That’s a great question. For example, I sign my public official documents using my mobile devices, but we adopt what’s called a zero trust configuration. It’s a technical term, meaning that the there’s no single root of trust, not the password, not my fingerprint, not the connection, not the SIM card, but a combination of these.

Keyboard shortcuts

j previous speech k next speech