Show pagesourceBack to top Share via Share via... Twitter LinkedIn Telegram Yammer RedditRecent ChangesSend via e-MailPrintPermalinkHelp or get help'd × Table of Contents Adversaries Methods to compromise Countermeasures Threat Model Adversaries Police Hoster some guy stealing all of our hard disks Administrators Company People within the company Hackers Advanced Persistent Threats (APT) Methods to compromise changing the bootloader intercepting unencrypted network connections user session monitoring (keylogger) root kits Countermeasures Full Disk Encryption encrypted containers (e.g. Veracrypt, LUKS / dm-crypt) Last modified: 2022-01-29 14:04