Changes
Page history
elaborate on physical access positioning
authored
May 15, 2024
by
Richard Pospesel
Hide whitespace changes
Inline
Side-by-side
Design-Documents/Tor-Browser-Design-Doc.md
View page @
45b049c1
...
...
@@ -281,6 +281,7 @@ Adversaries may position themselves at a number of different locations in order
7.
**Physical access**
Adversaries may have intermittent or constant physical access to users' computers.
Such adversaries would include system administrators, other users of a shared system, or domestic partners.
They may also be able to compel users to surrender their encryption keys.
### 3.3 Adversary Attacks
...
...
...
...