Summary
This report on the intermediate results of all WP3 tasks, including the proposed protocol that ensures a standardised level of security for all users; the trustworthy data sharing techniques; the confidentiality and privacy by design; and the encryption/decryption techniques along with the multi-factor recovery mechanisms that leverages circles of trust to ensure the recoverability of personal and identity data.
More information & hyperlinks