(no title)
awsthro00945 | 4 years ago
If an attacker can do it, you must assume they will do it. Because they will. That should be the starting point for any threat model.
awsthro00945 | 4 years ago
If an attacker can do it, you must assume they will do it. Because they will. That should be the starting point for any threat model.
smegsicle|4 years ago
"the attacker probably won't read my password through the wall from the radiation off my keyboard"
if your starting point is APT-level adversary then you might as well give up
lamontcg|4 years ago
nyolfen|4 years ago
unknown|4 years ago
[deleted]