From f8d784b79e237cadcdfe00abf187fcbaa334df35 Mon Sep 17 00:00:00 2001 From: urist Date: Thu, 19 Dec 2024 16:38:44 +0100 Subject: [PATCH] threat model --- opsec/high_availability/index.html | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) diff --git a/opsec/high_availability/index.html b/opsec/high_availability/index.html index a59c374..d27e163 100644 --- a/opsec/high_availability/index.html +++ b/opsec/high_availability/index.html @@ -77,6 +77,35 @@ High-availability, the ability to provide high-uptime infrastructure, also has f +
+
+
+
+ Previous Page

nihilist - 00 / 00 / 00

+

SRVNAME Setup

+ +

+

Threat model

+ +In order to understand how high availability, or lack thereof, impacts our security posture me must first define the skills and abilities of our adversary. For this tutorial the adversary has the following attributes: + +
    +
  • Ability to monitor the hidden service status and know rapidly if it goes offline
  • +
  • Ability to directly tamper with either the power grid or the internet infrastructure with high granularity (DSLAM level, which could be a small town or a group of city blocks)
  • +
  • Ability to monitor the effects of tampering or incidents impacting the power grid or the internet infrastructure
  • +
+ + +A concrete example of such an adversary would be law enforcement and government agencies. + +

+ +
+
+
+
+ +