Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  1. Losing our data
    1. Physical vulnerabilities 
      1. Device lost
      2. Device defection
      3. Device stolen
    2.  Services Unavailability ->Technical Problems
    3. Too many players are involved to recover lost data
    4. Recovery solution: there is no recovery solution, specially distributed one
    5. Security→ dependency to service security
    6. No insurance
  2. Protecting sensitive data Manipulation of data by anyone (end user)
  3. Misusing data by other individual or services through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
  4. Security of Credentials)
      1. Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
        1. by end user
        2. by service providers
        3. by issuers (tricky)
    Social engineering
      1. Misusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
  5. High value target → one App or wallet with lots of functionalities and different sectors.
    1. Social engineering
    2. Secret services →trying to have back door in Wallets
    3. Dark NetShaky Wi-Fi connections
  6. Trust Infrastructure