You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
« Previous
Version 4
Next »
- Physical vulnerabilities
- Device lost
- Device defection
- Device stolen
- Protecting sensitive data
- Manipulation of data by end user
- Misusing data by other individual through illegal access e.g. Intrusion through malicious App
- Security of Credentials
- Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable to hacking