This report asks one simple question: which remote-signing risks still exist even when current ETSI controls are in place?

Core point: a signature can pass technical checks, but there can still be a dispute about whether the signer approved that exact content.

This document does not solve those risks. It shows where they remain and what evidence is missing when disputes happen.

The focus is whether [=Sole control=] and signer [=Intent=] are [=Verifier-checkable=] rather than only [=Assurance-only=].

Scope and Method

Scope:

qualified remote signatures where signing is triggered through a service run by a [=TSP=] (typically a [=QTSP=] in this context) under [=eIDAS=] [[EIDAS910]] [[EIDAS2024_1183]].

Threat qualification rule:

A scenario is included only when it can still happen even if current [=ETSI=] controls are in place.

Attacker classes in scope:

Method:

Each scenario is presented in one consistent format: THREAT, MITIGATION, and RESIDUAL.

The goal is simple: show which controls are already in force, what an independent party can verify today, and what still remains disputed.

Terminology and Abbreviations

eIDAS
[=EU=] regulation for electronic identification and trust services (Regulation (EU) No 910/2014 and amendments) [[EIDAS910]] [[EIDAS2024_1183]].
EU
The jurisdictional legal framework referenced in this report.
TSP
Organization that provides one or more trust services in scope.
QTSP
A [=TSP=] with qualified status under [=eIDAS=].
QSCD
Protected signing device or service boundary used to create qualified signatures under [=eIDAS=] [[EIDAS910]].
ETSI
Standards body publishing remote-signing technical standards used in this report.
CEN
Standards body whose [=EN=] 419 241 series defines server-signing concepts.
TS
[=ETSI=] publication type used for technical requirements.
EN
European standard publication designation.
ESI
[=ETSI=] working domain label for signature and trust standards.
AdES
Advanced electronic signature model referenced by [=ETSI=] profiles.
SCDev
Signature creation device component term used in remote [=QSCD=] architecture context.
API
Protocol interface exposed for remote-signing operations.
DTBS
The exact content that should be signed.
DTBSR
Representation of [=DTBS=] that remote-signing components process [[ETSI119432]] [[ETSI119431_1]].
SAD
Activation material used to authorize a remote signing operation [[ETSI119431_1]].
OCSP
Certificate status source used in validation.
CRL
Revocation status source used in validation.
TL
National trusted list used for trusted service status discovery.
LOTL
List that provides discovery pointers to [=TL=] entries [[TL2015_1505]].
Sole control
Requirement that only the signer can validly trigger signature creation for the event under the stated assumptions [[EIDAS910]].
Intent
Evidence that the signer approved the same content that was actually signed.
Verifier-checkable
Evidence a third party can independently replay and verify without relying only on provider narrative.
Assurance-only
Control mainly supported by audits, policy, or process evidence rather than standalone replayable artifacts.

System Model and Trust Boundaries

Assets:

Main boundary split:

This split is the main reason residual dispute risk remains.

Residual Scenarios and Evidence Gaps

This report keeps four residual scenarios that can still exist under the current [=ETSI=] baseline.

Format per scenario: THREAT, MITIGATION (controls in force), and RESIDUAL (what still cannot be independently proven).

R1: Show A, Sign B

THREAT: A compromised signer-side frontend keeps a valid authenticated session and, after displaying content A, sends a different [=DTBSR=] (content B) in the signing request.

MITIGATION: [=ETSI=] requires controlled signature activation, [=SAD=] protection/binding controls, service-side access and security controls, and a remote-signing [=API=] message model for payload handling [[ETSI319401]] [[ETSI119431_1]] [[ETSI119432]].

RESIDUAL: Unless verifier-visible evidence includes a trusted-path binding between signer view and submitted [=DTBSR=], third parties may still lack independent proof that the signer approved the same content that was finally signed.

R2: Privileged Internal Misuse

THREAT: A privileged insider (or misuse of privileged credentials) manipulates authorization state, service policy, or signing requests and causes a valid signature to be created, even when signing keys remain within the [=QSCD=] boundary and are not exported [[EIDAS910]].

MITIGATION: [=ETSI=] requires role separation, privileged-access control, monitoring, and audit/retention controls for trust-service operation and remote-signing service components [[ETSI319401]] [[ETSI119431_1]] [[ETSI119431_2]].

RESIDUAL: In a dispute, external reviewers may still lack an independently replayable event-level record proving that this exact activation path was free from privileged misuse.

R3: Missing Validation Snapshot

THREAT: For one validation decision, the baseline can yield a valid status result while associated validation-report evidence elements remain optional in the report model; therefore a complete decision-time evidence snapshot is not guaranteed to exist for every case [[ETSI119102_2]] [[ETSI319102_1]].

MITIGATION: [=eIDAS=] and trusted-list acts define legal validation conditions and trust-list context, and [=ETSI=] EN 319 102-1 / TS 119 102-2 define validation and report structures that can include validation data used [[EIDAS910]] [[TL2015_1505]] [[EIDAS2025_2164]] [[ETSI319102_1]] [[ETSI119102_2]].

RESIDUAL: If decision-time validation inputs are not immutably retained and disclosed, whether by design gaps or privileged tampering, external replay cannot reconstruct the original decision path.

R4: Evidence Stays Inside the Provider

THREAT: Critical activation evidence remains internal, so third-party dispute replay is incomplete.

MITIGATION: Logging and governance obligations [[ETSI319401]] [[ETSI119431_1]] [[ETSI119431_2]].

RESIDUAL: External parties may still be unable to verify the full activation/evidence event history without relying on provider narrative.

Alternative

Alternative direction: define recognition criteria under which consumer devices with specified secure components can serve as [=QSCD=]-class signature creation environments for decentralized legal trust workflows.

Companion report: https://z-base.github.io/lqscd-report/