elaborate on physical access positioning authored by Richard Pospesel's avatar Richard Pospesel
......@@ -281,6 +281,7 @@ Adversaries may position themselves at a number of different locations in order
7. **Physical access**
Adversaries may have intermittent or constant physical access to users' computers.
Such adversaries would include system administrators, other users of a shared system, or domestic partners.
They may also be able to compel users to surrender their encryption keys.
### 3.3 Adversary Attacks
......
......