electronic identity
Filter by...
-
Identity Crisis
Identity systems create and facilitate exclusion, insecurity, and surveillance.
Read more
-
Orwell’s Wallet: European electronic identity system leads us straight into surveillance capitalism
In June 2021 the European Commission launched a reform of the 2014 eIDAS Regulation to overhaul Europe’s framework for electronic identity (eID) systems. This ambitious reform tries to create a counterbalance to the widespread login systems of Google, Facebook and Apple, as well as to provide widely-adopted eID systems for eGovernment and eCommerce applications to the population.
Read more
-
Why the electronic green vaccination certificate creates new problems instead of solving them
The National Council in Austria passed a legal basis for the electronic immunity certificate project within two days, skipping any kind of review procedure. The digital passes are not a ticket to a normal life, vaccination is. So, special attention should be paid to maintaining the trust of people and the voluntary nature of vaccination, ensuring that people's rights to privacy and freedom of choice are respected. EDRi's member epicenter.works explains what are the concerns with the deployment of green certificates and suggests alternatives to this project.
Read more
-
Trust is a two-way street: the UK’s digital identity framework
Trust is a two-way street, and while the British government’s digital identity trust framework definitely makes steps in the right direction, those efforts need to be accompanied by a commitment to transparency and integrity, says EDRi's member Open Rights Group in response to the government's policy paper on UK’s digital identity and attributes trust framework.
Read more
-
The pros and cons of moving to e-IDs
EDRi member Epicenter.works give their position on electronic identity (e-ID) in light of the continues work on e-ID in Austria. They share that as convenient as the e-ID may seem and as much it is being communicated as the logical evolution of the classic ID, caution must be exercised when it comes to creating, storing and accessing sensitive identity data. Utmost caution is required when the private sector and the state use shared infrastructures for this purpose.
Read more