1 00:00:00,600 --> 00:00:03,239 Speaker 1: Right, New Zealand is one step closer to a wallet 2 00:00:03,360 --> 00:00:07,560 Speaker 1: free future. Digital Services Minister Judith Collins says digital driver's 3 00:00:07,600 --> 00:00:10,240 Speaker 1: licenses could be rolling out by the end of the year. 4 00:00:10,880 --> 00:00:12,600 Speaker 1: It means you won't need to carry your wallet to 5 00:00:12,640 --> 00:00:14,800 Speaker 1: the bar or when you're driving. The idea is to 6 00:00:14,840 --> 00:00:17,840 Speaker 1: make your life easier, but it also raises safety questions. 7 00:00:18,200 --> 00:00:22,720 Speaker 1: Andy Higgs, digital Identity New Zealand executive director, joins me. 8 00:00:22,800 --> 00:00:26,000 Speaker 2: Now, good morning Andy, Oh, good morning Francessia. 9 00:00:26,160 --> 00:00:28,880 Speaker 1: Okay, so do these changes sound positive to you? 10 00:00:30,880 --> 00:00:34,720 Speaker 2: Yeah, they are that we're wise to be skeptical. 11 00:00:35,760 --> 00:00:37,720 Speaker 1: Okay, what shall we be skeptical about? 12 00:00:38,840 --> 00:00:41,160 Speaker 2: Well, I mean if you look at what's happened around 13 00:00:41,240 --> 00:00:45,599 Speaker 2: the world with digital identity and places that are not 14 00:00:45,720 --> 00:00:53,600 Speaker 2: like us, like Estonia or China or yeah, other countries, 15 00:00:54,200 --> 00:00:58,760 Speaker 2: they you become a number, right. And you know that 16 00:00:58,840 --> 00:01:00,600 Speaker 2: someone was telling me about that trip to the Middle 17 00:01:00,640 --> 00:01:04,720 Speaker 2: East the other day and they arrive and they got 18 00:01:04,760 --> 00:01:06,760 Speaker 2: sick and went to the hospital and the hospital already 19 00:01:06,800 --> 00:01:09,880 Speaker 2: knew everything about them. So you don't want to go 20 00:01:09,920 --> 00:01:13,280 Speaker 2: down that track. And we're not. But I think a 21 00:01:13,280 --> 00:01:17,520 Speaker 2: lot of people mistakenly think we are, which is which 22 00:01:17,560 --> 00:01:19,480 Speaker 2: is fine. But we've got a big job to do 23 00:01:19,600 --> 00:01:23,560 Speaker 2: on the education front, so we're doing a bit differently 24 00:01:23,600 --> 00:01:24,000 Speaker 2: down here. 25 00:01:24,160 --> 00:01:27,280 Speaker 1: So Andy, maybe you could can help us understand how 26 00:01:27,319 --> 00:01:30,039 Speaker 1: this tech is going to work. Is it like Apple 27 00:01:30,080 --> 00:01:33,840 Speaker 1: pay or will there be a two factor authentic I 28 00:01:33,880 --> 00:01:35,000 Speaker 1: can never say this word. 29 00:01:35,640 --> 00:01:37,480 Speaker 2: Two factor authentication. 30 00:01:37,040 --> 00:01:41,639 Speaker 1: Authentication, thank you, authentication? No, I can never say it. Actually, 31 00:01:41,959 --> 00:01:43,160 Speaker 1: it's just one of those words. 32 00:01:45,560 --> 00:01:50,960 Speaker 2: Yeah. No, So there is security built into the system. 33 00:01:51,040 --> 00:01:55,880 Speaker 2: But really the first thing to understand is it's not 34 00:01:56,000 --> 00:02:01,240 Speaker 2: a two sided marketplace. You know, it's not Apple sucking 35 00:02:01,280 --> 00:02:06,120 Speaker 2: up all our data and controlling our lives. It's actually well, 36 00:02:06,160 --> 00:02:09,680 Speaker 2: there's actually four parts to the to the infrastructure, so 37 00:02:11,160 --> 00:02:13,560 Speaker 2: it takes a bit of explaining, but I'm good to 38 00:02:13,560 --> 00:02:17,080 Speaker 2: go if you if you met me. Basically, there's an 39 00:02:17,080 --> 00:02:20,440 Speaker 2: issuer of of a credential. We call it a credential, 40 00:02:21,080 --> 00:02:23,880 Speaker 2: which is a global