Simone Onofri
Simone Onofri
By @slistrom and @peppelinux A classification of the Wallet types, considering that each wallet, at a specific level, can have a different Threat Model. > Wallet Instance Types > >...
**_301 Moved Permanently_: The [updated version of the Threat Model](https://github.com/w3c-cg/threat-modeling/blob/main/models/decentralized-identities.md) is in the [Threat Model Community Group](https://www.w3.org/community/tmcg/) Repository**
@Sakurann thank you so much, I moved the Issue text, but here there are still some material needed to moved as issues. For sure these two works needs to be...
Threat Model and analysis by @RByers 👍 [Chromium: RWI privacy risk mitigation design](https://docs.google.com/document/d/1L68tmNXCQXucsCV8eS8CBd_F9FZ6TNwKNOaFkA8RfwI/edit#heading=h.8gq5f7p3it8qa) to include/reflect
Nice catch @johannhof :) This is a very good idea from @mikewest! Yes, on the one hand, we can make it a requirement to "RP" to use strict CSP, and...
Hello everyone, a general reflection of the Threat Model _Background_: The birth of the MRZ (as well as that of Barcodes) is to have a machine (laser reader or camera)...
Hi @wes-smith, Thank you for getting back to me. Surely, it's important to document in the appropriate section the threats (Security and Privacy Considerations) the technology wants to mitigate (if...