Show pageBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Threat Model ====== ===== Adversaries ===== * Police * Hoster * some guy stealing all of our hard disks * Administrators * Company * People within the company * Hackers * Advanced Persistent Threats (APT) ===== Methods to compromise ===== * changing the bootloader * intercepting unencrypted network connections * user session monitoring (keylogger) * root kits ===== Countermeasures ===== * Full Disk Encryption * encrypted containers (e.g. Veracrypt, LUKS / dm-crypt) Last modified: 2022-01-29 14:04