<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: eidas-pro</title>
    <description>The latest articles on DEV Community by eidas-pro (@eidas-pro).</description>
    <link>https://dev.to/eidas-pro</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F13075%2F2875330c-7a29-4747-9026-ef2af73c9455.jpeg</url>
      <title>DEV Community: eidas-pro</title>
      <link>https://dev.to/eidas-pro</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/eidas-pro"/>
    <language>en</language>
    <item>
      <title>eIDAS Summit 2026 Berlin: 5 Takeaways for Merchants</title>
      <dc:creator>eidas-pro</dc:creator>
      <pubDate>Thu, 30 Apr 2026 18:18:09 +0000</pubDate>
      <link>https://dev.to/eidas-pro/eidas-summit-2026-berlin-5-takeaways-for-merchants-3p5j</link>
      <guid>https://dev.to/eidas-pro/eidas-summit-2026-berlin-5-takeaways-for-merchants-3p5j</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqlwhj2ekvs6i97na8cz8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqlwhj2ekvs6i97na8cz8.png" alt=" " width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Updated 8 May 2026 with post-Summit notes — see the section at the end of this post. The framing below reflects the agenda as published on 27 April 2026.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Bitkom eIDAS Summit ran 28–29 April 2026 in Berlin. Day 1 was on-site at the Representation of the State of Baden-Württemberg, in German, with a national focus. Day 2 was English and online for a European audience. The keynote line-up was heavier than any previous edition: Federal Digital Minister Dr. Karsten Wildberger for BMDS, Norbert Sagstetter for the European Commission's Digital Identity Unit, Dr. Markus Reichel as rapporteur from the CDU/CSU group, and Christina Raab (Bitkom Vice President, Accenture DACH CEO) opening the industry side.&lt;/p&gt;

&lt;p&gt;The reason this Summit is worth a separate post is not the keynote roster. It is the way the agenda has been structured.&lt;/p&gt;

&lt;p&gt;Earlier eIDAS Summits were protocol-led — sessions on OpenID4VP, on mDoc, on selective disclosure, on cryptographic suites. This one is sector-led: the published programme tracked country wallet demos, large-scale pilots, the European Business Wallet, accessibility, trust services in the cloud, content credentials, and age verification as the structural lens.&lt;/p&gt;

&lt;p&gt;That shift is the signal. Five takeaways every relying party and merchant should leave with — even those who never logged into the live stream.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Sector-specific use cases are now the lens
&lt;/h2&gt;

&lt;p&gt;The Day 2 programme tracked sectors, not protocols. Country wallet demos. Large-scale pilots. The European Business Wallet. Accessibility. Trust services in the cloud. Content credentials. Age verification. That structure tells you who Day 2 is for: relying parties making integration decisions in the next 8 months, not standards bodies refining the spec.&lt;/p&gt;

&lt;p&gt;For merchants, the implication is simple. The integration scope is no longer "implement OpenID4VP." It is "implement the wallet in your checkout, with your fallback flow, your support training, your localization, your pre-warming sequence." The protocol is settled. The integration is not.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. The 100-company MoU is your integrator directory
&lt;/h2&gt;

&lt;p&gt;Germany's Federal Ministry for Digital and State Modernisation (BMDS) signed a Memorandum of Understanding with 100+ companies on 28 April. The signatories include the major German banks, telcos, healthcare systems, transport companies, and a long tail of integrators.&lt;/p&gt;

&lt;p&gt;If you are a relying party trying to figure out who can deliver a wallet integration that actually ships in 2026, this list is the answer. It is not a procurement guarantee — these are MoU signatories, not a vetted supplier list — but it is a discovery shortcut. If your integrator is not on it, ask why. If they are, ask which other signatories they have already worked with.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. The European Business Wallet is the B2B sibling
&lt;/h2&gt;

&lt;p&gt;The European Business Wallet got real airtime on Day 2. It is the B2B sibling to the citizen wallet — same protocol stack, different attribute set, different relying-party expectations.&lt;/p&gt;

