Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  1. Losing our data
    1. Physical vulnerabilities 
      1. Device lost
      2. Device defection
      3. Device stolen
    2.  Services Unavailability
    3. Too many players are involved to recover lost data
    4. Recovery solution: there is no recovery solution, specially distributed one
    5. No insurance
  2. Protecting sensitive data
    1. Manipulation of data by anyone(end user)
    2. Misusing data by other individual or services through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
  3. Security of Credentials
    1. Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
      1. by end user
      2. by service providers
      3. by issuers (tricky)
    2. Social engineering
  4. Shaky Wi-Fi connections
  5. High value target → one App or wallet with lots of functionalities and different sectors.
    1. Social engineering
    2. Secret services
    3. Dark Net
    4. Shaky Wi-Fi connections