AI agents and verifiable credentials: A match made in heaven? | Biometric Update

xxx

With the arrival of AI agents, businesses are looking at growing future opportunities. One of them is granting access to AI agents to our verifiable credentials (VCs) to act on our behalf

From: AI agents and verifiable credentials: A match made in heaven? | Biometric Update.

Actually, I think that’s not quite right. We don’t want AIs to present our verifiable credentials we want AIs to present their own verifiable credentials that we have consented to authorise. In other words, my bot shouldn’t show up at a bank pretending to me: it should show up at a bank as a bot acting on my behalf. Now, this makes digital identity for bots more complicated, but also more flexible. Jelena Hoffart of Mastercard and I have written a paper about this for the Journal of Digital Banking.

Agentic Commerce and the Payment Networks

Frank Young summarises this quite well

We need to draw a clear distinction to delineate where MCP can add value and where existing capabilities work just fine. Why build MCP gateways when current APIs already shine for simple flows?

Stick with APIs: For scaled, simple flows (subscriptions, point-of-sale), lean on current infrastructure—don’t fix what isn’t broken.
Leverage MCP: For agentic commerce’s frontier (negotiation, fraud response, optimization), build MCP gateways and token flows to capture these complex, high-value scenarios.

From: Agentic Commerce and the Payment Networks.

xxx

The battle for the global payments system is under way

xxx

So the fight for domination of the future payments system is on — and the US wants to win. The broader European public may be blissfully unaware. But those in charge of the Eurozone are also determined that this battle for technological control over the economy is one that the EU must not lose. This is the fundamental motivation for the digital euro — a central bank-issued official digital currency that, if done well and fast enough, will rival or outperform the attractiveness of dollar stablecoins.

From: The battle for the global payments system is under way.

xxx

Brits should prepare a 72 hour ‘survival kit’ as Putin plots to sabotage gas pipelines and cause mass blackouts, warn spies | Daily Mail Online

xxx

Fears of a plot by Russia to sabotage Britain’s energy pipelines means families should pack a 72-hour ‘survival kit’, security advisers have warned.

From: Brits should prepare a 72 hour ‘survival kit’ as Putin plots to sabotage gas pipelines and cause mass blackouts, warn spies | Daily Mail Online.

I can’t help but notice that the survival kit shown includes identity, but not money.

A Deep Dive Into MCP and the Future of AI Tooling | Andreessen Horowitz

xxx

Authentication 
MCP does not currently define a standard authentication mechanism for how clients authenticate with servers, nor does it provide a framework for how MCP servers should securely manage and delegate authentication when interacting with third-party APIs. Authentication is currently left up to individual implementations and deployment scenarios. In practice, MCP’s adoption so far seems to be on local integrations where explicit authentication isn’t always needed.

A better authentication paradigm could be one of the big unlocks when it comes to remote MCP adoption. From a developer’s perspective, a unified approach should cover:

Client authentication: standards methods like OAuth or API tokens for client-server interactions
Tool authentication: helper functions or wrappers for authenticating with third-party APIs
Multi-user authentication: tenant-aware authentication for enterprise deployments
Authorization 
Even if a tool is authenticated, who should be allowed to use it and how granular should their permissions be? MCP lacks a built-in permissions model, so access control is at the session level — meaning a tool is either accessible or completely restricted. While future authorization mechanisms could shape finer-grained controls, the current approach relies on OAuth 2.1-based authorization flows that grant session-wide access once authenticated. This creates additional complexity as more agents and tools are introduced — each agent typically requires its own session with unique authorization credentials, leading to a growing web of session-based access management.

From: A Deep Dive Into MCP and the Future of AI Tooling | Andreessen Horowitz.

xxx

Malta’s ID card racket stirs political strife | Biometric Update

xxx

Malta’s illegal identity card scandal, linked to government agency Identità, continues to stir political uproar in the country.
The oppositional Nationalist Party (PN), one of the two major political parties in Malta, has accused the Labour Party-led government of playing down the scale of the ID racket which allowed ineligible individuals to obtain Maltese IDs in return for bribes.

From: Malta’s ID card racket stirs political strife | Biometric Update.

xxx

Banks and tech groups commit to live data-sharing in UK fraud clampdown

xxx

Britain’s biggest banks, technology and telecoms companies have pledged to step up efforts to share live fraud data, as calls grow for the government to take stronger leadership in coordinating the fight against online scammers.

From: Banks and tech groups commit to live data-sharing in UK fraud clampdown.

xxx

Design a site like this with WordPress.com
Get started