elaborate on physical access positioning authored by Richard Pospesel's avatar Richard Pospesel
...@@ -281,6 +281,7 @@ Adversaries may position themselves at a number of different locations in order ...@@ -281,6 +281,7 @@ Adversaries may position themselves at a number of different locations in order
7. **Physical access** 7. **Physical access**
Adversaries may have intermittent or constant physical access to users' computers. Adversaries may have intermittent or constant physical access to users' computers.
Such adversaries would include system administrators, other users of a shared system, or domestic partners.
They may also be able to compel users to surrender their encryption keys. They may also be able to compel users to surrender their encryption keys.
### 3.3 Adversary Attacks ### 3.3 Adversary Attacks
... ...
......