Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Extended misusing of DID
  1. Governments Rules
    1. Overcoming national borders might impose barriers
    2. Some Government policy imposes to take a special orientation in technology or protocols. 
    3. Changing rules of a government, not enough futuristic
  2. International Compatibility (ex. GDPR)
    1. Some countries have legal limitation whereas the others have nothing or different type of that, resulting in incompatibility
    2. Different use of existing rules
    3. Local legitimation (also sector or domain legitimation) are various and people bring this to the ecosystem and cause problems
  3. Misusing of DID: Security of Credentials: Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable to hacking; User Responsibility:  Users will need to be mindful of what data they share and with whom. Managing which verifies/relying parties should have access to which type of personal data can become complex.
    1. There is defined rules or legal commitment for misusing punishment in real world but not precisely for misusing of DID
    2. It could happens whether national or international