-
Context and assumptions
+
Context and assumptions
-
Setting up the scene
+
Setting up the scene
Alice wishes to start hosting a coordination platform for her activist group, but she doesn't want to host the platform herself for the following reasons:
@@ -109,11 +109,11 @@ in this post we are going to do a threat modelling exercise:
She gets in touch with Bob, owner and operator of Bob's friendly datacenter, and orders from him a VPS (Virtual Private Server). Bob's pretty open-minded so Alice is free to use whatever OS she wants, gets a public IP.
-
Enters Leo
+
Enters Leo
One day Bob's phone rings, it's Leo calling! Leo asks Bob to confirm that he indeed has Alice as a customer. Without further ado, Leo pays Bob a visit! After entering the premises and showing a government agency badge, Leo asks for complete access to Bob's infrastructure and binds him with a gag order to make sure no one hears about his investigation. Even if Bob is sympathetic to Alice or wishes to protect his customers he would now run afoul of his country's laws if he were to warn them. Leo might have been nice to him but he is not to be trifled with...
-
Leo sets up shop
+
Leo sets up shop
Commandeering an office in Bob's datacenter, Leo gets to work. He has plenty of options: