...
- Protecting data
- Security of devices
- Physical vulnerabilities
- Security of devices
- Device lost
- Device defection (not availability of device or no battery)
- Device stolen
...
- Manipulation of data by end user
- Misusing data by other individual through illegal access e.g. Intrusion through malicious App
- Lack of Device Security
- Security of Wallets → one App or wallet with lots of functionalities and different sectors.
- Phishing Attacks
- Malware and Viruses
- Social Engineering
- Security of Verifiable
...
- Credentials
- Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable
- Credentials
...
- for hacking
- by end user
- by service providers
- by issuers (tricky)
- by third parties → Misusing or reusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming
- for hacking
- Security of Services → dependency to service security
- relying parties
- intermediaries
- Losing data → lack of support mechanism by security issues
- Not enough recovery solution
- No insurance
- Dark Net → security economic → there is a business to generate fake ids or misuse of real ids, which could be used for washing money or any other illegal action
- Fake ID
- Misusing of VC
- Trust Infrastructure → any vulnerabilities causes by mistakes in Trust Infrastructure
- PKI
- Registry
- Any intermediaries