- Physical vulnerabilities
- Device lost
- Device defection
- Device stolen
- Protecting sensitive data
- Manipulation of data by end user
- Misusing data by other individual through illegal access e.g. Intrusion through malicious App
- Security of Credentials
- Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable to hacking