&lt;p&gt;Most merchants who covered the Summit last week ignored the EBW. Don't. Procurement workflows, supplier onboarding, KYB (know-your-business), B2B authentication, regulated cross-border B2B services — all of these become wallet-native in 2027. The B2C wallet rollout gets the headlines; the B2B wallet rollout gets the durable margin.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Germany's 2 January 2027 launch sets the cross-border tone
&lt;/h2&gt;

&lt;p&gt;Germany goes live first. First wallet in production, first relying-party register, first regulated verticals binding. Whatever Germany ships becomes the de-facto standard that every other member state's national wallet has to interoperate with.&lt;/p&gt;

&lt;p&gt;For merchants outside Germany, the implication is concrete: even if your home market launches in mid-2027 or 2028, your German customers will arrive with a wallet on 2 January 2027. Cross-border verification flows become the binding constraint, not the German market alone.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. The policy/merchant gap is now visible
&lt;/h2&gt;

&lt;p&gt;The biggest signal from Day 2 is the gap that nobody on stage named directly. The Bitkom 13 April survey put 52% of Germans at "never heard of the EUDI Wallet" and 5% at "can explain it." Day 2 framed the awareness gap as a marketing problem — something for BMDS, the Commission, and Bitkom to address with public campaigns.&lt;/p&gt;

&lt;p&gt;It is not. It is a checkout problem. The 5% who can explain the wallet on 2 January 2027 will be over-represented in your funnel from day one — they are the early adopters, the privacy-conscious, the technically-curious. The other 95% will arrive with confusion. They will need plain checkout copy, a fallback flow, FAQ answers, and support training.&lt;/p&gt;

&lt;p&gt;Merchants who treat this as a marketing-department noise will hand their first 12 months to competitors. Merchants who treat it as integration scope will spend Q1 2027 watching an unfamiliar button outperform every legacy verification path they have ever shipped.&lt;/p&gt;

&lt;h2&gt;
  
  
  Post-Summit notes — 8 May 2026
&lt;/h2&gt;

&lt;p&gt;Five things changed between the Summit's close on 29 April and the second week of May. Each one shifts the merchant-side reading of the agenda above.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;One — the activation gap reframed the Bitkom story.&lt;/strong&gt; Bitkom's &lt;a href="https://www.bitkom.org/Presse/Presseinformation/Mehrheit-Deutschen-will-EUDI-Wallet-nutzen" rel="noopener noreferrer"&gt;follow-up survey on 27 April&lt;/a&gt; shifted the headline from "52% never heard of it" to "54% would use it but only 18% have an activated eID with a working PIN." The Summit's communications-track sessions, written for the awareness gap, landed in the room against an activation gap that is harder to close. We unpack the implications for merchants in our &lt;a href="https://eidas-pro.com/blog/bitkom-54-percent-want-eudi-wallet-but-only-18-percent-activated-eid" rel="noopener noreferrer"&gt;activation-gap post&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Two — ENISA's hardest quote arrived on 28 April.&lt;/strong&gt; The public-review draft of the EUCC for EUDI Wallets carried the single most consequential admission from the cybersecurity track: "In early 2026, no EUDI Wallet has been deployed or certified, and the specification remains work in progress." &lt;a href="https://www.biometricupdate.com/202604/eu-commission-doubtful-all-member-states-will-be-able-launch-eudi-wallets-this-year" rel="noopener noreferrer"&gt;Biometric Update's coverage&lt;/a&gt; frames the implications for the end-2027 Article 5f acceptance deadline.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Three — member states broke ranks on the EU age-verification app.&lt;/strong&gt; The Commission's 29 April recommendation to deploy a white-label EU AV app drew immediate pushback from Germany, Ireland, France, Poland, and Estonia, with Germany routing age verification through the wallet's age attribute instead. The political track formalised on 6 May in &lt;a href="https://data.consilium.europa.eu/doc/document/ST-8985-2026-INIT/en/pdf" rel="noopener noreferrer"&gt;Council document 8985/26&lt;/a&gt;. Full analysis in our &lt;a href="https://eidas-pro.com/blog/eu-age-verification-app-member-states-fragmentation-may-2026" rel="noopener noreferrer"&gt;member-state fragmentation post&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Four — the cross-border critique sharpened.&lt;/strong&gt; Mirko Mollik's &lt;a href="https://mmollik.medium.com/worthless-outside-europe-the-eudi-wallets-global-reality-check-44ce8a26894f" rel="noopener noreferrer"&gt;"Worthless outside Europe?"&lt;/a&gt; (3 May), written from IIW Mountain View, surfaced what the Summit underplayed: outside the EU, the wallet is being routed around rather than through. For B2B and globally-active relying parties, a meaningful 2027 planning input.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Five — civil-society critique consolidated.&lt;/strong&gt; The &lt;a href="https://epicenter.works/en/content/five-problems-the-commission-must-fix-in-the-eu-wallet" rel="noopener noreferrer"&gt;epicenter.works "five problems" open letter&lt;/a&gt; (3 May) pulled together the substantive privacy critiques into one document. Two of the five — registration-certificate over-asking and weakened pseudonymity — touch the relying-party flow directly and are worth a read regardless of where you sit on the framing.&lt;/p&gt;

