Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  1. Losing our data
    • Physical vulnerabilities 
      • Device lost
      • Device defection
      • Device stolen
    •  Services Unavailability
    • Too many players are involved to recover lost data
    • Recovery solution: there is no recovery solution, specially distributed one
  2. Protecting sensitive data
    • Manipulation of data by anyone(end user)
    • Misusing data by other individual or services through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
  3. Security of Credentials
    • Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable

...

    • for hacking
      • by end user
      • by service providers
      • by issuers (tricky)
    • Social engineering
  1. High value target → one App or wallet with lots of functionalities and different sectors.
    1. Social engineering
    2. Secret services
    3. Dark Net