standard and there's the three global 41 00:02:23,919 --> 00:02:27,120 Speaker 2: standards that are in popular use, and it allows you 42 00:02:27,200 --> 00:02:33,480 Speaker 2: to issue the physical identity as what's effectively an encrypted 43 00:02:33,600 --> 00:02:39,239 Speaker 2: piece of data or a token digital token. Then you've 44 00:02:39,240 --> 00:02:43,360 Speaker 2: got the the holder, which is which is us, you know, 45 00:02:43,400 --> 00:02:46,200 Speaker 2: the holder of the token, which in the in the 46 00:02:46,240 --> 00:02:49,400 Speaker 2: case of the digital identity. It's it's it's held on 47 00:02:49,440 --> 00:02:53,240 Speaker 2: your device, so your phone. You mentioned the smartphone in 48 00:02:53,240 --> 00:02:56,960 Speaker 2: in what we what they call a wallet, but it's 49 00:02:57,000 --> 00:02:59,720 Speaker 2: not really a wallet. It's more of a kind of 50 00:02:59,800 --> 00:03:04,320 Speaker 2: view of the encrypted data. And then you've got the 51 00:03:04,840 --> 00:03:07,240 Speaker 2: that's the second past part. And then the third part 52 00:03:07,280 --> 00:03:11,440 Speaker 2: is the verification, which is the relying party, which which 53 00:03:11,480 --> 00:03:14,560 Speaker 2: could be the bar, it could be the police officer 54 00:03:14,639 --> 00:03:18,120 Speaker 2: that's just pulled you over. Yeah, they're the relying party. 55 00:03:18,240 --> 00:03:21,520 Speaker 2: And there's been a whole movement around the world because 56 00:03:21,520 --> 00:03:25,239 Speaker 2: it's actually decentralized this method. So there's a whole movement 57 00:03:25,280 --> 00:03:29,400 Speaker 2: around the world talking about no phoning homes. So what 58 00:03:29,440 --> 00:03:32,239 Speaker 2: you don't want is the issuer seeing every time you've 59 00:03:32,320 --> 00:03:38,000 Speaker 2: used your your credential. So when the relying party checks 60 00:03:38,000 --> 00:03:41,200 Speaker 2: your digital credential, that you know the issuer of it 61 00:03:41,560 --> 00:03:47,040 Speaker 2: in this case is it TA or the government won't 62 00:03:47,080 --> 00:03:49,840 Speaker 2: know that you've presented to the government. 63 00:03:49,840 --> 00:03:51,840 Speaker 1: The government can't be looking at what you're doing with 64 00:03:51,880 --> 00:03:53,840 Speaker 1: it and storing of data. 65 00:03:54,080 --> 00:03:56,839 Speaker 2: There's no storing of data. And it's basically what's called 66 00:03:56,840 --> 00:04:00,000 Speaker 2: we've we've we've implemented this new law called its identities 67 00:04:00,160 --> 00:04:04,960 Speaker 2: versus trust framework. It's a voluntary regime, but that that 68 00:04:05,000 --> 00:04:07,680 Speaker 2: points to a source of trust, a source of trust 69 00:04:07,800 --> 00:04:13,960 Speaker 2: outside that that triangle of our actors. So it could 70 00:04:14,000 --> 00:04:17,159 Speaker 2: be a government source of trust, or it could be 71 00:04:17,160 --> 00:04:19,680 Speaker 2: a non government source of trust. And that's really the 72 00:04:19,720 --> 00:04:24,159 Speaker 2: big opportunity for New Zealand to preserve greater privacy and 73 00:04:24,240 --> 00:04:27,000 Speaker 2: control for every day in New Zealanders. 74 00:04:27,320 --> 00:04:29,120 Speaker 1: Okay, it sounds like they've thought about this. Thank you 75 00:04:29,160 --> 00:04:31,279 Speaker 1: for talking us through that, Andy, appreciate that. 76 00:04:32,800 --> 00:04:35,800 Speaker 2: For more from earlier edition with Ryan Bridge, listen live 77 00:04:35,920 --> 00:04:38,919 Speaker 2: to News Talks it be from five am weekdays, or 78 00:04:39,000 --> 00:04:40,880 Speaker 2: follow the podcast on iHeartRadio