OneID Threat Analysis

This is a preliminary threat analysis covering the most common threats.

Threat

Defense

Stolen laptop

N

Stolen phone

Most

All devices stolen and hardware hacked  
Phishing credentials  
Phishing site looks like legit site in order to get signed credentials from the user  
Keylog  
Malware on laptop  
Malware gets added to  phone (including phone gets rooted case)  
MITM/MITB  
Eurograbber  
Cloned evil OneID app  
Phish intricate  
Compromise user's email account  
Compromise SMS  
Compromise OneID repo (read and write compromises)  
Compromise OneID pairing server  
Compromise OneID javascript server  
Compromise OneID helper service  
Attacker finds recovery code in email or wallet  
PIN reset process  
Password reset process  
Steal device; completely lock out legit user; Create new recovery code  
Brute force PIN or password attack  
Clone credentials from AD  
Clone credentials from CD  
Register OneID before legiti user  
Attacker links OneID to American Express account before or after legit user  
Steal credit card, then create OneID using stolen credit card  
Public terminal has malware and you pair with it  
Left OneID credential on public terminal after usage  
DNS compromise  
Wifi AP is corrupt; it listens in conversation, delivers wrong DNS info, etc.  
DDOS against OneID servers  
OneID server hardware failure/ OneID general site failure (no Internet, power, etc)  
Brute force password guess attack for a specific account causing pairing lockout for legit user  
PIN/password throttle document (e.g., pairing attacks in order to have infinite number of guesses for password or PIN)  
Attacker threatens you with a gun to hand over your cell phone and give him your password and PIN distress PIN
Use AD to make CD or CD to make an AD there are two device classes and they are independent

 

 

 

OneID documentation guide