|
## Briar Threat Model
|
|
## Briar Threat Model
|
|
|
|
|
|
The following model is informed by the Trike methodology. Threats are generated by applying each attackers' capabilities to each asset/action combination.
|
|
The following model is informed by the Trike methodology. Threats are generated by applying each attacker's capabilities to each asset/action combination.
|
|
|
|
|
|
To keep the model tractable, the following aspects have been excluded:
|
|
To keep the model tractable, the following aspects have been excluded:
|
|
* Traffic analysis of transports designed to be unlinkable, such as Tor
|
|
* Traffic analysis of transports designed to be unlinkable, such as Tor
|
... | | ... | |