--

Encryption methods are available, but not scalable and usable ways to link identities to key pairs, or publish them in an easily accessible way. Maybe EIDAS will help. who knows.

--

--

Vicente Aceituno Canal
Vicente Aceituno Canal

Written by Vicente Aceituno Canal

Evidence-based cybersecurity management leader

No responses yet