13.01.2013 Views

D:\Documents and Settings\Ana\My Documents\Biserka-knjiga ...

D:\Documents and Settings\Ana\My Documents\Biserka-knjiga ...

D:\Documents and Settings\Ana\My Documents\Biserka-knjiga ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

“As far as we know there is no other biometrically-enabled digital signature<br />

application available for mobile devices that can guarantee security by storing <strong>and</strong><br />

processing all sensitive information on the device’s SIM card, explains SecurePhone<br />

technical coordinator Roberto Ricci at Informa in Italy. Because biometric data<br />

never leaves the device’s SIM card <strong>and</strong> cannot be accessed, except by the verification<br />

module which also runs on the SIM card, the user’s biometric profile is completely<br />

safe. This is important to meet the highest privacy requirements. Although existing<br />

communications infrastructure based on the GSM, GPRS <strong>and</strong> UMTS mobile systems<br />

provides a secure means of communication, it lacks any robust method of user<br />

identification. Text, audio <strong>and</strong> image files can be sent by anyone to anyone with no<br />

authentication <strong>and</strong> there are no guarantees the person you are talking to in a phone<br />

conversation, if you’ve never met them before, is really who they claim to be.” 25<br />

The net result of this convergence comfortingly acquiesces the biggest fears of<br />

both industry in general (intellectual property) <strong>and</strong> national <strong>and</strong> federal states <strong>and</strong><br />

state-like structures (identity). It makes sure who is who <strong>and</strong> at the same time it makes<br />

sure who is talking to whom. It neatly freezes both content <strong>and</strong> context in between the<br />

points of access (going online <strong>and</strong> going mobile) <strong>and</strong> the points of identification <strong>and</strong><br />

authentication (who you are). Any kind of p2p activity is logged <strong>and</strong> traceable, not to<br />

your Internet service provider (ISP) but to you directly. It discourages experiments<br />

<strong>and</strong> works against creative <strong>and</strong> innovative acts of the rising make generation that<br />

cover the grounds in between structured discourses <strong>and</strong> operating systems. And most<br />

interestingly, it seems to acquiesce the fear of the 8 out of 10 satisfied EU citizens too,<br />

as they trade their continuous individual time-space coordinates for a high probability<br />

free-of-terror comfort zone. They can go shopping without paying, <strong>and</strong> “with 65 per<br />

cent of UK shoppers have suffered from the latest retail phenomena queue rage”<br />

(Queue Rage, QM Group study), this will no doubt enhance experiences of<br />

convenience.<br />

25 http://www.coli.uni-saarl<strong>and</strong>.de/projects/SecurePhone/<br />

New realities, new policies?<br />

37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!