Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  1. Protecting dataLosing our data
    1. Security of devices
      1. Physical
    vulnerabilities 
      1. vulnerabilities
        1. Device lost
        2. Device defection (not availability of device or no battery)
        3. Device stolen
  2.  Services Unavailability
  3. Too many players are involved to recover lost data
  4. Recovery solution: there is no recovery solution, specially distributed one
  5. No insurance
  6. Protecting sensitive data
    • Manipulation of data by anyone(end user)
    • Misusing data by other individual or services through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
      1. Lack of Device Security
    1. Security of Wallets → one App or wallet with lots of functionalities and different sectors.
      1. Phishing Attacks
      2. Malware and Viruses
      3. Social Engineering
    2. Security of Verifiable
  7. Security of
    1. Credentials
      1. Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
        1. by end user
        2. by service providers
        3. by issuers (tricky)
        4. by third parties → Misusing or reusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
    2.  Security of Services → dependency to service security
      1. relying parties
      2. intermediaries
  8. Losing data → lack of support mechanism by security issues
    1. Not enough recovery solution
    2. No insurance
  9. Dark Netsecurity economic → there is a business to generate fake ids or misuse of real ids, which could be used for washing money or any other illegal action 
    1. Fake ID 
    2. Misusing of VC
  10. Trust Infrastructure → any vulnerabilities causes by mistakes in Trust Infrastructure
    1. PKI
    2. Registry
    3. Any intermediaries
  11. Social engineering
  12. Shaky Wi-Fi connections
  13. High value target → one App or wallet with lots of functionalities and different sectors.
    1. Social engineering
    2. Secret services
    3. Dark Net