====== Threat Model ====== ===== Adversaries ===== * Police * Hoster * some guy stealing all of our hard disks * Administrators * Company * People within the company * Hackers * Advanced Persistent Threats (APT) ===== Methods to compromise ===== * changing the bootloader * intercepting unencrypted network connections * user session monitoring (keylogger) * root kits ===== Countermeasures ===== * Full Disk Encryption * encrypted containers (e.g. Veracrypt, LUKS / dm-crypt)