diff --git a/opsec/high_availability/index.html b/opsec/high_availability/index.html
index 4f2e20b..fd2e499 100644
--- a/opsec/high_availability/index.html
+++ b/opsec/high_availability/index.html
@@ -86,7 +86,7 @@ Being able to plausibly deny being the operator of, or a downstream service supp
How can high availability help?
-In the above scenario if the onion service operator had setup a redundant, highly available server then connections would have been seamlessly sent to another server in the redundancy pool, this preventing the adversary
-from extracting location information based on their operation. This works best with a server in a different country or region, making a coordinated attack by several adversaries a requirement in order to use this method for deanonymization.
+In the above scenario if the onion service operator had setup a
redundant, highly available server then connections would have been seamlessly sent to another server in the redundancy pool, thus preventing the adversary
+from extracting location information based on their operation. This works best with a server in a
different country or region, making a coordinated attack by several adversaries a requirement in order to use this method for deanonymization.
@@ -158,8 +158,31 @@ Below is a chart depicting an adversary attack flow. As shown, high availability
+
+As you can see the adversarie's playbook is quite simple:
+
+
+ - Identify a list of potential suspects
+ - Cut them off the internet
+ - Check whether this action made the hidden service unreachable
+
+
+
+Those actions are easily perpetrated by law enforcement as they only require:
+
+ - DSLAM level access to the internet backbone used by the suspects (impacting a perimeter like a city block)
+ - City block level access to the power grid in order to run disruptive actions
+
+
+Both of those are trival to obtain for LEOs (law enforcement officers).
+
+
+

+
+This Diagram shows where the attack takes place and how a redundant setup prevent such attacks from confirming the physical location of the hidden service.
+