Cybernetica

Menu

Blog

New Technologies in Voting

Voting is the core method of implementing public power in modern democratic societies. However, in the contemporary increasingly mobile world, paper-based elections, where every eligible voter has to come to the same physical location during a short period of time, is less and less of an option.

The History of Digital Identity in Estonia

Estonia is widely recognised as having one of the world’s most advanced digital governments, with much written on the subject by the World Bank, Forbes, the Financial Times, and more. Two steps were taken that facilitated and led to the rise of the digital identity in Estonia; first, a personal identification number known as the “Isikukood” was assigned to every citizen and resident of Estonia, and second, 10-year passports were issued.

UXP Directory 2.0 Is Now Released

Cybernetica’s Data Exchange Technologies team is pleased to announce that at the end of last year, UXP Directory 2.0 (formerly known as UXP Service Directory) was released. The product was renamed, because the focus has been shifted from services to the whole UXP installation. The aim is to provide a valuable overview of all its members, information systems, and services.

An Interdependent Web Calls for More Collaboration on Cybersecurity

The CyberSec4Europe cybersecurity competence centre
On February 1st, 2020, the cybersecurity competence centre pilot project CyberSec4Europe of the European Commission’s Horizon 2020 programme will have been in progress for a year. The CyberSec4Europe consortium has been very active in gathering details about partner competences, mapping the existing assets and planning future research. The first demonstrators for the seven verticals (e-commerce, supply chain security assurance, privacy-preserving identity management, incident reporting, maritime transport, medical data exchange, smart cities) will be set up by the end of April 2020.

Self-sovereign identity – is it feasible?

Self-sovereignty with respect to digital identity, and the desire for individuals to have genuine control over their data is a very interesting subject. In my eyes, this is a monumental challenge, one that I fear isn’t even realistic at the moment, though that shouldn’t stop anyone from trying. Part of me sees it as idealistic; something that would be great to have, but might never be achievable due to laws and regulations requiring certain ways of working in order to protect those involved. I also find, that depending on who I speak to, there are different beliefs and guiding principles surround self-sovereignty, some stricter than others, and I find it will likely be a case, that we will never be able to please all of the people, all of the time.