It’s like switiching to only organic ice cream from regular one.
It’s like switiching to only organic ice cream from regular one.
Yes, the software might depend on outdated technology like oil burner heating and you want to transition to solar with a heat pump.
The longer you live in a place the more crap you will accumulate in your home. Windows need to be cleaned. Walls need to be painted. There’s this one tap, that’s fixed with some wire and tape.
Tech debt is like that just for software.
Transitioning a tech stack will lead to tons of unforeseen problems and also add zero new features. It’s only very rarely useful.
I have both! Lots of stale bookmarks and tons of open tabs.
This is for the staff, not the patients.
Yes, you’re holding a sentient being as a slave for your amusement.
No wireless. Less space than a nomad. Lame.
People used to just not wear any shoes. The poorest were barefoot or wrapped their feet in rags.
The US was built on genocide and no party wants to do something about that.
Yes, it’s like infrastructure. Roads have running costs as well, you don’t just build them once and are set then.
Most countries have some form of national ID already.
Some countries already have this.
The government already knows my name and where I live, so if I trust them or not isn’t important.
To alleviate the issue with copied cards, cryptographic signatures and certificates can be used. The certificate is on your card and it’s signed by the government. Your certificate contains a private and a public key. The private key never leaves the card, only the public key. The public key is signed by the government.
So if a service wants to ensure your identity, they will give you a cryptographic challenge. That is then signed using your private key on your card. The service then can verify your signature by using your public key. The service can then verify your public key by contacting a government server. That way you can prove to anyone that you’re in possession of the physical ID card. The private key on the card can be further protected by a pass phrase.
So if someone wants to steal your identity, they would need your physical card and your passphrase.
If your physical card and passphrase gets stolen, you report it to the government and they revoke their signature of your public key. So if a service wants to verify your identity, the government server will reply that the ID is not valid.
This is how SSL and public private key cryptography works in general. The issuing authorities don’t have to be governments.
Spreadsheets are actually running the world.
A government issued ID card with a signed certificate on it could do all three pretty well.
Same