mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 06:46:42 +00:00
threat model
This commit is contained in:
parent
84393d64bb
commit
f8d784b79e
1 changed files with 29 additions and 0 deletions
|
@ -77,6 +77,35 @@ High-availability, the ability to provide high-uptime infrastructure, also has f
|
|||
</div> <!-- /container -->
|
||||
</div><!-- /grey -->
|
||||
|
||||
<div id="anon4">
|
||||
<div class="container">
|
||||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist - 00 / 00 / 00</ba></p>
|
||||
<h1>SRVNAME Setup </h1>
|
||||
<img src="0.png" class="imgRz">
|
||||
<p>
|
||||
<h2> <b>Threat model</b> </h2>
|
||||
|
||||
In order to understand how high availability, or lack thereof, impacts our security posture me must first define the skills and abilities of our adversary. For this tutorial the adversary has the following attributes:
|
||||
|
||||
<ul>
|
||||
<li>Ability to monitor the hidden service status and know rapidly if it goes offline</li>
|
||||
<li>Ability to directly tamper with either the power grid or the internet infrastructure with high granularity (DSLAM level, which could be a small town or a group of city blocks)</li>
|
||||
<li>Ability to monitor the effects of tampering or incidents impacting the power grid or the internet infrastructure</li>
|
||||
</ul>
|
||||
|
||||
|
||||
A concrete example of such an adversary would be law enforcement and government agencies.
|
||||
|
||||
</p>
|
||||
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
</div> <!-- /container -->
|
||||
</div><!-- /grey -->
|
||||
|
||||
|
||||
<!-- +++++ Second Post +++++ -->
|
||||
<div id="anon3">
|
||||
<div class="container">
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue