Attack Vectors (Global)

High-quality technical overview of Attack Vectors in the context of blockchain security.

Contenido pendiente de traducción. Se muestra la versión en inglés.

Attestation Workflow: 1. Issuance: Attester signs a claim. 2. Storage: User keeps the attestation. 3. Presentation: User shows the attestation to a Verifier. 4. Verification: Verifier checks the cryptographic signature and schema. Applications: Hardware security (TPM/SGX), Decentralized Identity (DID), Proof of Reserves, Verified Credentials.

        graph LR
  Center["Attack Vectors (Global)"]:::main
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 Explícalo como si tuviera 5 años

Imagine you need to prove you're a doctor to get into a medical conference. Instead of bringing your actual degree, you show a digital badge from your university that has a special, unforgeable stamp. The security guard can check the stamp to see it's real without needing to call the university or read your whole transcript. That 'badge with a stamp' is an [attestation](/es/terms/attestation).

🤓 Expert Deep Dive

At the hardware level, 'Remote Attestation' leverages a Root of Trust (like a TPM) to generate a 'Quote'. This quote contains a SHA-256 hash (measurement) of the loaded software and hardware state, signed by an Attestation Identity Key (AIK). This allows a remote verifier to ensure the system hasn't been tampered with before sending sensitive data. On-chain, protocols like EAS (Ethereum Attestation Service) use standard schemas to record 'who attested to what' on a ledger, creating a 'Web of Trust' that can be used for everything from credit scoring to sybil-resistance in DAOs.

📚 Fuentes