You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

  1. Losing our data
    1. Physical vulnerabilities 
      1. Device lost
      2. Device defection
      3. Device stolen
    2.  Services Security→ dependency to service security
    3. No insurance
  2. Protecting sensitive data (Security of Credentials)
      1. Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
        1. by end user
        2. by service providers
        3. by issuers (tricky)
      2. Misusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
  3. High value target → one App or wallet with lots of functionalities and different sectors.
    1. Social engineering
    2. Secret services →trying to have back door in Wallets
    3. Dark Net
  4. Trust Infrastructure
  • No labels