You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
« Previous
Version 10
Next »
- Losing our data
- Physical vulnerabilities
- Device lost
- Device defection
- Device stolen
- Services Security→ dependency to service security
- No insurance
- Protecting sensitive data (Security of Credentials)
- Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
- by end user
- by service providers
- by issuers (tricky)
- Misusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming
- High value target → one App or wallet with lots of functionalities and different sectors.
- Social engineering
- Secret services →trying to have back door in Wallets
- Dark Net
- Trust Infrastructure