- Protecting dataLosing our data
- Security of devices
- Physical
vulnerabilities - vulnerabilities
- Device lost
- Device defection
- Device stolen
- Services Security→ dependency to service security
- No insurance
Protecting sensitive data (Security of Credentials)
Lack of Device Security
- Security of Wallets → one App or wallet with lots of functionalities and different sectors.
Phishing Attacks
Malware and Viruses
Social Engineering
- Security of Verifiable Credentials
- Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
- by end user
- by service providers
- by issuers (tricky)
- Misusing or reusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming
High value target → one App or wallet with lots of functionalities and different sectors.- Social engineering
Secret services →trying to have back door in Wallets- Security of Services → dependency to service security
- relying parties
- Losing our data
- Not enough recovery solution
- No insurance
- Dark Net
- Trust Infrastructure
- PKI
- Registry
- any intermediaries
{"serverDuration": 954, "requestCorrelationId": "db7897a3ecdb36ea"}