Device defection (not availability of device or no battery)
Device stolen
Lack of Device Security
Security of Wallets → one App or wallet with lots of functionalities and different sectors.
Phishing Attacks
Malware and Viruses
Social Engineering
Security of Verifiable Credentials
Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
by end user
by service providers
by issuers (tricky)
Misusing or reusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming
Security of Services → dependency to service security
relying parties
intermediaries
Losing data → lack of support mechanism by security issues
Not enough recovery solution
No insurance
Dark Net → security economic Fake ID economic → there is a business to generate fake ids or misuse of real ids, which could be used for washing money or any other illegal action
Fake ID
Misusing of VC
Trust Infrastructure → any vulnerabilities causes by mistakes in Trust Infrastructure