diff --git a/opsec/high_availability/index.html b/opsec/high_availability/index.html index a59c374..d27e163 100644 --- a/opsec/high_availability/index.html +++ b/opsec/high_availability/index.html @@ -77,6 +77,35 @@ High-availability, the ability to provide high-uptime infrastructure, also has f +
+
+
+
+ Previous Page

nihilist - 00 / 00 / 00

+

SRVNAME Setup

+ +

+

Threat model

+ +In order to understand how high availability, or lack thereof, impacts our security posture me must first define the skills and abilities of our adversary. For this tutorial the adversary has the following attributes: + +
    +
  • Ability to monitor the hidden service status and know rapidly if it goes offline
  • +
  • Ability to directly tamper with either the power grid or the internet infrastructure with high granularity (DSLAM level, which could be a small town or a group of city blocks)
  • +
  • Ability to monitor the effects of tampering or incidents impacting the power grid or the internet infrastructure
  • +
+ + +A concrete example of such an adversary would be law enforcement and government agencies. + +

+ +
+
+
+
+ +