July 2025
Intermediate to advanced
352 pages
11h 41m
English
This chapter examines the risks and limitations of current digital security systems and expands into the potential of decentralized technologies. Through a detailed examination of public-key infrastructure (PKI), quantum-resistant cryptography, and decentralized security models, the chapter explores how these technologies address the challenges posed by modern cyber threats and pave the way for secure digital identity management systems.
Understand the limitations of public-key infrastructure (PKI): Examine the centralized trust model of PKI, its vulnerabilities to cyber threats such as certificate authority compromises and on-path attacks, and the challenges posed by quantum computing.
Explore ...
Read now
Unlock full access