Threat ModelsI.e, What are you worried about?
Message confidentiality
Message authentication/integrity
Traffic analysis
Denial of service
Maintaining anonymity
Enforcing transparency
Previous slide
Next slide
Back to first slide
View graphic version