Posted on Categories blockchain, electronic identification

Blockchain and electronic identification

For many people today, a life lived offline can hardly be imagined, but the internet still has many limitations. Access to information and easy communications have become the standard and basis for functioning of the society and the economy—and, it follows, a subject of interest to the law. Nonetheless, we more and more often sense the shortcomings of the current version of the digital world. These include digital exchange of value and universal electronic identification.

Continue reading “Blockchain and electronic identification”

Posted on Categories electronic identification, privacy/personal data protection, startups

Small firms, big data

Many startups offer their clients big data analysis services based on machine-learning algorithms. The results of such analyses can be of interest to any companies profiling their products or marketing campaigns. But for the analysis to be reliable, it takes data—the more the better. Algorithms using machine learning must have something to learn from. The accuracy of the forecasts subsequently developed for business aims will depend on the scope of the training data fed to them. If the algorithm is limited from the start to analysis of an abridged sample of observations, the risk increases that it will incorrectly group data, overlooking important correlations or causal connections—or see them where they don’t exist. Only training the algorithm on large datasets can minimise the risk of shortcomings in diagnosis and prognosis.

Continue reading “Small firms, big data”

Posted on Categories electronic identification

The hash – a computer file’s digital fingerprint

One of the many uses of hash functions is the identification and verification of computer files.

Everyone has experienced having to frantically search for an important document that was saved “somewhere in the computer” but is needed immediately. In such situations, we usually resort to the search function built into the operating system; but in the end, we just have to browse through the files, one at a time, until we find (or not) the right one. But what if we need to find a file among hundreds of thousands of others?

Continue reading “The hash – a computer file’s digital fingerprint”

Posted on Categories changes in law, electronic identification, trust services

New Act on Trust Services and Electronic Identification

The Act on Trust Services and Electronic Identification is intended to adapt Polish law to the EU’s eIDAS Regulation. Among other things, it repeals the Electronic Signature Act. The new act is part of a broad trend toward creation of a new regulatory framework for digital commerce.

Continue reading “New Act on Trust Services and Electronic Identification”

Posted on Categories cybersecurity, electronic identification, fintech

PSD2: Strong customer authentication

Consultations are nearing the end on the proposed Regulatory Technical Standards (RTS) for strong customer authentication announced by the European Banking Authority pursuant to the revised Payment Services Directive (2015/2366, known as PSD2). This proposal was much awaited by the entire financial technology industry. The standards could have a huge impact on business models and tech solutions applied on the FinTech market.

Continue reading “PSD2: Strong customer authentication”