Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  1. Protecting dataLosing our data
    1. Security of devices
      1. Physical
      vulnerabilities 
      1. vulnerabilities
        1. Device lost
        2. Device defection
        3. Device stolen
    1.  Services Security→ dependency to service security
    2. No insurance
    Protecting sensitive data (Security of Credentials)
      1. Lack of Device Security

    1. Security of Wallets → one App or wallet with lots of functionalities and different sectors.
      1. Phishing Attacks

      2. Malware and Viruses

      3. Social Engineering

    2. Security of Verifiable Credentials
      1. Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
        1. by end user
        2. by service providers
        3. by issuers (tricky)
      2. Misusing or reusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
  2. High value target → one App or wallet with lots of functionalities and different sectors.
  3. Social engineering
  4. Secret services →trying to have back door in Wallets
    1.  Security of Services → dependency to service security
      1. relying parties
  5. Losing our data
    1. Not enough recovery solution
    2. No insurance
  6. Dark Net
  7. Trust Infrastructure
    1. PKI
    2. Registry
    3. any intermediaries