Attack Vectors (Global)
High-quality technical overview of Attack Vectors in the context of blockchain security.
Attestation Workflow: 1. Issuance: Attester signs a claim. 2. Storage: User keeps the attestation. 3. Presentation: User shows the attestation to a Verifier. 4. Verification: Verifier checks the cryptographic signature and schema. Applications: Hardware security (TPM/SGX), Decentralized Identity (DID), Proof of Reserves, Verified Credentials.
graph LR
Center["Attack Vectors (Global)"]:::main
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 5살도 이해할 수 있게 설명
Imagine you need to prove you're a doctor to get into a medical conference. Instead of bringing your actual degree, you show a digital badge from your university that has a special, unforgeable stamp. The security guard can check the stamp to see it's real without needing to call the university or read your whole transcript. That 'badge with a stamp' is an [attestation](/ko/terms/attestation).
🤓 Expert Deep Dive
At the hardware level, 'Remote Attestation' leverages a Root of Trust (like a TPM) to generate a 'Quote'. This quote contains a SHA-256 hash (measurement) of the loaded software and hardware state, signed by an Attestation Identity Key (AIK). This allows a remote verifier to ensure the system hasn't been tampered with before sending sensitive data. On-chain, protocols like EAS (Ethereum Attestation Service) use standard schemas to record 'who attested to what' on a ledger, creating a 'Web of Trust' that can be used for everything from credit scoring to sybil-resistance in DAOs.