threat model

This commit is contained in:
urist 2024-12-19 16:38:44 +01:00
parent 84393d64bb
commit f8d784b79e

View file

@ -77,6 +77,35 @@ High-availability, the ability to provide high-uptime infrastructure, also has f
</div> <!-- /container -->
</div><!-- /grey -->
<div id="anon4">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist - 00 / 00 / 00</ba></p>
<h1>SRVNAME Setup </h1>
<img src="0.png" class="imgRz">
<p>
<h2> <b>Threat model</b> </h2>
In order to understand how high availability, or lack thereof, impacts our security posture me must first define the skills and abilities of our adversary. For this tutorial the adversary has the following attributes:
<ul>
<li>Ability to monitor the hidden service status and know rapidly if it goes offline</li>
<li>Ability to directly tamper with either the power grid or the internet infrastructure with high granularity (DSLAM level, which could be a small town or a group of city blocks)</li>
<li>Ability to monitor the effects of tampering or incidents impacting the power grid or the internet infrastructure</li>
</ul>
A concrete example of such an adversary would be law enforcement and government agencies.
</p>
</div>
</div><!-- /row -->
</div> <!-- /container -->
</div><!-- /grey -->
<!-- +++++ Second Post +++++ -->
<div id="anon3">
<div class="container">