&lt;p&gt;Net for a Q3-2026 integration roadmap: the activation-gap and member-state-fragmentation stories are the two takeaways that change the build order. The ENISA admission and the cross-border critique are useful priors for risk language in internal stakeholder discussions but do not, by themselves, alter the integration plan.&lt;/p&gt;

&lt;h2&gt;
  
  
  What to do Monday morning
&lt;/h2&gt;

&lt;p&gt;We packaged the merchant decision into 5 questions. Score yourself.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Are you in scope under Article 5f? Which paragraph applies?&lt;/li&gt;
&lt;li&gt;Have you mapped your wallet relying-party registration path?&lt;/li&gt;
&lt;li&gt;Have you scoped your attributes to the minimum needed?&lt;/li&gt;
&lt;li&gt;Is your wallet+fallback flow designed and tested?&lt;/li&gt;
&lt;li&gt;Have you tested against at least two wallet implementations?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;5/5 → on track for a clean Q1 2027 launch. 3–4/5 → at risk. 0–2/5 → treat 2027 as a build year, not a launch year.&lt;/p&gt;

&lt;p&gt;Full readiness checklist: &lt;a href="https://eidas-pro.com/blog/eudi-wallet-readiness-checklist-merchants-5-questions" rel="noopener noreferrer"&gt;https://eidas-pro.com/blog/eudi-wallet-readiness-checklist-merchants-5-questions&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Why we wrote this
&lt;/h2&gt;

&lt;p&gt;We are eIDAS Pro. We build EUDI Wallet verification infrastructure for merchants — drop-in checkout integrations, fallback flows, sector-specific support training, and the open-source SDK that powers them (&lt;code&gt;@openeudi/core&lt;/code&gt;, &lt;code&gt;@openeudi/openid4vp&lt;/code&gt;, Apache 2.0).&lt;/p&gt;

&lt;p&gt;If you are 8 months from launch and behind on integration scope, we can help. If you are not behind, we want to learn what you got right.&lt;/p&gt;

&lt;p&gt;Source: &lt;a href="https://eidas-pro.com/blog/eidas-summit-2026-berlin-bitkom-merchant-takeaways" rel="noopener noreferrer"&gt;https://eidas-pro.com/blog/eidas-summit-2026-berlin-bitkom-merchant-takeaways&lt;/a&gt;&lt;/p&gt;

