http://msec2nnqtbwh5c5yxpiswzwnqperok5k33udj7t6wmqcleu3ifj34sqd.onion/posts/opsec/cloud_provider_adversary/index.html
(She
doesn’t know Leo is already hard at work) Impacted assets decryption keys (eg: her https private key, allowing for complete
decryption of her team’s traffic) sensitive data (ephemeral private messages on her forum that arer
only kepy in RAM in an unencrypted form) software state (session cookies, metadata) Bob could also use side-channel attacks by monitoring the underlying
server’s power usage or run cache timing attack to find the value of
her...