2 min read
EUDI Wallets & Trust Services: The Future of Digital Identity and Signatures in eIDAS 2
In our Part 1 blog, we explored how eIDAS 2.0 marks a transformative shift for Trust Service Providers (TSPs) across Europe. In this follow-up, we...
2 min read
In our Part 1 blog, we explored how eIDAS 2.0 marks a transformative shift for Trust Service Providers (TSPs) across Europe. In this follow-up, we...
4 min read
As the European Union solidifies the framework for the EUDI (European Digital Identity) wallet, the certification process outlined in the...
2 min read
Mobile phones are increasingly vulnerable to hacking and fraud, presenting significant challenges for securing sensitive applications like the EUDI...
2 min read
The EUDI wallet reference implementation serves as a practical guide for developers to create secure digital identity management solutions based on...
3 min read
The EUDI (European Digital Identity) wallet solution reference architecture (ARF) is designed to provide a secure framework for managing digital...
1 min read
Cryptomathic’s Mobile App Security Core (MASC) delivers the highest levels of security, protection and privacy for citizens using the app
2 min read
What is Mobile Application Hardening? Mobile application hardening refers to the process of securing mobile applications against various threats and...
2 min read
The European Commission, as part of the eIDAS 2.0 proposal promotes the European Digital Identity Wallet (EUDI Wallet) as an app that enables...
4 min read
The European Digital Identity (EUDI) Wallet is set to become a cornerstone of digital trust across the EU. In 2025, as the first production wallets...