It has been invested much time and money on implementing models of electronic and digital signatures on mobile devices ignoring basic issues such as the interests of the parties or to who are intended these solutions.
The models doomed to failure are:
- Cryptographic keys on the SIM.
- Cryptographic keys on MicroSD.
- Protocols defined ad hoc and universal solutions.
In future posts will explore models that they can be successful.