We often reflect on our mistakes when we already have a cause-and-effect situation. I am struck and disturbed by how quickly my data falls into the hands of people with certain fraudulent intentions. As soon as I ordered a new bank card for myself, I received it, and I was already getting calls from people claiming to be bank representatives offering assistance with its activation; you can imagine that (and this is a real situation from my life), the fact that I was in shock is an understatement. They were literally notified that I had ordered a card and about the date I received it. Of course, I understand such schemes, so my response was sharp, but if, for example, it was my grandmother, she would have quickly taken advantage of the kindness and pleasantness from the so-called bank employees, which is why I emphasize confidentiality! Even the employees processing my request should not see my phone number and other information; this information should be encrypted with a code. That's it. The system recognized that it was me and granted permission. This is my right. Therefore, we need to pay attention to projects like Sign Protocol, whose goal is to verify your credentials without the risk of leaking them outside @SignOfficial

#signdigitalsovereigninfra $SIGN .