Device defection (not availability of device or no battery)
Device stolen
Services Unavailability
Too many players are involved to recover lost data
Recovery solution:there is no recovery solution, specially distributed one
No insurance
Protecting sensitive data
Manipulation of data by anyone(end user)
Misusing data by other individual or services through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming
Lack of Device Security
Security of Wallets → one App or wallet with lots of functionalities and different sectors.
Phishing Attacks
Malware and Viruses
Social Engineering
Security of Verifiable
Security of
Credentials
Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable for hacking
by end user
by service providers
by issuers (tricky)
by third parties → Misusing or reusing data by third parties through illegal access e.g. Intrusion through malicious App, social engineering, duplication, skimming
Security of Services → dependency to service security
relying parties
intermediaries
Losing data → lack of support mechanism by security issues
Not enough recovery solution
No insurance
Dark Net → security economic → there is a business to generate fake ids or misuse of real ids, which could be used for washing money or any other illegal action
Fake ID
Misusing of VC
Trust Infrastructure → any vulnerabilities causes by mistakes in Trust Infrastructure
PKI
Registry
Any intermediaries
Social engineering
Shaky Wi-Fi connections
High value target → one App or wallet with lots of functionalities and different sectors.