diff --git a/threat-model.md b/threat-model.md index 4f2a517..da6f5de 100644 --- a/threat-model.md +++ b/threat-model.md @@ -1,6 +1,6 @@ ## Briar Threat Model -The following model is informed by the Trike methodology. Threats are generated by applying each attackers' capabilities to each asset/action combination. +The following model is informed by the Trike methodology. Threats are generated by applying each attacker's capabilities to each asset/action combination. To keep the model tractable, the following aspects have been excluded: * Traffic analysis of transports designed to be unlinkable, such as Tor