+
Previous Page
nihilist - 00 / 00 / 00
+
SRVNAME Setup
+

+
+
Threat model
+
+In order to understand how high availability, or lack thereof, impacts our security posture me must first define the skills and abilities of our adversary. For this tutorial the adversary has the following attributes:
+
+
+ - Ability to monitor the hidden service status and know rapidly if it goes offline
+ - Ability to directly tamper with either the power grid or the internet infrastructure with high granularity (DSLAM level, which could be a small town or a group of city blocks)
+ - Ability to monitor the effects of tampering or incidents impacting the power grid or the internet infrastructure
+
+
+
+A concrete example of such an adversary would be law enforcement and government agencies.
+
+
+
+