You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

  1. Governments Rules
    1. Overcoming national borders might impose barriers
    2. Some Government policy imposes to take a special orientation in technology or protocols. 
    3. Changing rules of a government, not enough futuristic
  2. International Compatibility (ex. GDPR)
    1. Some countries have legal limitation whereas the others have nothing or different type of that, resulting in incompatibility
    2. Different use of existing rules
    3. Local legitimation (also sector or domain legitimation) are various and people bring this to the ecosystem and cause problems
  3. Misusing of DID: Security of Credentials: Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable to hacking; User Responsibility:  Users will need to be mindful of what data they share and with whom. Managing which verifies/relying parties should have access to which type of personal data can become complex.
    1. There is defined rules or legal commitment for misusing punishment in real world but not precisely for misusing of DID
    2. It could happens whether national or international
  • No labels