Table of Contents
Adversaries
Methods to compromise
Countermeasures
Threat Model
Adversaries
Police
Hoster
some guy stealing all of our hard disks
Administrators
Company
People within the company
Hackers
Advanced Persistent Threats (APT)
Methods to compromise
changing the bootloader
intercepting unencrypted network connections
user session monitoring (keylogger)
root kits
Countermeasures
Full Disk Encryption
encrypted containers (e.g. Veracrypt, LUKS / dm-crypt)