the repeat amplified original message across the network. This exploits a psychological vulnerability known as the "illusory truth effect," where our brains mistake familiarity for accuracy. Seeing the lie over and over makes it feel true.The Impact: An Uninformed Public Makes Influenced DecisionsThis digital manipulation achieves its final, damaging goal when the amplified falsehood successfully penetrates the awareness of an uninformed public. Bombarded with a seemingly credible and widely repeated message, people are persuaded to accept the lie as fact. The ultimate consequence is that an individual or group makes an influenced bad decision based on lies, turning a digital fabrication into a real-world action with damaging outcomes.Breaking the CycleThis three-step process—calculated creation, dual-pronged amplification, and real-world impact—is a rinse-and-repeat strategy used by bad actors to systematically manipulate public perception. It starts with a deliberate falsehood, uses technology to make it appear credible and ubiquitous, and ends when an uninformed public makes poor decisions.
Now that we can see the blueprint for false news, what is our role in stopping its spread?
 
 

Thursday Nov 27, 2025

For numerous organizations, including government authorities and private entities, to achieve Qualified Trust Service Provider (QTSP) status necessary for issuing Verifiable Credentials (VCs) under the EU’s eIDAS regulation is a difficult. Becoming a QTSP internally presents significant operational challenges, requiring complex compliance with mandatory standards for advanced cryptographic systems, interoperability schemas, and strict GDPR mandates concerning selective disclosure and real-time revocation. To bypass this resource-intensive internal burden, We identify four strategic alternatives, ranging from expensive, slow consultancy engagement to highly capital-intensive business acquisition. The analysis consistently favours the cloud services integration model, which offers inherent scalability, cost efficiency, and simplified regulatory compliance by utilizing specialised third-party components. Choosing the correct strategy depends on an organization’s internal resources, tolerance for third-party dependency, and the importance of rapid market deployment within the emerging EUDI Wallet ecosystem. (PS. I do use my AI friends to explain this in audio format.)

Tuesday Nov 25, 2025

The pursuit of autonomous, conscious robotics remains one of the most ambitious goals in modern engineering. Popular culture, epitomized by Marvin the Paranoid Android from The Hitchhiker’s Guide to the Galaxy, envisions machines with limitless computational capacity and self-awareness. However, this vision is fundamentally constrained by three interlocking barriers: the immutable laws of physics, the systemic reliance on centralized architectures, and the unresolved ethical dilemmas of codifying morality into non-human agents.

Wednesday Nov 19, 2025

The increasing complexity of Artificial Intelligence Agents present major challenges within digital identity and signing systems. As AI agents evolve from simple programmed interactions to those involving complex, self-determining processes, issues of liability and risk will become paramount, especially when agents interact with counterparts, delegate tasks, or pursue open-ended missions. To resolve this increasing complexity and prevent the abandonment of advanced agents, a framework is proposed that mandates Terms and Conditions (Ts and Cs) for transactions, clearly defining liability boundaries and incorporating strict controlling algorithms.

Sunday Nov 09, 2025

As our world accelerates its transition towards a digital-first society, trust has emerged as the most critical component for stability, progress, and widespread adoption. True, sustainable trust is not a default state; it must be consciously built upon a deep foundation of mutual understanding. In Douglas Adams’ The Hitchhiker’s Guide to the Galaxy, the miraculous Babel fish, when placed in the ear, allows its user to instantly understand any language. It promises a world of perfect clarity and seamless comprehension. Yet, Adams offers a crucial warning: by removing all barriers, the fish inadvertently caused more conflict than ever before. This paradox serves as our central cautionary tale: creating a seamless digital identity infrastructure without a robust architecture of trust could amplify existing societal fractures rather than heal them.

Wednesday Nov 05, 2025

Digital Wallets are a transformative technology for managing identity and transactions, highlighting their role in creating a more secure and efficient digital society. These wallets are presented as versatile tools capable of securely storing diverse credentials beyond payment information, offering users control over information disclosure. The European Union is leading this digital transformation, with plans to introduce Digital Wallets by 2026, supported by regulatory frameworks such as eIDAS 2.0 and the Digital Services Act.

Resilience: Now, more than ever!

Wednesday Nov 05, 2025

Wednesday Nov 05, 2025

Resilience is a topic that never seems to be solved. When one aspect of our lives has just been made more robust, yet another crops up that takes that feeling of security away again.

Wednesday Oct 29, 2025

We all wish that life would be easy, and effort that is once expended does not recur over and over again. This utopia is a dream that rarely happens. Even more so if you are one of those organisations that do not see IT as your core functions but have decided that it is your decision that you need to be a Qualified Trust Service Provider (QTSP). There are hard ways to do it and there are easier ways......

Copyright 2025 All rights reserved.

Podcast Powered By Podbean

Version: 20241125