You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

  1. Losing our data
    • Physical vulnerabilities 
      • Device lost
      • Device defection
      • Device stolen
    •  Services Unavailability
    • Too many players are involved to recover lost data
    • Recovery solution: there is no recovery solution, specially distributed one
    • No insurance
  2. Protecting sensitive data
    • Manipulation of data by anyone(end user)
    • Misusing data by other individual or services through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
  3. Security of Credentials
    • Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
      • by end user
      • by service providers
      • by issuers (tricky)
    • Social engineering
  4. High value target → one App or wallet with lots of functionalities and different sectors.
    1. Social engineering
    2. Secret services
    3. Dark Net
  • No labels