Dear IDoT DG,
The group exists now for more than 5 years. Unfortunately we lost momentum during last months. I tried to regain it by setting up a hands-on topic like
“authentication with the help of blockchain” used in a vertical like smart cities.
But obviously there is not as much interest as I thought. Due to reorganizations in my company I will be no longer able to chair this group.
If someone has interest and time to take over this position to drive the group with new enthusiasm would be great.
Another option would be to shut down the group.
I started to talk to Colin and Andrew about it.
I’d like to postpone the todays call until we sorted out the next steps.
Thank you!
Best Regards,
Ingo Friese
DEUTSCHE TELEKOM AG
T-Labs (Research & Innovation)
Dipl.-Ing. Ingo Friese
Ernst-Reuter-Platz 7, 10587 Berlin
+4930835358148 (Tel.)
+4930835358409 (Fax)
E-Mail: ingo....@telekom.de

Erleben, was verbindet.
Die gesetzlichen Pflichtangaben finden Sie unter:
www.telekom.com/pflichtangaben
Grosse Veränderungen fangen klein an – Ressourcen schonen und nicht jede E-Mail drucken.
_______________________________________________
DG-IDoT mailing list
DG-...@kantarainitiative.org
https://kantarainitiative.org/mailman/listinfo/dg-idot
Ingo,
I'm sorry to hear that you won't be able to continue, it has been good working with you over the years. Identification and authentication in the IOT space is an important topic, and I learned a lot in the group.
Colin and all,
With regard to a potential new topic, my suggestion is to focus on authentication for Smart Cities. I'm much more interested in analyzing the overall problem space than the specific use case of using blockchain for that authentication.
Whether they think of themselves as Smart Cities not, municipal governments collect vast amounts of data through myriad sensors and systems in ways that impact residents in everything from physical safety to personal privacy. The overall authentication
use case includes humans and devices, in ways that are affected by some of the hardest problem spaces in cybersecurity, including supply chain integrity, identity proofing, and management of PII and other personal data.