Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  1. Losing our Protecting data
    1. Security of devices
      1. Physical
      vulnerabilities 
      1. vulnerabilities
        1. Device lost
        2. Device defection (not availability of device or no battery)
        3. Device stolen
    2.  Services Security→ dependency to service security
    3. No insurance
    Protecting sensitive data (Security of Credentials)
      1. Lack of Device Security
    1. Security of Wallets → one App or wallet with lots of functionalities and different sectors.
      1. Phishing Attacks
      2. Malware and Viruses
      3. Social Engineering
    2. Security of Verifiable Credentials
      1. Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
        1. by end user
        2. by service providers
        3. by issuers (tricky)
        4. by third parties → Misusing or reusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming 
  2. High value target → one App or wallet with lots of functionalities and different sectors.
    1. Social engineering
    2. Secret services →trying to have back door in Wallets
    3. Dark Net
    1.  Security of Services → dependency to service security
      1. relying parties
      2. intermediaries
  3. Losing data → lack of support mechanism by security issues
    1. Not enough recovery solution
    2. No insurance
  4. Dark Netsecurity economic → there is a business to generate fake ids or misuse of real ids, which could be used for washing money or any other illegal action 
    1. Fake ID 
    2. Misusing of VC
  5. Trust Infrastructure → any vulnerabilities causes by mistakes in Trust Infrastructure
    1. PKI
    2. Registry
    3. Any intermediaries
    Trust Infrastructure