A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is
International Journal of Cyber Forensics and Advanced Threat Investigations
In our connected world security and proof (evidence constituted in Verifiable Credentials (VC, W3C)) is distributed over what an individual can attest, what my objects tell about me (that is why AI = inferences from that data, is so important), and my behavior: "apply shaving foam" is a number in coelition.org. It is clear that we can no longer isolate the notion of security as in securing devices or securing infrastructure. In this brief article which is the background to a number of workshopsdoi:10.46386/ijcfati.v2i1.36 fatcat:qlkpz5z7rfhyhhnksihdauylj4