akwizgran
2016-09-05 13:26:59 +00:00
parent e12655207b
commit a52d2f2d1f

@@ -1,6 +1,6 @@
## Briar Threat Model
The following model is informed by the Trike methodology. Threats are generated by applying each attackers' capabilities to each asset/action combination.
The following model is informed by the Trike methodology. Threats are generated by applying each attacker's capabilities to each asset/action combination.
To keep the model tractable, the following aspects have been excluded:
* Traffic analysis of transports designed to be unlinkable, such as Tor