D:\Documents and Settings\Ana\My Documents\Biserka-knjiga ...
D:\Documents and Settings\Ana\My Documents\Biserka-knjiga ...
D:\Documents and Settings\Ana\My Documents\Biserka-knjiga ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
“As far as we know there is no other biometrically-enabled digital signature<br />
application available for mobile devices that can guarantee security by storing <strong>and</strong><br />
processing all sensitive information on the device’s SIM card, explains SecurePhone<br />
technical coordinator Roberto Ricci at Informa in Italy. Because biometric data<br />
never leaves the device’s SIM card <strong>and</strong> cannot be accessed, except by the verification<br />
module which also runs on the SIM card, the user’s biometric profile is completely<br />
safe. This is important to meet the highest privacy requirements. Although existing<br />
communications infrastructure based on the GSM, GPRS <strong>and</strong> UMTS mobile systems<br />
provides a secure means of communication, it lacks any robust method of user<br />
identification. Text, audio <strong>and</strong> image files can be sent by anyone to anyone with no<br />
authentication <strong>and</strong> there are no guarantees the person you are talking to in a phone<br />
conversation, if you’ve never met them before, is really who they claim to be.” 25<br />
The net result of this convergence comfortingly acquiesces the biggest fears of<br />
both industry in general (intellectual property) <strong>and</strong> national <strong>and</strong> federal states <strong>and</strong><br />
state-like structures (identity). It makes sure who is who <strong>and</strong> at the same time it makes<br />
sure who is talking to whom. It neatly freezes both content <strong>and</strong> context in between the<br />
points of access (going online <strong>and</strong> going mobile) <strong>and</strong> the points of identification <strong>and</strong><br />
authentication (who you are). Any kind of p2p activity is logged <strong>and</strong> traceable, not to<br />
your Internet service provider (ISP) but to you directly. It discourages experiments<br />
<strong>and</strong> works against creative <strong>and</strong> innovative acts of the rising make generation that<br />
cover the grounds in between structured discourses <strong>and</strong> operating systems. And most<br />
interestingly, it seems to acquiesce the fear of the 8 out of 10 satisfied EU citizens too,<br />
as they trade their continuous individual time-space coordinates for a high probability<br />
free-of-terror comfort zone. They can go shopping without paying, <strong>and</strong> “with 65 per<br />
cent of UK shoppers have suffered from the latest retail phenomena queue rage”<br />
(Queue Rage, QM Group study), this will no doubt enhance experiences of<br />
convenience.<br />
25 http://www.coli.uni-saarl<strong>and</strong>.de/projects/SecurePhone/<br />
New realities, new policies?<br />
37