Malware attacks against SSI, how SSI may be the perfect honeypot if you're not careful
Malware Attacks Against SSI: How SSI may be the perfect honeypot if you’re not careful.
Tuesday 3C
Convener: Michael Lodder
Notes-taker(s): Kyle Den Hartog
Tags for the session - technology discussed/ideas considered:
Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:
Link to slides: http://docs.google.com/presentation/d/15rK2DfRgQksgGy_H9q5d_mweNC-jJdmqvkMcuoyoZ7E/edit?usp=sharing
Provisional threat model about Indy from @stephen Curran http://docs.google.com/document/d/1M1-Xi99-pkgDnFiYmoc12b3eMgkyBC_HqYZMrTrCkCI/edit
Aries RFC about credential fraud: http://github.com/hyperledger/aries-rfcs/tree/master/concepts/0207-credential-fraud-threat-model
Link to paper by Heather Vescent and Bob Blakley: http://www.researchgate.net/publication/330542765_Shifting_Paradigms_Using_Strategic_Foresight_to_Plan_for_Security_Evolution
Link to DID/VC IoT threat model: http://link.springer.com/chapter/10.1007/978-3-030-39047-1_16