Note that if you're an Emacs user and you execute commands from inside Emacs, there is already a framework for colorization in the fontify-* or highlight-* functions.
Each phone could have a built in key for signing. You could tell operators to not allow any other phone except for yours (which has this key) to access your account. Not a problem.
What happens here - is the phone itself becomes the sim card. That is troublesome on a number of levels. I'd rather push those functions to a little piece of plastic that is easy to move between handsets.
"You could tell operators"... How and where? When I'm in Thailand on vacation, I want data but I don't want to have to worry about registering my phone - I just go to kiosk and get a sim.
When I was in Ethiopia a few weeks ago getting a sim took a bit of work. I had to give them photos and some other documentation. A lot of governments are moving this way. Once it was done though, I had the sims I needed and the phone choices were wide open.
Maybe I'm missing a piece of the puzzle but in my experience the sim is what makes me free. The idea that the existence of a sim == being locked down comes from a broken telecom system not a technical limitation of the format.
There are some countries you do have to give extra documentation, and often providers will rip you off by giving you more airtime only if you register.
Funny you mention Ethiopia, the telecom there is completely state controlled, and it has been used to thwart opposition (listen in on calls, shut down complete SMS, etc). It's one of the many "remnants" of the communist regime. Supposedly Orange was coming in to manage and change that however...
SIM cards are exactly this, with the added benefit of (almost) two factor authentication. If I have my SIM card, I can be reasonably confident that you can't pretend to be me. If phones managed keys, I'd be more worried that you've managed to copy my key somehow.
Especially give the sheer number of apps out there and reports of apps doing more than they should, as well as users blindly installing apps with higher permissions than they actually require. This would get exploited very quickly no doubt.
Though, going to a store and proving who you are just to change a phone would be annoying. Maybe we could automate this. For extra security, we could use something besides a username and password. Maybe, the phone company could give us something, and we could use that to identify ourselves. Something we have. Maybe we could get the manufacturers allow us to store the identifier in the phone itself, and the phone could read the id card, and tell the phone company "Hey, this guy is good people!" that way, the entire process is all automated.
Tried most of the non-Apple Terminal alternatives, but personally I have always kept returning to Terminal because there is something about its finishing touches that add up.