You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 8 Next »

  1. Losing our data
    1. Physical vulnerabilities 
      1. Device lost
      2. Device defection
      3. Device stolen
    2.  Services Unavailability
    3. Too many players are involved to recover lost data
    4. Recovery solution: there is no recovery solution, specially distributed one
    5. No insurance
  2. Protecting sensitive data
    1. Manipulation of data by anyone(end user)
    2. Misusing data by other individual or services through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
  3. Security of Credentials
    1. Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
      1. by end user
      2. by service providers
      3. by issuers (tricky)
    2. Social engineering
  4. High value target → one App or wallet with lots of functionalities and different sectors.
    1. Social engineering
    2. Secret services
    3. Dark Net
    4. Shaky Wi-Fi connections
  • No labels