Iota is intended to be deployed on IoT devices.
A problem with IoT devices is that they are placed in insecure locations, allowing attackers to gain physical access and perform advance/prolonged attacks without detection.
Under these condition, an attacker can obtain the seed and hence masquerade as the device.
I can't see anything in Iota that prevents this. Are there any mechanisms in place?
"this ‘second stage’ is all about taking advantage of IOTA’s modular lightweight nature by extending usability through modules/platforms built on top of the underlying IOTA fundament."
– Cybergibbons Jul 18 '18 at 09:54