The security of an identity and your avatar or your avatars is crucial. If you think of the way that business email compromise works, it is often used in phishing attempts within the organization. If I can compromise somebody’s user identity in the metaverse and therefore get their avatar I’m functionally them. So if the CEO of a company is in a metaverse business meeting meets with the other avatars, or at least their avatar meets with the other avatars in the metaverse and it directs them to conduct financial transactions, it becomes verifiably difficult to say that wasn’t them.
Do you have a question for the IEEE Impact Creators?