Threat Model
Adversaries
- Police
- Hoster
- some guy stealing all of our hard disks
- Administrators
- Company
- People within the company
- Hackers
- Advanced Persistent Threats (APT)
Methods to compromise
- changing the bootloader
- intercepting unencrypted network connections
- user session monitoring (keylogger)
- root kits
Countermeasures
- Full Disk Encryption
- encrypted containers (e.g. Veracrypt, LUKS / dm-crypt)