http://msec2nnqtbwh5c5yxpiswzwnqperok5k33udj7t6wmqcleu3ifj34sqd.onion/posts/opsec/cloud_provider_adversary/index.html
Threats: what the adversary might want to acomplish (their goal) Attack Scenarii: a quick list of possible attacks Mitigation measures: what we can do to make those attack
uneconomical, harder Let’s start with an image to visualize exactly what the trust and
security boundaries are in such a setup Context and assumptions Setting up the scene Alice wishes to start hosting a coordination platform for her activist
group, but she doesn’t want to host the platform herself for the
following reasons: Shes does...