</description>
      <category>eidas</category>
      <category>eu</category>
      <category>webdev</category>
      <category>eudi</category>
    </item>
    <item>
      <title>EU Age Verification App "Hacked in 2 Minutes" — What Actually Happened</title>
      <dc:creator>eidas-pro</dc:creator>
      <pubDate>Sat, 18 Apr 2026 19:06:10 +0000</pubDate>
      <link>https://dev.to/eidas-pro/eu-age-verification-app-hacked-in-2-minutes-what-actually-happened-2d3p</link>
      <guid>https://dev.to/eidas-pro/eu-age-verification-app-hacked-in-2-minutes-what-actually-happened-2d3p</guid>
      <description>&lt;p&gt;On April 15, 2026, the EU launched the age verification "mini-wallet" app. Within 24 hours, security researcher Paul Moore published a video claiming he bypassed it in 2 minutes. The story went viral across Reddit with tens of thousands of upvotes.&lt;/p&gt;

&lt;p&gt;The headlines write themselves, but the technical reality is more nuanced.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Three Flaws
&lt;/h2&gt;

&lt;p&gt;Paul Moore identified three design flaws in the wallet app's local device implementation:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. PIN decoupled from the credential vault&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The PIN protecting the wallet is verified locally, separate from the cryptographic key store that holds the actual credentials. On a rooted device, the PIN can be brute-forced without triggering the key store's protections.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Rate limiting stored as plaintext&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Lockout counters that prevent repeated PIN attempts are stored as plaintext values in local storage. With root access, these counters can be reset directly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Biometric gate is a boolean flag&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The biometric authentication check resolves to a simple boolean value. On a rooted device, this flag can be toggled without actually completing biometric verification.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Remains Secure
&lt;/h2&gt;

&lt;p&gt;All three bypasses share a critical prerequisite: &lt;strong&gt;physical access to a rooted device&lt;/strong&gt;. None of them enable remote attacks.&lt;/p&gt;

&lt;p&gt;More importantly, the &lt;strong&gt;OpenID4VP protocol&lt;/strong&gt; that governs the actual verification transaction between wallet and verifier was not compromised. When a verifier checks someone's age, they validate cryptographic proofs signed by the PID (Person Identification Data) provider. These signatures cannot be forged through any of the three local bypasses.&lt;/p&gt;

&lt;p&gt;For developers building age-gated services:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The signed attestations your backend validates are still trustworthy&lt;/li&gt;
&lt;li&gt;No changes needed to your verification integration&lt;/li&gt;
&lt;li&gt;The privacy model (verifiers receive yes/no, never the actual birthdate) is intact&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Implementation vs. Protocol
&lt;/h2&gt;

&lt;p&gt;This is a textbook case of the distinction between &lt;strong&gt;protocol soundness&lt;/strong&gt; and &lt;strong&gt;implementation quality&lt;/strong&gt;. The cryptographic architecture — based on OpenID4VP credential presentation — is well-designed. The local device protections that guard access to the wallet were implemented with shortcuts.&lt;/p&gt;

&lt;p&gt;The fixes are straightforward:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Bind PIN verification to the hardware key store&lt;/li&gt;
&lt;li&gt;Move rate limiting into the secure enclave&lt;/li&gt;
&lt;li&gt;Replace the boolean biometric flag with a challenge-response tied to the key store&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;None of these require protocol-level changes.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Structural Concern
&lt;/h2&gt;

&lt;p&gt;The bigger issue is platform lock-in. The wallet app only runs on iOS and Android, with a hard dependency on Google Play Services. There is no libre client, no desktop version, and no way for users of alternative mobile platforms to participate.&lt;/p&gt;

&lt;p&gt;For a system mandated by EU regulation, this exclusivity raises legitimate accessibility and sovereignty questions that outlast the fixable implementation bugs.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Positive Signal
&lt;/h2&gt;

&lt;p&gt;Open-source security auditing worked exactly as designed. The code was auditable, a researcher found flaws on day one, and published them responsibly. This is the model functioning correctly.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Full technical analysis with more detail on the protocol and platform lock-in concerns: &lt;a href="https://eidas-pro.com/blog/eu-age-verification-app-hack-explained" rel="noopener noreferrer"&gt;EU Age Verification App Hack Explained&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>eudi</category>
      <category>webdev</category>
      <category>privacy</category>
    </item>
  </channel>
</rss>
