Cybersecurity Flaws in The Metaverse #1
Cybersecurity Flaws in The Metaverse #1
Joas Antonio
Metaverse #1 https://www.linkedin.com/in/joas-antonio-dos-santos
Emerging Technologies in 2022 and 2023
• Smart Spaces: Enhancing the capability of spaces using IoT and AI;
• Generative AI: Creation of new materials, based on original data, example:
Thisdoesnotexist and other AI that can even generate texts, audios and images;
• Metaverse: In 2022 refers to the merging of video games, social media and
entertainment to create new immersive experiences, like swimming into your
favorite music at an online concert.
What is Metaverse?
• Physical Security
• Network Security
• System Security
• Application Security
• User Security
Physical Risk
• “With what we have today, is it possible to be immersed
for a few hours in a world that will trick our brain to the
point of no longer recognizing what is outside the lens?”
No!
• Headaches, Nausea, disorientation and other symptoms
end up being a reality in the current metaverse;
• Users typically move around in the real world with an
Augmented Reality overlay, making physical safety a
concern. If users get too immersed in the virtual world,
they can harm themselves or those around them.
Network Risk
• Improperly opened ports and services;
• Traffic on unsafe websites;
• Lack of network security (Segregation of
VLANs, use of secure protocols, tools
such as DLP, Zero Trust, Firewall, etc.);
• Devices and development environments
exposed to the Internet;
System Risk
https://github.com/QuestEscape/research
Application Risk
• Extra: These tokens are powered by smart contracts, which in turn are
deployed as compiled code within a transaction on the blockchain.
And as “non-fungible” as the tokens themselves may be – meaning
that their representation within the blockchain is unique and cannot
be duplicated – the metadata associated with NFTs is very fungible.
Therefore, nothing prevents copycats from creating new NFTs (using
different smart contracts, or even different blockchains) that point to
a copy of the content associated with the original.
• Phishing Attacks;
• Identity theft;
• Privacy of data entered on the platform;
• Understand the concept of smart contracts to identify whether the source code is published or not;
• Identity management;
• Harassment and verbal aggression;
• Deepfakes;
Metaverse users' identities can be spoofed, their accounts
• Malware attacks; can be hacked, and their avatars can be controlled. A
common challenge is that the identity of the person
metaverse users are dealing with is always questionable.
What's your choice: Reality or Simulation?
THANKS!