Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  1. Protecting data
    1. Security of devices
      1. Physical vulnerabilities
        1. Device lost
        2. Device defection (not availability of device or no battery)
        3. Device stolen
      2. Lack of Device Security
    2. Security of Wallets → one App or wallet with lots of functionalities and different sectors.
      1. Phishing Attacks
      2. Malware and Viruses
      3. Social Engineering
    3. Security of Verifiable Credentials
      1. Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
        1. by end user
        2. by service providers
        3. by issuers (tricky)
      2. Misusing or reusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
    4.  Security of Services → dependency to service security
      1. relying parties
  2. Losing data
    1. Not enough recovery solution
    2. No insurance
  3. Dark Net → security economic 
    1. Fake ID
    2. Misusing of VC
  4. Trust Infrastructure
    1. PKI
    2. Registry
    3. Any intermediaries