The following guide aims to help users identify relevant threats and select the appropriate security mechanisms they should implement, considering the constraints and requirements of a given QR code deployment. The following guide aims to help users identify relevant threats and select the appropriate security mechanisms they should implement, considering the constraints and requirements of a given QR code deployment. QR code support The base of the QR code is its actual support. It could be physical, namely printed on a label, or digital, in a digital wallet or web page. Payload content The payload embedded on the QR code can be directed at different audiences. The payload carries information through two non-mutually exclusive means. The most common way is via a URL, linking web resources that can be accessed with any QR code reader. Alternatively, the payload could be a custom package, as plain text or with a structured language. Type of reader The choice of the reader depends on the target audience (public/private) and the type of payload (custom package). The three options include: Click on the buttons below to download the report.QR Code Security Wizard
QR code criteria
Congratulations, you have finalised the digital QR Code Security Wizard!