Known Vulnerabilities in Siveillance Identity