Assessment reports>Reclaim Protocol>Discussion>User-phishing risk

User-phishing risk

When users generate a proof of identity or reputation to share with third-party websites, they are required to log in to the website that holds the credential. Attackers can easily steal information by convincing users to generate proofs on elaborately designed fake websites through social engineering.

To mitigate the weakness to phishing in such a structure, it is necessary to implement basic phishing prevention and user-warning measures. These could include

  • checking website hosts against the default providers offered by the Reclaim protocol, and

  • querying the host on phishing-website databases such as OpenPhish.

Zellic © 2025Back to top ↑