You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
« Previous
Version 10
Next »
- Governments Rules
- Overcoming national borders might impose barriers
- Some Government policy imposes to take a special orientation in technology or protocols.
- Changing rules of a government, not enough futuristic
- International Compatibility (ex. GDPR)
- Some countries have legal limitation whereas the others have nothing or different type of that, resulting in incompatibility
- Different use of existing rules
- Local legitimation (also sector or domain legitimation) are various and people bring this to the ecosystem and cause problems
- Misusing of DID: Security of Credentials: Just like with traditional passwords, weak keys or improperly stored credentials in distributed identity systems can be vulnerable to hacking; User Responsibility: Users will need to be mindful of what data they share and with whom. Managing which verifies/relying parties should have access to which type of personal data can become complex.
- There is defined rules or legal commitment for misusing punishment in real world but not precisely for misusing of DID
- It could happens whether national or international