- Losing our data
- Physical vulnerabilities
- Device lost
- Device defection
- Device stolen
- Services Unavailability
- Too many players are involved to recover lost data
- Recovery solution: there is no recovery solution, specially distributed one
- No insurance
- Protecting sensitive data
- Manipulation of data by anyone(end user)
- Misusing data by other individual or services through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming
- Security of Credentials
- Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
- by end user
- by service providers
- by issuers (tricky)
- Social engineering
- Shaky Wi-Fi connections
- High value target → one App or wallet with lots of functionalities and different sectors.
- Social engineering
- Secret services
- Dark Net
- Shaky Wi-Fi connections
{"serverDuration": 225, "requestCorrelationId": "d43b97492660a10b"}