This post, the final in our Identity Credentials Risks blog series, focuses on Risk Category 3, which considers the risks associated with authorization or the activities someone has permission to perform. Authorization always follows Risk Categories 1 and 2 within both digital and real-life situations, because to determine what activities someone is allowed to do, […]

Author